Overview of Progent's Security Support Services
Progent's certified network security and compliance professionals offer a wide selection of services intended to help companies of any size to identify and correct security weaknesses, defend against malicious attacks, remediate any problems caused by a breach of security, and comply with government requirements for guarding data and reporting security incidents. Progent can provide a choice of service delivery models:

  • On-demand remote and on-premises assistance billed by the minute
  • Continual fully managed services invoiced at a low fixed monthly rate
  • Set-price service packages for a single security and compliance evaluation
On-demand Security and Compliance Support Services
Once you register for Progent's services (signing up is free), you can get on-demand remote or on-premises support from a Progent security expert. This classic support model is primarily reactive and optimized for rapidly taking care of IT problems that are impacting your productivity or that have stumped your own support personnel. Common examples include debugging a firewall appliance or VPN tunnel, installing a critical security update for a Cisco switch or router, designing compliant access to a public cloud, or restoring data after a ransomware attack. These services are invoiced to the nearest minute, which avoids the frustrating case of receiving big bills for fast fixes.

Delivery alternatives for Progent's on-demand support include:

  • Remote Security Support Services
    The majority security-related issues can be handled remotely through a combination of phone-based help and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide online security support by offering easy access to consultants who have the experience and resources to fix many of the most difficult problems quickly, keeping your support costs affordable and minimizing lost productivity.
  • Onsite Security Support Services
    For cases where on-premises assistance is required, Progent can dispatch a technical expert to major metropolitan areas throughout the U.S. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any location in the country.
Progent's security consultants are certified to support environments powered by Windows, Linux, Mac, Solaris, and popular versions of UNIX. Progent's wide array of services encompasses firewall expertise, email systems, secure system architecture, and information recovery. Progent's technical support staff has earned the industry's most advanced security accreditations including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional (CISSP). Progent also offers fast access to remote Cisco CCIE network infrastructure consultants who can provide advanced assistance with complex network configuration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior analysis technology to defend endpoints as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to manage the complete threat progression including blocking, detection, mitigation, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
    Progent's ProSight Enhanced Security Protection managed services deliver affordable in-depth security for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your company's unique needs and that helps you demonstrate compliance with legal and industry information protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate action. Progent can also help you to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and allows fast recovery of critical data, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security vendors to provide web-based management and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for small and mid-sized organizations to map, monitor, enhance and debug their connectivity hardware such as switches, firewalls, and load balancers as well as servers, printers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch ensures that network maps are kept current, copies and displays the configuration of almost all devices on your network, tracks performance, and generates alerts when problems are detected. By automating tedious management processes, ProSight WAN Watch can cut hours off common tasks such as making network diagrams, reconfiguring your network, locating devices that need important software patches, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your network operating at peak levels by checking the state of vital computers that power your business network. When ProSight LAN Watch uncovers an issue, an alarm is transmitted automatically to your designated IT staff and your assigned Progent engineering consultant so all looming issues can be addressed before they have a chance to disrupt productivity Learn more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hosting solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect data about your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your network documentation, you can eliminate as much as half of time wasted looking for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size businesses to get an unbiased assessment of the health of their information system. Powered by a selection of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's world-class team of IT experts, ProSight Network Audits show you how closely the configuration of your essential network devices adhere to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide immediate ROI such as a more manageable Active Directory (AD) system. Both also include a year of cutting-edge remote network monitoring and management (RMM). Advantages can include easier network management, improved compliance with government and industry security standards, higher utilization of network resources, quicker troubleshooting, more reliable backup and recovery, and less downtime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service built around a phone interview with a Progent backup/recovery consultant. The interview is intended to evaluate your organization's preparedness to stop or recover rapidly following an assault by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you directly to gather information concerning your existing antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can apply industry best practices to create an efficient security and backup system that aligns with your business needs. For more information, see The ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Verification Packages
Progent offers a selection of fixed-price security and compliance evaluation packages that provide high value by deploying Progent's enterprise-class system monitoring and analysis software plus Progent's technical experience to create an unbiased and comprehensive assessment of your IT environment security posture.

  • Security Inventory Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory service packages intended to enable small organizations to get an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive examination of your IT system from beyond your firewalled perimeter to identify possible gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan using an authorized machine inside your firewalled perimeter to evaluate your exposure to inside assaults. These two security inventory services are configured and executed from a secured offsite location. The project is administered by an engineer who has earned advanced security certifications and who creates a document that details and evaluates the information collected by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent offers three levels of set-price security evaluation service bundles designed for enterprises who want to meet compliance standards required by government or industry agencies. Progent's security assessment service packages offer enterprises a chance to get a professional assessment at the strength of their security posture. For every security assessment package, Progent consultants with advanced security credentials study and report on captured data and provide recommendations for cost-effective remediation. All the network security assessment packages include an extra-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often referred to as PEN testing, is a critical technique for helping organizations to find out how open their network systems are to modern threats. Progent's stealth penetration testing services test how well your corporate security procedures and platforms resist authorized but unannounced penetration attempts launched by Progent's experienced security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is now experiencing a network security crisis and you have not prepared a detailed response plan, visit Progent's Online Technical Help to find out how to get immediate assistance. Progent provides remote assistance from skilled network technicians and can escalate trouble tickets to certified security specialists if necessary. Your organization does not need to be a current Progent customer to receive urgent help for a security problem, but you can register as a Progent customer ahead of time for free and your status as a registered customer could save valuable time in a crisis.

