Introduction to Progent's Security Support Services
Progent's industry certified network security experts can provide a broad selection of support services designed to help organizations of all sizes to uncover and correct security weaknesses, defend against attacks, recover from the problems resulting from a breakdown of protection, and meet government mandates for guarding information and reporting security incidents. Progent can provide a choice of service models:

  • On-demand remote and on-site assistance billed by the minute
  • On-going managed services billed at an affordable flat monthly rate
  • Set-price service bundles for a single security evaluation
As-needed Security Support Services
Once you register for Progent's services (registration is free), you can get on-demand remote or onsite support from a Progent security and compliance consultant. This traditional support model is primarily reactive and optimized for quickly taking care of technical issues that are impacting your productivity or that have stumped your in-house support staff. Typical scenarios are replacing a firewall appliance or VPN connection, installing a vital security update for a Cisco switch or router, setting up secure access to a public cloud, or restoring data after a ransomware attack. These security services are invoiced to the nearest minute, which eliminates the annoying situation of receiving big invoices for quick fixes.

Delivery alternatives for Progent's as-needed support services include:

  • Remote Security Services
    The majority security issues can be handled online through a mix of phone help and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide online security help by offering efficient access to consultants with the experience and technical resources to fix many of the most challenging problems quickly, keeping your service costs low and reducing lost productivity.
  • On-premises Security Support Services
    For instances where on-premises support is required, Progent can dispatch a technical professional to major metropolitan areas across the United States. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any location in the U.S.
Progent's accredited consultants are certified to provide help for systems powered by Windows, Linux, Apple Mac, Sun, and popular derivatives of UNIX. Progent's broad range of consulting services encompasses firewall technology, email and messaging security, protected system architecture, and information recovery. Progent's support team has been awarded the world's top security credentials including Certified Information Systems Auditor (CISA) and CISSP. Progent also offers fast access to remote Cisco CCIE network infrastructure consultants who can deliver world-class support with complex network integration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight suite of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior analysis tools to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to automate the entire malware attack progression including protection, identification, mitigation, remediation, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering through cutting-edge tools incorporated within one agent managed from a unified control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's specific needs and that helps you achieve and demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for immediate attention. Progent can also help you to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup activities and enables fast restoration of critical data, applications and virtual machines that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to provide centralized management and comprehensive security for your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller businesses to diagram, monitor, reconfigure and troubleshoot their networking appliances such as routers and switches, firewalls, and access points plus servers, printers, client computers and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network diagrams are kept updated, copies and displays the configuration information of almost all devices on your network, monitors performance, and sends alerts when issues are detected. By automating time-consuming management processes, WAN Watch can cut hours off common chores such as network mapping, reconfiguring your network, finding appliances that need important updates, or identifying the cause of performance problems. Find out more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses advanced remote monitoring and management technology to help keep your network running efficiently by tracking the health of critical assets that power your information system. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT personnel and your Progent engineering consultant so that any looming issues can be resolved before they can impact productivity Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect information related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size businesses to obtain an objective evaluation of the overall health of their information system. Powered by some of the top remote monitoring and management tools in the industry, and overseen by Progent's world-class group of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential infrastructure devices adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate benefits such as a cleaner Active Directory environment. Both also include a year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, improved compliance with information security requirements, more efficient utilization of IT resources, quicker problem resolution, more dependable backup and restore, and increased uptime. Learn more information about ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is an affordable service based on a phone interview with a Progent information assurance expert. The interview is intended to help assess your organization's preparedness either to block or recover rapidly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you personally to gather information concerning your existing security profile and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply best practices to build a cost-effective security and backup/recovery environment that meets your business needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Validation Packages
Progent offers a portfolio of fixed-price security assessment packages that provide exceptional value by deploying Progent's advanced system monitoring and analysis software as well as Progent's technical skills to create an objective and thorough evaluation of your network security profile.

  • Security Inventory Service Packages for Small Businesses
    Progent offers two ultra-affordable security inventory packages intended to allow small businesses to get a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant administers a comprehensive assessment of your network from beyond your firewalled perimeter to identify possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security expert runs a system scan using an authorized computer inside your firewalled perimeter to evaluate your exposure to internal assaults. The two security inventory scans are set up and run from a secured offsite location. The scan is administered by an engineer who has earned advanced security certifications and who produces a document that describes and evaluates the data collected by the scan and suggests various improvements where required.
  • Security Vulnerability Assessment Bundles for Enterprises
    Progent has developed three levels of fixed-price security assessment service packages intended for enterprises who want to meet security standards required by government or industry agencies. Progent's security evaluation service packages offer larger organizations an opportunity to obtain a professional assessment at the strength of their security profile. For every security assessment bundle, Progent consultants with top security credentials analyze and report on captured data and offer recommendations for cost-effective remediation. Each of the network security assessment packages include an extra-cost option for on-premises consultants at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is a vital tool for helping organizations to determine how vulnerable their network environments are to modern threats. Progent's stealth penetration testing test how effectively your corporate security policies and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's experienced security specialists using advanced hacking techniques. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Do We Do?
Network Security ConsultantsIf your business is now experiencing a network security emergency and you do not have a detailed recovery plan, visit Progent's Online Technical Support to find out how to receive fast assistance. Progent provides remote help from experienced network technicians and can refer problems to high-level security specialists if required. Your business does not have to be a registered Progent customer to get emergency support for a security breakdown, but you can register as a Progent client ahead of time at no cost and your standing as a current client could save precious time when there is an emergency.

