Introduction to Progent's Security Support Services
Progent's industry certified network security consultants offer a broad selection of support services intended to help companies of all sizes to uncover and correct security vulnerabilities, defend against attacks, remediate the damage resulting from a breakdown of protection, and comply with government mandates for guarding information and reporting incidents. Progent can deliver advanced guidance for key security and restoration technologies like AI-based End Point Protection and Response, Managed Detection and Response, full system restoration validation, immutable backup, and off-site backup.
Progent offers a selection of service models:
- As-needed remote and on-site assistance invoiced to the nearest minute
- On-going managed services invoiced at an affordable flat monthly fee
- Set-price service packages for a single security and compliance assessment
- Urgent ransomware response. Progent will propose a bid based on an assessment of the extent of the damage.
(If your network has been penetrated by any strain of crypto-ransomware, do not panic. Get immediate help by contacting Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
On-demand Security and Compliance Consulting Services
After you register for Progent's services (registration is free), you can receive on-demand remote or onsite assistance from one of Progent security and compliance consultant. This classic service model is primarily reactive and geared toward rapidly taking care of IT issues that are impacting your productivity or that have stumped your own support personnel. Common examples include replacing a firewall or VPN connection, implementing a vital security update for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the annoying situation of receiving large invoices for fast repairs.
Delivery options for Progent's as-needed support include:
- Remote Security Support Services
The majority security issues can be handled remotely through a combination of phone-based support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security support by offering efficient access to consultants who have the experience and technical resources to resolve some of the most difficult issues quickly, making your support costs affordable and reducing lost productivity.
- On-premises Security Services
For instances where onsite support is necessary, Progent can send a technical expert to major cities across the United States. Progent can also dispatch a security consultant with top certifications and world-class skills to any site in the country.
Progent's security engineers are certified to provide help for environments based on Windows, Linux, Apple Mac, Sun, and popular derivatives of UNIX. Progent's broad array of consulting services encompasses firewall expertise, email and messaging security, protected system design, and data restoration. Progent's support team has earned the industry's most advanced security credentials including Certified Information Systems Auditor and ISSAP. Progent also offers fast access to remote Cisco CCIE network consultants who can deliver advanced assistance with complex network technology issues.
ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates SentinelOne's next generation behavior-based analysis technology to defend endpoints and servers and VMs against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the entire malware attack lifecycle including blocking, detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery powered by SentinelOne technology.
- ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Platforms
ProSight Reporting is a growing line of in-depth reporting plug-ins created to work with the leading ticketing and remote network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to surface and contextualize critical issues like inconsistent support follow-up or machines with missing patches. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting improves network value, lowers management hassle, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring applications.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge technologies incorporated within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP deployment that meets your organization's unique needs and that allows you prove compliance with government and industry information security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent's consultants can also assist you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup activities and enables fast recovery of critical data, applications and virtual machines that have become unavailable or damaged as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to configure ProSight DPS to to comply with regulatory standards such as HIPAA, FINRA, and PCI and, whenever needed, can help you to recover your critical information. Find out more about ProSight DPS Managed Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security companies to provide web-based management and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also assist Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage protection.
- ProSight Duo MFA: Two-Factor Identity Authentication
ProSight Duo MFA is a suite of managed service plans incorporating industry-leading cybersecurity technology from Duo, a Cisco company, to create two-factor authentication (2FA) environments. 2FA utilizes an outside-channel device to confirm identity, offering an additional level of access security beyond just passwords. This counters the most common causes of network security break-ins like phishing, brute-force password attacks, and stolen credentials. Duo's push technology can avoid wasted time and reduce annoyance by permitting users to confirm their identity simply by tapping "Approve" on the authentication prompt on their own unique endpoint, which could be a smartphone, a smart watch, or other supported endpoint. This one-tap validation eliminates the requirement to open an email or text message and copy a security passcode. Learn more about Progent's ProSight Duo MFA multi-factor identity authentication services.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized businesses to map out, monitor, reconfigure and debug their networking hardware such as switches, firewalls, and access points plus servers, printers, client computers and other devices. Using cutting-edge RMM technology, WAN Watch makes sure that infrastructure topology maps are always current, copies and manages the configuration information of almost all devices on your network, tracks performance, and generates alerts when issues are discovered. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can knock hours off common chores like network mapping, expanding your network, locating devices that need critical updates, or identifying the cause of performance problems. Learn more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management technology to keep your IT system operating efficiently by tracking the state of critical assets that power your information system. When ProSight LAN Watch detects a problem, an alert is sent immediately to your designated IT management staff and your Progent consultant so that any looming problems can be addressed before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported easily to a different hardware environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or domains. By updating and organizing your network documentation, you can eliminate up to half of time spent looking for critical information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether you're making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable alternative for small and medium-size businesses to obtain an objective evaluation of the overall health of their network. Powered by a selection of the top remote monitoring and management platforms in the industry, and supervised by Progent's world-class team of information technology experts, ProSight Network Audits show you how well the configuration of your core network devices adhere to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI such as a more manageable Active Directory system. Both versions also come with a year of advanced remote network monitoring and management (RMM). Benefits can include easier network management, better compliance with government and industry security regulations, more efficient utilization of network assets, faster troubleshooting, more dependable backup and restore, and increased uptime. Read more about Progent's ProSight Network Audits network infrastructure review.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service built around a brief interview with a Progent information assurance consultant. The interview is intended to help evaluate your company's preparedness either to stop or recover quickly after an assault by a ransomware variant like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to gather information about your current security profile and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply industry best practices to deploy a cost-effective AV and backup environment that meets your company's needs. For additional information, see Progent's ProSight Ransomware Preparedness Report Service.
