Introduction to Progent's Security and Compliance Consulting Services
Progent's industry certified computer security and compliance professionals offer a broad selection of support services intended to assist businesses of any size to identify and correct security vulnerabilities, defend against malicious attacks, remediate any problems caused by a breakdown of protection, and meet government requirements for guarding data and reporting security incidents. Progent can provide a selection of service delivery models:
On-demand Security and Compliance Consulting Services
- As-needed remote and on-premises support billed to the nearest minute
- Continual managed services billed at an affordable fixed monthly rate
- Value-priced service packages for a one-time security evaluation
After you register for Progent's services (signing up is free), you can get on-demand remote or on-premises support from one of Progent security consultant. This traditional support model is essentially reactive and geared toward quickly resolving technical issues that are affecting your productivity or that have stumped your own support personnel. Typical examples include debugging a firewall appliance or VPN connection, installing a vital security patch for a Cisco switch or router, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These services are billed to the nearest minute, which avoids the annoying case of receiving big invoices for fast fixes.
Delivery alternatives for Progent's on-demand support include:
Progent's accredited security consultants are certified to support environments powered by Microsoft Windows, Linux, Mac, Sun, and major derivatives of UNIX. Progent's wide selection of services covers firewall technology, email systems, secure system design, and data restoration. Progent's technical support team has earned the industry's top security certifications including Certified Information Security Manager and Certified Information Systems Security Professional (CISSP). Progent also can provide immediate access to remote Cisco-certified CCIE network infrastructure engineers who can deliver advanced support with tough network technology problems.
- Remote Security Support Services
The majority security-related issues can be handled online through a mix of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver remote security help by offering easy access to consultants who have the background and technical resources to fix many of the most difficult issues quickly, keeping your service expenses low and reducing downtime.
- Onsite Security Support
For cases where onsite assistance is required, Progent can send a technical expert to major metropolitan areas throughout the U.S. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any site in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to guard endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to automate the entire threat lifecycle including protection, identification, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer affordable multi-layer security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device control, and web filtering via cutting-edge technologies incorporated within one agent managed from a unified console. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with government and industry information security standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and restore system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical data, applications and virtual machines that have become lost or damaged due to hardware failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can deliver world-class support to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPAA, FIRPA, and PCI and, whenever necessary, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that uses the technology of leading data security companies to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device adds a further level of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to diagram, monitor, optimize and troubleshoot their networking hardware like routers, firewalls, and access points plus servers, printers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology diagrams are kept updated, copies and manages the configuration information of almost all devices on your network, tracks performance, and sends notices when potential issues are detected. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can cut hours off ordinary tasks such as network mapping, reconfiguring your network, finding appliances that require important software patches, or isolating performance bottlenecks. Learn more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your network running efficiently by tracking the state of critical assets that drive your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted automatically to your designated IT personnel and your Progent engineering consultant so that any looming problems can be addressed before they can disrupt your network Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to an alternate hardware solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time spent searching for critical information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Learn more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost way for small and mid-size businesses to obtain an objective assessment of the health of their network. Based on a selection of the leading remote monitoring and management tools available, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits help you see how well the configuration of your essential network assets adhere to best practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI like a cleaner Active Directory (AD) system. Both versions also include one year of cutting-edge remote network monitoring and management (RMM). Advantages can include easier network management, better compliance with government and industry security regulations, higher utilization of network assets, faster troubleshooting, more reliable backup and restore, and increased uptime. Read more information about Progent's ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a brief interview with a Progent backup/recovery expert. The fact-finding interview is designed to help assess your company's ability either to block or recover quickly following an attack by a ransomware variant like Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you personally to collect information about your existing AV defense and backup system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can apply best practices to deploy a cost-effective AV and backup environment that meets your business needs. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Assessment and Verification Packages
Progent offers a variety of set-price security evaluation packages that deliver exceptional value by utilizing Progent's advanced network monitoring and analysis software as well as Progent's technical experience to create an unbiased and thorough assessment of your network security profile.
Our Network Has Been Hacked: What Do We Do Now?
- Security Assessment Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to allow small organizations to obtain a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your IT system from beyond your firewalled perimeter to identify potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert runs a system scan using an authorized machine inside your corporate firewall to evaluate your exposure to inside assaults. These two security inventory services are set up and executed from a secured external site. The project is managed by an engineer who has earned advanced security certifications and who produces a document that details and interprets the information collected by the scan and recommend practical enhancements where required.
- Security Vulnerability Evaluation Packages for Enterprises
Progent has developed three levels of set-price security evaluation service bundles designed for large organizations who need to meet compliance standards required by government or industry regulators. Progent's security assessment service bundles offer larger organizations an opportunity to obtain a professional assessment at the viability of their security posture. For every security assessment package, Progent consultants with top security credentials analyze and report on captured data and offer recommendations for cost-effective remediation. Each of the network security assessment bundles include an added-cost option for on-premises consultants at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly called PEN testing, is a critical technique for helping organizations to determine how vulnerable their IT environments are to modern attacks. Progent's stealth penetration testing services test how well your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's certified security experts utilizing advanced hacking methods. Find out about Progent's stealth penetration testing services.
If you are now experiencing a network security crisis and you do not have a formal response procedure, refer to Progent's Remote Network Help to see how to get fast assistance. Progent offers remote help from skilled engineers and can escalate trouble tickets to high-level security specialists if required. Your company does not have to be a current Progent client to receive urgent support for a security breakdown, but you can sign up as a Progent customer in advance at no cost and your status as a registered client can save valuable time when there is a crisis.