Typically, smaller businesses have not documented a response procedure in case of a successful penetration. This is not good, since the damage from a successful security assault can be more devastating for a small company than for a large corporation. Progent's security engineers can help your business to create an effective recovery and event reporting plan that reduces the network disruption following a security breach. The formal incident handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method for responding to a major security incident.

Advanced Security Expertise Offered by Progent
Progent's seasoned engineers can provide world-class consulting in vital facets of computer security including:

  • Security Vulnerability Evaluation and Security Compliance Assessment
    Progent provides experience with security auditing utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network tests to identify possible security gaps. Progent has broad skills with these tools and can help you to analyze audit reports and react efficiently. Progent's security engineers also can perform web software testing and can perform expert evaluation of corporate-wide security to determine your organization's compliance with major industry security standards including HIPAA, NIST, and ISO. In addition, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances as well as mobile handsets. Find out additional information about Progent's Security Vulnerability Evaluation and Security Compliance Assessment.
  • Designing, Implementing, and Testing Protected Environments
    Every organization should develop a thoroughly considered security strategy that includes both proactive and responsive elements. The proactive plan is a set of precautions that helps to reduce vulnerabilities. The reactive plan defines activities to assist security personnel to assess the damage caused by a breach, repair the damage, document the event, and restore business functions as soon as feasible. Progent can advise you how to incorporate protection into your business processes, set up auditing utilities, create and build a secure network infrastructure, and recommend processes and policies to optimize the protection of your computing environment. Progent's security professionals are ready to help you to configure a firewall, design safe online and mobile access to e-mail and files, and install an efficient virtual private network. If your company is interested in an affordable way for outsourcing your network security administration, Progent's Round-the-clock Monitoring Options include automated online server monitoring and immediate resolution of emergencies.
  • Data Restoration and Security Forensics
    Progent offers expertise in restoring networks and computers that have been hacked, are quarantined, or have ceased to function because of a security breach. Progent can help evaluate the losses caused by the attack, restore normal functions, and retrieve data lost as a result of the assault. Progent's security specialists can also manage a thorough failure analysis by examining activity logs and utilizing a variety of proven assessment tools. Progent's background with security problems reduces your off-air time and permits Progent to recommend effective measures to prevent or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
    Cisco Certified CCIE Security EngineersThe new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a broad range of security technologies from Microsoft and Cisco, Progent can provide small businesses expert engineering services for security products from other popular firewall and Virtual Private Network (VPN) vendors such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to digest the massive amounts of information collected in security event logs created by multiple sources such as network infrastructure appliances, operating systems, and applications and monitoring tools. SIEM software analyzes the security logs from these diverse sources and produces consolidated reports of security incidents as mandated by state regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco CCIE certified network infrastructure experts can assist organizations to plan, deploy and operate a SIEM solution that helps them to understand the behavior of attacks and comply with security incident reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security engineers have been awarded some of the most prestigious accreditations available in the industry. These certifications demand extensive testing and demonstrated work background to guarantee that candidates have acquired expertise with a significant body of security knowledge and techniques and can offer high-level consulting to computer networks of any complexity.
  • CISM Security Support Services
    Certified Information Security Manager defines the core competencies and worldwide benchmarks of performance that computer security professionals are required to master. It provides executive management the assurance that those who have earned their certification have the background and knowledge to offer effective security management and engineering services. Progent can provide a CISM-certified expert to help your enterprise in key security disciplines including data protection governance, vulnerability management, information security program management, and incident handling management. Find out more details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified professional work, rigorous study, and formal examination. CISSP qualification indicates mastery of an international standard for information security. ANSI has granted the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of expertise included within CISSP include security management practices, security architecture and models, connection permission systems, software development security, business processes security, hardware security, encryption, communications, network security, and disaster recovery planning. Get the details about Progent's CISSP Support Expertise.

  • CISSP-ISSAP} Security Architecture Consulting Expertise
    Progent's CISSP-ISSAP Premier security architecture experts have been awarded ISSAP status as a result of rigorous testing and extensive hands-on work with information security architecture. ISSAP consultants have in-depth knowledge of access control systems and techniques, phone system and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security experts can assist your company with all phases of architecture security. Get more details concerning Progent's ISSAP Accredited Protected System Architecture Consulting Assistance.

  • Certified Information Systems Auditor (CISA) Support Services
    The Certified Information Systems Auditor accreditation is a recognized qualification that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential has candidates undergo an exhaustive test administered by the ISACA professional association. Progent can provide the services of a CISA-Certified security audit professional trained to assist companies in the fields of IS audit services, information technology enforcement, systems and architecture planned useful life, IT service delivery, safeguarding data resources, and disaster recovery preparedness. Read the details about Progent's Certified Information Systems Auditor Consulting Assistance.

  • CRISC Network Risk Management Experts
    The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's skills to plan, deploy, and support IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and carry out a workplace continuity plan based on industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's network risk mitigation services are complementary to the support available from Progent's CISA-Premier consultants for objectively evaluating your IT management design and also with the services of Progent's CISM consultants for defining security policies. Read the details about Progent's CRISC Network Risk Management Consulting.

  • Global Information Assurance Certification Consulting Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security professionals. GIAC's goal is to make sure that a certified security consultant has the skills needed to provide support in important categories of network, data, and software security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States NSA. Progent offers the help of GIAC certified consultants for any of the network security capabilities addressed within GIAC certification programs such as auditing IT infrastructure, incident handling, traffic analysis, and web-based services security. Read the details about Progent's Global Information Assurance Certification Professional Services.
Depend on Progent for Computer Security Help
If you want security engineering help, call Progent at 800-993-9400 or go to Contact Progent.