Overview of Progent's Security Support Services
Progent's industry certified network security consultants offer a broad selection of support services intended to assist organizations of any size to identify and correct security vulnerabilities, block attacks, remediate any damage resulting from a breach of protection, and meet regulatory requirements for protecting data and reporting incidents. Progent offers a selection of service delivery modes:
- On-demand online and on-premises assistance billed by the minute
- On-going fully managed services billed at a low flat monthly fee
- Value-priced service bundles for a one-time security evaluation
- Urgent ransomware response. Progent will submit a bid after an evaluation of the damage.
(If your system has been victimized by any strain of ransomware, do not panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800.)
As-needed Security Consulting Services
Once you sign up for Progent's services (registration is free), you can get as-needed online or on-premises assistance from a Progent security consultant. This classic support model is primarily reactive and geared toward rapidly taking care of technical problems that are impacting your network or that have stumped your own support staff. Typical examples are configuring a firewall or VPN tunnel, installing a critical security patch for a Cisco switch or router, setting up compliant access to cloud-based resources, or recovering from a ransomware assault. These security services are billed by the minute, which avoids the annoying situation of getting large bills for fast repairs.
Delivery options for Progent's as-needed support services include:
- Online Security Support
The majority security problems can be resolved online through a mix of phone help and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide remote security support by offering efficient access to consultants with the experience and technical resources to fix many of the most challenging issues quickly, making your support expenses low and reducing lost productivity.
- On-premises Security Support Services
For cases where onsite assistance is required, Progent can send a technical expert to major metropolitan areas throughout the United States. Progent can also dispatch a security consultant with top certifications and world-class skills to any site in the country.
Progent's accredited security engineers are premier to support environments powered by Microsoft, Linux, Apple Mac, Sun Solaris, and popular derivatives of UNIX. Progent's broad range of services covers firewall technology, e-mail security, secure system architecture, and data recovery. Progent's technical support team has earned the industry's top security credentials including Certified Information Security Manager (CISM) and Information System Security Architecture Professional. Progent also offers immediate access to remote Cisco-certified CCIE network infrastructure consultants who can deliver world-class support with complex network integration problems.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight suite of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates SentinelOne's cutting edge behavior-based analysis tools to defend endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to address the complete threat lifecycle including filtering, identification, mitigation, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery based on SentinelOne technology.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to security threats from all vectors. ProSight ESP provides firewall protection, intrusion alarms, device management, and web filtering via cutting-edge tools incorporated within one agent managed from a unified control. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that meets your company's specific needs and that allows you demonstrate compliance with government and industry data protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent can also assist you to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
- ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of critical files, apps and virtual machines that have become unavailable or damaged due to component failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPAA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security vendors to deliver centralized management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage. Email Guard's onsite gateway device adds a deeper level of inspection for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage prevention.
- ProSight Duo MFA: Two-Factor Identity Authentication
ProSight Duo MFA is a suite of managed service plans utilizing top-ranked cybersecurity technology developed by Duo, a Cisco-owned company, to build two-factor authentication environments. 2FA uses an outside-channel device to confirm user identity, offering a second level of access security beyond just passwords. This counters the majority of cybersecurity break-ins such as phishing, brute-force password attacks, and purloined credentials. Duo's push capability can avoid wasted time and reduce frustration by permitting users to confirm their identity as easily as clicking "Approve" on the authentication box on their personal endpoint, which can be a smartphone, a smart watch, or other supported out-of-band device. This single-tap procedure avoids the requirement to open an email or text message and manually transcribe a temporary security code. Find out more about Progent's ProSight Duo MFA multi-factor authentication service plans.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for small and mid-sized businesses to map out, track, enhance and debug their networking hardware like routers, firewalls, and load balancers as well as servers, client computers and other networked devices. Incorporating cutting-edge RMM technology, WAN Watch ensures that infrastructure topology diagrams are kept updated, captures and displays the configuration information of almost all devices connected to your network, tracks performance, and sends alerts when problems are discovered. By automating time-consuming management processes, ProSight WAN Watch can cut hours off ordinary chores such as making network diagrams, expanding your network, locating devices that require important updates, or identifying the cause of performance problems. Learn more about ProSight WAN Watch network infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your network running efficiently by checking the state of critical assets that power your information system. When ProSight LAN Watch uncovers an issue, an alert is sent automatically to your designated IT staff and your Progent engineering consultant so that any potential problems can be resolved before they have a chance to impact your network Learn more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to an alternate hosting solution without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT documentation, you can save up to half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether you're making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost way for small and mid-size organizations to obtain an unbiased assessment of the overall health of their network. Based on a selection of the leading remote monitoring and management platforms in the industry, and overseen by Progent's certified group of IT professionals, ProSight Network Audits help you see how well the deployment of your core network devices conform to leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide immediate benefits such as a cleaner Active Directory (AD) system. Both also come with a year of cutting-edge remote network monitoring and management. Benefits can include easier management, better compliance with government and industry security standards, higher utilization of network resources, faster troubleshooting, more reliable backup and recovery, and increased uptime. Learn more information about ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief interview with a Progent backup/recovery expert. The fact-finding interview is intended to assess your company's ability to block or recover rapidly after an attack by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to collect information about your current cybersecurity profile and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply industry best practices to deploy an efficient security and backup/recovery system that aligns with your business requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Bundles
Progent offers a selection of set-price security assessment bundles that deliver exceptional value by utilizing Progent's enterprise-class system monitoring software as well as Progent's consulting experience to create an unbiased and thorough evaluation of your network security posture.
