Introduction to Progent's Security and Compliance Support Services
Progent's certified network security experts can provide a wide selection of support services intended to help companies of any size to uncover and correct security weaknesses, block assaults, remediate any problems caused by a breach of protection, and comply with government requirements for protecting data and reporting security incidents. Progent can provide a selection of service modes:
On-demand Security and Compliance Consulting Services
- As-needed online and on-premises support invoiced to the nearest minute
- Continual managed services invoiced at a low flat monthly fee
- Value-priced service packages for a single security assessment
Once you sign up for Progent's services (registration is free), you can receive on-demand remote or onsite support from one of Progent security expert. This traditional service model is primarily reactive and geared toward quickly taking care of technical issues that are affecting your productivity or that are beyond the scope of your in-house support personnel. Typical examples include replacing a firewall appliance or VPN tunnel, installing a critical security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or restoring data after a ransomware assault. These security services are billed to the nearest minute, which eliminates the frustrating case of receiving big invoices for fast fixes.
Delivery alternatives for Progent's as-needed support include:
Progent's security consultants are certified to support environments powered by Microsoft Windows, Linux, macOS and OS X, Sun, and popular versions of UNIX. Progent's broad selection of consulting services addresses firewall configuration, e-mail security, secure network architecture, and data restoration. Progent's support staff has been awarded the world's top security accreditations including Certified Information Security Manager and CISSP. Progent also can provide fast access to online Cisco CCIE network infrastructure engineers who can provide world-class support with complex network configuration problems.
- Remote Security Services
The majority security-related problems can be handled online via a combination of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide online security support by offering easy access to consultants who have the experience and technical resources to resolve some of the most difficult problems quickly, keeping your support costs low and reducing downtime.
- On-premises Security Support
For cases where on-premises assistance is necessary, Progent can dispatch a technical professional to major metropolitan areas across the U.S. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any site in the U.S.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior machine learning tools to guard endpoints and servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight ASM safeguards local and cloud-based resources and offers a single platform to address the complete malware attack progression including blocking, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alerts, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a unified console. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP deployment that meets your company's specific requirements and that allows you prove compliance with government and industry information protection standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent action. Progent's consultants can also help you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid recovery of vital data, apps and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security vendors to provide web-based management and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a further layer of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, DLP, and encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Management
Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, enhance and troubleshoot their networking hardware such as switches, firewalls, and load balancers plus servers, endpoints and other devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are always current, captures and displays the configuration of virtually all devices on your network, monitors performance, and sends notices when problems are detected. By automating tedious management and troubleshooting processes, WAN Watch can cut hours off ordinary chores like network mapping, expanding your network, finding devices that need important software patches, or identifying the cause of performance bottlenecks. Find out more about ProSight WAN Watch infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management techniques to help keep your network running at peak levels by checking the state of vital assets that drive your information system. When ProSight LAN Watch uncovers a problem, an alert is transmitted immediately to your designated IT management staff and your assigned Progent engineering consultant so that any potential issues can be addressed before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be moved immediately to a different hosting solution without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate up to 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and low-cost way for small and mid-size businesses to get an objective assessment of the health of their information system. Based on some of the leading remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's certified team of IT experts, ProSight Network Audits show you how well the configuration of your essential network assets adhere to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant ROI such as a cleaner Active Directory (AD) system. Both versions also come with one year of cutting-edge remote network monitoring and management. Advantages can include lower-cost network management, better compliance with information security requirements, more efficient utilization of IT resources, faster troubleshooting, more reliable backup and recovery, and less downtime. Read more about Progent's ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service centered on a brief phone interview with a Progent information assurance consultant. The interview is designed to help assess your organization's preparedness either to block or recover rapidly after an assault by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you personally to gather information concerning your current AV defense and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can apply industry best practices to create a cost-effective AV and backup system that meets your company's needs. For additional information, visit The ProSight Ransomware Preparedness Report.