Usually, smaller organizations have not documented a response procedure in the event of a damaging security breach. This is risky, because the damage from a serious security attack can be more catastrophic for a small business than for a big enterprise. Progent's security engineers can assist your company to design an efficient response and incident reporting plan that minimizes the network disruption resulting from a security breach. The formal incident response procedure outlined by Global Information Assurance Certification is Progent's recommended procedure for responding to a serious security attack.

Advanced Security Expertise Offered by Progent
Progent's security engineers can provide world-class consulting in vital facets of computer security including:

  • Security Vulnerability Audits and Compliance Testing
    Progent provides expertise with information risk evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive system scans to identify possible security gaps. Progent has broad experience with scanning tools and can help your company to analyze assessment results and respond efficiently. Progent's certified security engineers also offer web software validation and can conduct expert assessments of enterprise-wide security to validate your company's compliance with important worldwide security specifications such as FISMA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless protection including fixed wireless equipment plus mobile devices. Find out more details concerning Progent's Vulnerability Evaluation and Security Compliance Testing.
  • Planning, Implementing, and Validating Secure Networks
    Every business should develop a carefully considered security plan that incorporates both preventive and responsive steps. The proactive plan is a collection of steps that helps to reduce vulnerabilities. The post-attack plan specifies procedures to help security staff to assess the losses caused by an attack, remediate the damage, document the event, and revive network functions as quickly as possible. Progent can show you how to build security into your company operations, install scanning software, define and implement a safe IT infrastructure, and recommend processes and policies to optimize the protection of your computing environment. Progent's security experts are ready to assist you to configure a firewall, deploy protected offsite connectivity to email and files, and configure an efficient virtual private network. If your company is interested in an affordable way for outsourcing your security administration, Progent's 24x7 Monitoring Services feature non-stop online system tracking and quick response to problems.
  • Data Restoration and Security Forensics
    Progent offers skill in recovering networks and servers that have been compromised, are suspect, or have stopped working following a security breach. Progent can show you how to assess the losses caused by the breach, restore normal functions, and recover data compromised as a result of the attack. Progent's security specialists can also oversee a comprehensive failure evaluation by going over activity logs and using a variety of advanced forensics tools. Progent's background with security problems minimizes your downtime and allows Progent to propose efficient strategies to avoid or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
    Cisco CCIE Network Security EngineersThe current ASA 5500-X Series of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist you to manage your current PIX or Cisco ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, configure, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to being expert in a wide range of security technologies available from Microsoft and Cisco, Progent offers small organizations top-level engineering services for technologies from other popular firewall and VPN suppliers including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to make sense the enormous amounts of information represented by security event records generated by multiple sources including network infrastructure appliances, operating systems, and applications and monitoring tools. SIEM software organizes the security logs from these diverse sources and produces consolidated reports of security events as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network experts can assist organizations to design, install and manage a SIEM system that enables them to understand the behavior of security incidents and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's Security Credentials
Progent's security professionals have been awarded the most prestigious certifications offered in the security industry. These certifications require exhaustive examinations and proven work background to guarantee that recipients have acquired expertise with a substantial body of security knowledge and methodologies and can offer advanced consulting to computer networks of any size.
  • Certified Information Security Manager Security Consulting Services
    Certified Information Security Manager (CISM) identifies the fundamental competencies and international benchmarks of performance that computer security professionals are expected to achieve. It provides business management the assurance that those who have earned their accreditation possess the background and knowledge to offer effective security administration and engineering services. Progent can provide a CISM expert to help your organization in vital security disciplines including information protection governance, risk assessment, data protection program management, and incident handling management. Read more information about Progent's Certified Information Security Manager Security Support Assistance.

  • CISSP Security Support Expertise
    Progent's CISSP experts are security specialists who have earned CISSP status as a result of verified professional work, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Areas of expertise covered within CISSP include security administration procedures, security design and test systems, connection control systems, applications development security, business processes security, hardware security, encryption, communications, network security, and disaster recovery planning. Find out more details about Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.

  • CISSP-ISSAP} Security Architecture Consulting Support Services
    Progent's CISSP-ISSAP Certified cybersecurity architecture experts have been awarded ISSAP status following rigorous examination and substantial hands-on work with network security design. ISSAP consultants possess in-depth knowledge of access control mechanisms and techniques, telecommunications and network security, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security. Progent's CISSP-ISSAP-certified security specialists can assist your company with all phases of secure network architecture. Learn more information about Progent's ISSAP Accredited Protected IT Architecture Consulting Assistance.

  • CISA Professional Services
    The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates pass a comprehensive examination given by the ISACA professional association. Progent can provide the expertise of a CISA-Certified security engineer trained to assist companies in the fields of IS audit services, information technology enforcement, network assets and architecture planned useful life, IT service delivery, safeguarding information assets, and business continuity planning. Find out more information about Progent's CISA Professional Assistance.

  • CRISC-certified Network Risk Management Consultants
    The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to plan, implement, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity strategy based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's risk mitigation services are a good fit the support available from Progent's CISA-Premier consultants for objectively auditing your IT control design and with the expertise of Progent's CISM consultants for defining security policies. Find out the details about Progent's CRISC-certified Network Risk Management Expertise.

  • GIAC (Global Information Assurance Certification) Consulting Services
    Global Information Assurance Certification was established in 1999 to validate the skill of IT security experts. GIAC's mission is to verify that a certified professional possesses the skills necessary to provide services in vital categories of network, information, and application program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency. Progent can provide the help of GIAC certified security engineers for all of the security services covered under GIAC accreditation programs including auditing security systems, security incident response, intrusion detection, and web-based application security. Read more details about Progent's GIAC Consulting Expertise.
Contact Progent for Computer Security Support
If you're trying to find computer security consulting, call Progent at 800-993-9400 or refer to Contact Progent.