- Security Inventory Service Bundles for Small Businesses
Progent offers two value-priced security inventory scanning packages designed to allow small organizations to get a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your network from beyond your corporate firewall to identify possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security consultant executes a system scan using an authorized machine inside your company firewall to assess your exposure to inside attacks. The two security inventory scans are set up and executed from a secured offsite location. The project is administered by a consultant who has earned advanced security certifications and who produces a report that describes and interprets the data collected by the scan and recommend various enhancements where required.
- Security Vulnerability Assessment Bundles for Enterprises
Progent has developed three levels of fixed-price security assessment service bundles designed for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer larger businesses a chance to obtain a professional look at the strength of their security profile. For each security evaluation bundle, Progent engineers with advanced security credentials analyze and report on captured data and provide suggestions for cost-effective remediation. Each of the network security assessment bundles include an added-cost option for on-premises consultants at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often known as PEN testing, is a critical tool for helping businesses to determine how open their IT systems are to modern attacks. Progent's stealth penetration testing services test how well your corporate security procedures and technologies resist authorized but unannounced intrusion attempts managed by Progent's certified security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Download Progent's Security Services Overview Datasheet
To download a datasheet with an overview of Progent's portfolio of services for network security, click:
Overview of Progent's IT Security Services Portfolio (PDF - 511 KB).
Our Network Has Been Hacked: What Do We Do?
If your company is now fighting a network security emergency and you have not prepared a formal response plan, go to Progent's Remote Network Help to learn how to receive fast assistance. Progent offers online technical support from skilled network technicians and can refer trouble tickets to certified security experts if required. Your company does not need to be a registered Progent customer to get urgent support for a security breakdown, but you can sign up as a Progent customer ahead of time for free and your standing as a current customer can save valuable time when there is a crisis.
Typically, smaller organizations have no response procedure in case of a damaging penetration. This is risky, since the damage from a successful security attack can be more catastrophic for a small company than for a large corporation. Progent's security engineers can assist your business to create an efficient recovery and event reporting plan that reduces the network disruption following a security breach. The step-by-step post-attack handling procedure outlined by Global Information Assurance Certification is Progent's preferred procedure for handling a major security penetration.
High-value Security Services Available from Progent
Progent's certified security engineers can provide world-class consulting in vital areas of IT protection including:
- Vulnerability Audits and Security Compliance Testing
Progent offers expertise with information risk auditing utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of automatic system scans to reveal possible security holes. Progent has extensive skills with these and similar utilities and can help your company to understand audit results and respond efficiently. Progent's security consultants also offer web application validation and can conduct expert evaluation of corporate-wide security to confirm your company's compliance with major global security specifications including FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the strength of your wireless protection covering stationary wireless appliances as well as mobile handsets. Find out the details about Progent's Security Vulnerability Audits and Security Compliance Testing.
- Planning, Building, and Testing Secure Networks
Every business ought to have a carefully considered security plan that incorporates both proactive and reactive elements. The proactive strategy is a collection of precautions that helps to minimize security holes. The reactive plan defines activities to help security staff to assess the losses resulting from an attack, repair the damage, document the event, and revive network activity as quickly as possible. Progent can advise you how to incorporate security into your company processes, set up scanning utilities, define and implement a secure computer infrastructure, and recommend processes and policies to enhance the protection of your network. Progent's security experts are available to assist you to configure a firewall, design secure offsite access to e-mail and files, and install an efficient virtual private network. If you are interested in an affordable way for jobbing out your security management, Progent's 24x7 Network Support Services feature automated remote server monitoring and fast response to emergencies.