Set-price Security Evaluation and Verification Packages
Progent has put together a portfolio of set-price security and compliance assessment packages that deliver high value by deploying Progent's advanced system monitoring and analysis software as well as Progent's technical experience to produce an unbiased and comprehensive assessment of your IT environment security posture.
- Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory scanning service packages intended to allow small businesses to obtain an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your network from outside your corporate firewall to determine possible gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan using an authorized computer within your firewalled perimeter to evaluate your exposure to inside attacks. These two security inventory services are set up and run from a secured external site. The project is administered by an engineer who has been awarded high-level security certifications and who creates a report that details and interprets the information collected by the scan and suggests various improvements where required.
- Security Vulnerability Evaluation Bundles for Large Organizations
Progent offers three levels of set-price security assessment service bundles designed for enterprises who want to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer larger organizations a chance to get an objective look at the viability of their security posture. For each security assessment package, Progent consultants with advanced security credentials study and report on captured data and provide recommendations for efficient remediation. All the network security assessment bundles include an added-cost option for onsite engineers at any location in the U.S.
- Expertise with Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that can deliver continuous, concurrent, programmable assessment of your internal and perimeter network so you can find, prioritize, fix, and verify cybersecurity vulnerabilities before malicious hackers can exploit them. Progent offers the skills of a NodeZero Certified Operator who can assist you to deploy NodeZero to carry out thorough pentests of your network perimeter and your internal network in order to determine your current security posture. Progent can also help you to strengthen your existing network security and can help you to design and implement a cohesive cybersecurity ecosystem that streamlines management and delivers optimum cyber defense for on-prem, cloud-based, and perimeter IT resources. To learn more details about Progent's threat analysis solutions based on on NodeZero's penetration test platform, visit Consulting Services for NodeZero's PEN Test Platform.
- Stealth Penetration Testing
Stealth penetration testing, often called PEN testing, is a critical tool for helping businesses to find out how open their network environments are to modern attacks. Progent's stealth penetration testing check how effectively your existing security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security specialists using cutting-edge hacking techniques. Read about Progent's stealth penetration testing services.
Download the Security Services Overview Datasheet
To download a datasheet with an overview of Progent's portfolio of services for network security, click:
Overview of Progent's Network Security Services (PDF - 511 KB).
Our System Has Been Hacked: What Are We Supposed to Do Now?
If your business is now faced with a security crisis and you do not have a detailed recovery plan, visit Progent's Online Technical Help to see how to receive immediate assistance. Progent provides remote assistance from experienced network technicians and can refer problems to high-level security specialists if required. Your business does not need to be a registered Progent client to get urgent help for a security breach, but you can sign up as a Progent customer ahead of time at no cost and your standing as a current client could save valuable time during a crisis.
Usually, smaller organizations do not have a recovery procedure in case of a damaging penetration. This is not good, since the cost of a serious security assault can be even more devastating for a small business than for a large enterprise. Progent's security specialists can help your company to design an effective response and event reporting procedure that minimizes the network downtime following an attack. The formal post-attack handling procedure outlined by Global Information Assurance Certification is Progent's recommended method for reacting to a serious security incident.
High-value Security Expertise Available from Progent
Progent's certified security consultants can provide specialized help in vital facets of IT protection including:
- Vulnerability Audits and Compliance Testing
Progent provides expertise with information risk auditing software such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of automatic network tests to reveal potential security gaps. Progent has broad skills with these tools and can help you to understand audit reports and respond efficiently. Progent's security engineers also can perform web software testing and can conduct thorough evaluation of corporate-wide security to verify your company's compliance with key industry security standards such as HIPAA, PCI, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances plus mobile handsets. Get more information concerning Progent's Information Risk Audits and Security Compliance Testing.