Fixed-price Security Evaluation and Validation Packages
Progent offers a number of flat-rate security assessment packages that deliver exceptional value by utilizing Progent's enterprise-class system monitoring tools as well as Progent's consulting experience to produce an objective and comprehensive evaluation of your IT environment security profile.
Our Network Has Been Hacked: What Are We Supposed to Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory scanning packages intended to enable small businesses to get a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive examination of your IT system from beyond your corporate firewall to determine possible gaps in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan from an authorized computer within your corporate firewall to evaluate your exposure to internal threats. These two security inventory scanning services are configured and run from a secured external site. The project is managed by an engineer who has been awarded high-level security certifications and who creates a document that describes and interprets the data captured by the security scan and recommend practical enhancements where required.
- Security Vulnerability Evaluation Packages for Large Businesses
Progent offers three levels of set-price security assessment service packages designed for large organizations who need to meet security standards required by state or industry regulators. Progent's security evaluation service bundles offer enterprises a chance to get a professional assessment at the strength of their security posture. For every security assessment package, Progent consultants with advanced security credentials analyze and report on collected data and provide suggestions for cost-effective improvements. Each of the network security assessment packages include an extra-cost option for on-premises engineers anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, often known as PEN testing, is a vital technique for helping organizations to find out how open their IT systems are to current-generation attacks. Progent's stealth penetration testing check how effectively your existing security procedures and platforms stand up to authorized but unannounced penetration attempts managed by Progent's experienced security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
If your company is now experiencing a network security crisis and you have no detailed recovery plan, refer to Progent's Remote Network Support to see how to get fast help. Progent provides remote technical support from skilled engineers and can refer trouble tickets to high-level security specialists if required. Your organization does not have to be a current Progent client to get urgent support for a security breakdown, but you can sign up as a Progent customer in advance at no cost and your standing as a current customer could save valuable time when there is an emergency.
Usually, smaller companies have not documented a response procedure in the event of a successful security breach. This is not good, since the damage from a serious security assault can be more devastating for a small business than for a large corporation. Progent's security specialists can help your business to design a sensible recovery and incident reporting plan that reduces the network disruption resulting from a security breach. The step-by-step incident handling procedure outlined by GIAC is Progent's suggested procedure for reacting to a serious security incident.
Advanced Security Expertise Offered by Progent
Progent's certified engineers can provide expertise in key areas of IT security including:
Progent's Security Accreditations
- Vulnerability Evaluation and Compliance Assessment
Progent offers expertise with information risk evaluation tools such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive network scans to identify potential security problems. Progent has extensive skills with these utilities and can help your company to analyze audit reports and respond efficiently. Progent's security consultants also offer web software validation and can perform thorough assessments of enterprise-wide security to validate your organization's compliance with major worldwide security standards including FISMA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless security covering stationary wireless appliances as well as mobile devices. Get more information about Progent's Security Vulnerability Evaluation and Compliance Testing.
- Designing, Implementing, and Validating Protected Networks
Any company should develop a carefully considered security plan that incorporates both preventive and responsive activity. The pre-attack plan is a collection of precautions that works to minimize security holes. The post-attack plan defines activities to help security personnel to assess the losses caused by a breach, repair the damage, document the experience, and restore network activity as soon as feasible. Progent can advise you how to design security into your company processes, install scanning software, create and implement a secure computer architecture, and recommend processes and policies to optimize the safety of your computing environment. Progent's security experts are available to assist you to configure a firewall, deploy protected remote access to email and data, and install an effective virtual private network (VPN). If you are interested in an affordable option for jobbing out your security administration, Progent's 24x7 Monitoring Options feature continual remote network monitoring and fast response to problems.