Typically, smaller businesses have not documented a recovery plan in the event of a damaging security breach. This is not good, because the cost of a successful security assault can be even more catastrophic for a small company than for a big corporation. Progent's security specialists can help your company to design an effective recovery and incident reporting plan that reduces the network downtime resulting from an attack. The step-by-step post-attack handling procedure outlined by Global Information Assurance Certification is Progent's preferred procedure for reacting to a serious security penetration.
High-value Security Expertise Offered by Progent
Progent's seasoned engineers offer specialized help in key areas of computer security including:
Progent's Security Credentials
- Information Risk Audits and Security Compliance Testing
Progent provides expertise with security evaluation tools like MS Baseline Security Analyzer and LANguard from GFI for performing a set of automatic network tests to identify potential security holes. Progent has broad experience with monitoring tools and can help your company to analyze audit results and react efficiently. Progent's certified security engineers also can perform web application validation and can conduct thorough evaluation of enterprise-wide security to confirm your organization's compliance with key global security standards such as FISMA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless protection covering fixed wireless equipment as well as mobile handsets. Get more details concerning Progent's Security Vulnerability Evaluation and Compliance Assessment.
- Planning, Implementing, and Validating Secure Networks
Any company should have a thoroughly considered security strategy that includes both proactive and reactive activity. The proactive plan is a collection of precautions that works to minimize security holes. The post-attack plan specifies activities to help security staff to assess the losses caused by a breach, repair the damage, document the experience, and restore network functions as quickly as feasible. Progent can show you how to design protection into your company processes, configure auditing utilities, create and execute a secure network architecture, and propose procedures and policies to enhance the protection of your information system. Progent's security professionals are available to assist you to configure a firewall, deploy safe remote connectivity to e-mail and data, and install an effective virtual private network (VPN). If you are interested in an affordable option for outsourcing your network security management, Progent's 24x7 Network Support Packages include continual online system monitoring and immediate resolution of emergencies.
- System Restoration and Security Forensics
Progent has skill in restoring networks and devices that have been compromised, are quarantined, or have stopped working following a security breach. Progent can show you how to determine the losses caused by the attack, return your company to ordinary functions, and retrieve data lost as a result of the breach. Progent's security engineers can also oversee a comprehensive failure evaluation by examining activity logs and utilizing a variety of proven forensics tools. Progent's experience with security problems minimizes your downtime and allows Progent to propose effective measures to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.
- Other Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
As well as supporting a wide array of network security technologies available from Microsoft and Cisco, Progent offers small businesses top-tier engineering services for technologies from other major firewall and Virtual Private Network (VPN) suppliers by offering services such as:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) software and services are designed to make sense the enormous quantity of information collected in security event records generated by multiple sources such as network infrastructure appliances, servers, and applications and tools. SIEM applications analyzes the security event records from these various sources and creates summary reports of security events as required by state regulations and industry compliance guidelines. Progent's GIAC-certified network security consultants and Cisco-certified network experts can assist businesses to design, install and operate a SIEM solution that helps them to see the progress of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's security professionals have been awarded some of the most respected accreditations available in the industry. All of these accreditations demand extensive examinations and proven work background to guarantee that recipients have mastered a significant body of security knowledge and techniques and can provide high-level solutions to information environments of any size.
Depend on Progent for Computer Security Consulting Services
- Certified Information Security Manager (CISM) Security Support Services
Certified Information Security Manager (CISM) defines the basic skills and international benchmarks of service that information technology security professionals are expected to master. CISM offers executive management the assurance that those who have earned their CISM have the experience and knowledge to offer efficient security management and consulting services. Progent can offer a CISM-certified expert to assist your enterprise in critical security disciplines including data protection governance, vulnerability assessment, data protection program control, and crisis response support. Get more information concerning Progent's Certified Information Security Manager Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP experts are security specialists who have earned CISSP status through verified experience, extensive study, and formal testing. CISSP Certification recognizes expertise in an international standard for information security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security management practices, security design and test systems, connection permission methodology, software development security, business processes security, physical security, cryptography, telecommunications, network security, and business continuity planning. Get additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Certified security architecture consultants have earned ISSAP certification as a result of thorough testing and extensive experience. field experience with information security architecture. ISSAP security experts have in-depth understanding of access management systems and techniques, phone system and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-premier security specialists can assist your business with all phases of architecture security. Read additional information about Progent's ISSAP Accredited Secure Network Architecture Consulting Services.
- Certified Information Systems Auditor (CISA) Consulting Expertise
The Certified Information Systems Auditor credential is a prestigious achievement that represents expertise in IS security auditing. Accredited by ANSI, the CISA accreditation has consultants pass a comprehensive test given by the ISACA international professional group. Progent can provide the services of a CISA-Certified security engineer trained to help businesses in the fields of information systems audit process, IT governance, systems and infrastructure lifecycle, information technology support, safeguarding information assets, and business continuity planning. Learn more details concerning Progent's CISA Professional Services.
- CRISC Network Risk Management Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to design, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's risk management expertise is a good fit the support provided by Progent's CISA-Certified consultants for impartially auditing your IS control design and with the expertise of Progent's CISM experts for implementing company-wide security policies and procedures. Read additional information about Progent's CRISC-certified IT Risk Management Support.
- GIAC (Global Information Assurance Certification) Consulting Expertise
GIAC was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to verify that a certified professional has the knowledge appropriate to deliver services in important categories of system, data, and application security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent can provide the assistance of GIAC certified consultants for any of the network security capabilities addressed under GIAC accreditation topics such as assessing security systems, incident response, traffic analysis, and web services security. Read additional information concerning Progent's GIAC Support Assistance.
If you want security consulting, phone Progent at 800-993-9400 or visit Contact Progent.