- Data Recovery and Failure Analysis
Progent offers skill in restoring networks and devices that have been compromised, are quarantined, or have stopped working following a security penetration. Progent can show you how to assess the losses caused by the breach, restore normal business operations, and retrieve information compromised as a result of the breach. Progent's certified engineers can also oversee a thorough forensic evaluation by going over event logs and using a variety of advanced assessment tools. Progent's experience with security issues reduces your downtime and permits Progent to suggest effective measures to avoid or contain new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to maintain your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
- Additional Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
As well as offering support for a broad range of protection solutions from Microsoft and Cisco, Progent offers small and mid-size companies expert consulting for products from other important firewall and Virtual Private Network (VPN) suppliers by providing services including:
- SIEM Solutions
Security information and event management (SIEM) software and services are intended to interpret the massive quantity of information collected in security event logs generated by multiple sources such as network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM software organizes the security logs from these diverse sources and creates summary reports of security incidents as required by state regulations and industry compliance standards. Progent's GIAC-certified network security consultants and Cisco CCIE certified network infrastructure experts can help organizations to plan, install and manage a SIEM solution that helps them to see the progress of security incidents and comply with security incident reporting requirements. (See Progent's SIEM solutions.)
- Patch Management Solutions
Software update management entails applying software updates to operating systems and applications, physical and virtual servers and endpoint devices, peripherals such as printers, network infrastructure appliances like switches and Wi-Fi APs, and Internet-of-Things devices like alarms and health monitors. Prompt and correctly managed patching maximizes cybersecurity, compliance, availability, and functionality. Sporadic patch management can result in security gaps, compatibility problems, slow or erratic responsiveness, needless downtime, or loss of key features. Progent's managed services for software and firmware patch management offer businesses of all sizes a flexible and affordable option for evaluating, validating, scheduling, implementing, and tracking updates to your ever-evolving IT network. (Visit Progent's patch management services.)
Progent's Security Certifications
Progent's security specialists have earned the most respected certifications available in the security industry. All of these accreditations require extensive testing and demonstrated field experience to ensure that candidates have mastered a substantial body of security knowledge and techniques and can offer advanced consulting to computer networks of any complexity.
- CISM Security Support Expertise
CISM defines the fundamental skills and worldwide benchmarks of service that information technology security professionals are required to achieve. It offers business management the assurance that those who have been awarded their CISM have the background and skill to offer efficient security administration and consulting support. Progent can offer a CISM-certified support professional to help your enterprise in key security disciplines including information protection governance, risk management, data protection program control, and incident handling management. Get additional information about Progent's Certified Information Security Manager Security Support Expertise.
- CISSP Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation through verified experience, extensive study, and exhaustive testing. CISSP qualification indicates mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security management procedures, security design and models, access control methodology, software development security, operations security, physical security, encryption, telecommunications, network security, and disaster recovery planning. Learn additional details about Progent's CISSP Consulting Assistance.
- CISSP-ISSAP Security Architecture Consulting Services
Progent's CISSP-ISSAP Certified security architecture consultants have been awarded ISSAP accreditation following rigorous examination and significant hands-on work with information security design. ISSAP security experts possess in-depth knowledge of access management systems and methodologies, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-certified security consultants can assist your business with all aspects of secure network architecture. Read the details concerning Progent's ISSAP Accredited Protected System Architecture Consulting Assistance.
- Certified Information Systems Auditor Consulting Services
The CISA credential is a prestigious achievement that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive examination administered by the ISACA professional association. Progent offers the expertise of a CISA-Premier security professional able to help businesses in the areas of information systems audit services, IT governance, systems and architecture lifecycle, information technology support, safeguarding data resources, and business continuity preparedness. Get more details about Progent's CISA Consulting Assistance.
- CRISC Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and execute a business continuity strategy based on leading practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's risk management services are a good fit the support available from Progent's CISA-Certified security engineers for objectively assessing your IS control design and with the expertise of Progent's CISM experts for defining company-wide security policies. Get additional information about Progent's CRISC Risk Management Support.
- Global Information Assurance Certification Professional Expertise
GIAC was established in 1999 to validate the skill of IT security experts. GIAC's mission is to make sure that a certified security consultant possesses the knowledge appropriate to deliver services in critical areas of network, information, and program security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency. Progent can provide the expertise of certified security engineers for any of the network security disciplines addressed under GIAC accreditation topics including auditing IT infrastructure, incident response, traffic analysis, and web services security. Read more information about Progent's Global Information Assurance Certification Support Assistance.
Contact Progent for Computer Security Consulting Services
If you're trying to find security help, telephone Progent at 800-993-9400 or refer to Contact Progent.