- Data Recovery and Security Forensics
Progent provides skill in recovering systems and computers that have been hacked, are quarantined, or have failed following a security attack. Progent can show you how to determine the damage caused by the attack, restore ordinary business operations, and retrieve information compromised owing to the assault. Progent's security specialists can also oversee a comprehensive failure evaluation by going over activity logs and using a variety of proven assessment techniques. Progent's background with security issues reduces your business disruption and allows Progent to suggest effective measures to avoid or contain future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA Firewalls with Firepower integration and debugging services.
- Other Firewall and Virtual Private Network Consulting Services
As well as being expert in a broad range of network security solutions from Microsoft and Cisco, Progent offers small businesses top-level consulting for security products from other popular firewall and Virtual Private Network (VPN) suppliers such as:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are intended to make sense the enormous quantity of information represented by security event records generated by a wide range of sources including network infrastructure appliances, servers, and applications and tools. SIEM software organizes the security logs from these various sources and creates consolidated reports of security events as required by government regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network consultants can assist organizations to design, deploy and operate a SIEM solution that helps them to understand the progress of security incidents and comply with security incident reporting requirements. (Visit Progent's SIEM solutions.)
Progent's security professionals have earned the most respected certifications available in the security industry. These certifications demand exhaustive examinations and demonstrated work background to guarantee that candidates have acquired expertise with a significant body of security information and methodologies and can provide advanced solutions to computer networks of any complexity.
Get in Touch with Progent for Network Security Expertise
- Certified Information Security Manager Security Consulting Expertise
CISM defines the core competencies and worldwide standards of service that IT security professionals are expected to achieve. CISM provides executive management the confidence that consultants who have earned their CISM have the background and skill to offer efficient security management and engineering support. Progent can offer a CISM-certified support professional to assist your organization in vital security disciplines such as information security governance, risk assessment, information protection process management, and incident handling management. Get more information about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP experts are security specialists who have earned CISSP status as a result of demonstrated experience, extensive study, and formal examination. CISSP qualification indicates expertise in an international standard for information security. American National Standards Institute has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security administration practices, security architecture and test systems, access permission systems, software development security, operations security, physical security, encryption, telecommunications, network security, and disaster recovery planning. Find out more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier security architecture experts have earned ISSAP accreditation as a result of thorough examination and significant hands-on work with information security design. ISSAP security experts have in-depth understanding of access management systems and techniques, telecommunications and network protection, cryptography, requirements analysis, BCP and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-certified security specialists can assist your business with all aspects of architecture security. Find out more details concerning Progent's ISSAP Certified Secure System Infrastructure Consulting Support.
- Certified Information Systems Auditor (CISA) Support Services
The Certified Information Systems Auditor credential is a recognized qualification that signifies expertise in network security auditing. Certified by ANSI, the CISA accreditation has candidates pass an extensive examination administered by the ISACA professional association. Progent offers the expertise of a CISA-Certified security audit consultant trained to assist businesses in the fields of information systems audit process, IT enforcement, systems and architecture lifecycle, IT support, protecting data assets, and disaster recovery planning. Read more information concerning Progent's Certified Information Systems Auditor Consulting Assistance.
- CRISC-certified IT Risk Management Experts
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist your company to create and execute a business continuity strategy that follows industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's risk mitigation services are complementary to the services available from Progent's CISA-Certified consultants for objectively evaluating your IS management mechanisms and also with the services of Progent's CISM-certified experts for implementing company-wide security policies and procedures. Get additional details about Progent's CRISC-certified Network Risk Management Support.
- GIAC (Global Information Assurance Certification) Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security experts. GIAC's goal is to ensure that a certified security consultant possesses the skills needed to deliver support in vital categories of system, data, and application security. GIAC accreditations are recognized by companies and government organizations around the world including and the U.S. NSA. Progent offers the support of GIAC certified security engineers for all of the network security services covered under GIAC certification topics such as assessing perimeters, incident response, traffic analysis, and web-based application security. Read more information about Progent's Global Information Assurance Certification Support Expertise.
If you're looking for computer security expertise, call Progent at 800-993-9400 or go to Contact Progent.