- Planning, Implementing, and Testing Secure Environments
Every business ought to develop a thoroughly considered security strategy that incorporates both preventive and reactive activity. The proactive strategy is a set of precautions that helps to minimize security holes. The post-attack plan defines procedures to help security personnel to evaluate the losses caused by an attack, remediate the damage, document the experience, and restore network activity as soon as possible. Progent can show you how to incorporate protection into your business operations, install auditing utilities, create and build a safe computer infrastructure, and recommend procedures and policies that will optimize the safety of your computing environment. Progent's security experts are available to assist you to set up a firewall, design safe offsite connectivity to email and data, and configure an efficient VPN. If your company is looking for an economical way for outsourcing your security management, Progent's 24x7 Network Support Services include automated online network tracking and immediate response to problems.
- Data Restoration and Failure Analysis
Progent has skill in restoring systems and devices that have been compromised, are in question, or have failed following a security breach. Progent can help determine the losses caused by the breach, restore ordinary business operations, and recover data lost owing to the assault. Progent's certified engineers can also oversee a comprehensive failure analysis by examining activity logs and utilizing a variety of proven forensics techniques. Progent's experience with security issues minimizes your downtime and permits Progent to recommend efficient ways to prevent or contain new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
- Additional Firewall and Virtual Private Network Consulting Services Offered by Progent
As well as offering support for a broad range of network security technologies from Microsoft and Cisco, Progent offers small and mid-size companies top-tier consulting for security products from other major firewall and Virtual Private Network (VPN) vendors by delivering services such as:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are intended to interpret the enormous amounts of data collected in security event logs generated by multiple sources including network infrastructure appliances, operating systems, and applications and monitoring tools. SIEM software organizes the security event records from these various sources and creates consolidated reports of security events as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network experts can help organizations to plan, deploy and manage a SIEM system that helps them to see the behavior of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management solutions.)
- Patch Management Services
Software update management entails applying software or firmware updates to operating systems and applications, physical and virtual servers and endpoints, peripherals such as printers, network infrastructure appliances such as routers and Wi-Fi access points, and Internet-of-Things (IoT) devices like sensors and robotics. Timely and correctly managed patching optimizes cybersecurity, compliance, uptime, and functionality. Sporadic software update management can cause security vulnerabilities, compatibility issues, slow or erratic performance, excessive downtime, or unavailability of key features. Progent's support services for software and firmware patch management provide organizations of any size a versatile and affordable alternative for assessing, validating, scheduling, implementing, and tracking updates to your dynamic IT system. (Visit Progent's software update management solutions.)
Progent's Security Credentials
Progent's security professionals have earned the most respected certifications offered in the security industry. All of these certifications require exhaustive examinations and proven work experience to guarantee that candidates have acquired expertise with a substantial body of security knowledge and techniques and can offer high-level security solutions to information networks of any size.
- Certified Information Security Manager Security Consulting Expertise
Certified Information Security Manager defines the fundamental competencies and international standards of service that information technology security professionals are required to master. It offers executive management the assurance that those who have been awarded their accreditation possess the experience and knowledge to offer efficient security administration and engineering services. Progent can offer a CISM consultant to help your organization in key security areas including data security governance, risk management, information protection process control, and crisis handling support. Learn additional information about Progent's CISM Security Support Assistance.
- CISSP Security Support Services
Progent's CISSP consultants are security specialists who have been awarded CISSP status through verified professional work, rigorous study, and formal testing. CISSP Certification indicates expertise in a worldwide standard for IT security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security architecture and test systems, connection control methodology, applications development security, business processes security, hardware security, encryption, communications, network security, and business continuity planning. Find out more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.
- CISSP-ISSAP Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Certified cybersecurity architecture experts have earned ISSAP accreditation as a result of rigorous testing and extensive hands-on work with network security architecture. ISSAP security experts have comprehensive knowledge of access control systems and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security integration. Progent's CISSP-ISSAP-certified security consultants can help your company with all phases of secure network architecture. Find out additional information concerning Progent's ISSAP Accredited Protected Network Infrastructure Consulting Assistance.
- Certified Information Systems Auditor (CISA) Professional Services
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an exhaustive examination administered by the ISACA professional group. Progent offers the services of a CISA-Certified security consultant trained to help businesses in the areas of IS audit services, IT enforcement, systems and architecture planned useful life, information technology support, protecting data resources, and business continuity preparedness. Get additional information concerning Progent's CISA Support Expertise.
- CRISC Network Risk Mitigation Consultants
The CRISC certification program was initiated by ISACA to verify a consultant's ability to plan, deploy, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity strategy based on leading practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's risk management services are a good fit the services available from Progent's CISA-Premier security engineers for objectively assessing your IS management mechanisms and also with the expertise of Progent's CISM-certified support professionals for designing company-wide security policies. Get more information about Progent's CRISC-certified Network Risk Management Support.
- Global Information Assurance Certification Professional Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of network security engineers. GIAC's mission is to assure that an accredited security consultant possesses the knowledge necessary to provide services in vital categories of system, information, and application software security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the United States NSA. Progent offers the help of certified consultants for all of the network security disciplines covered within GIAC accreditation programs including auditing perimeters, security incident handling, intrusion detection, and web-based application security. Find out additional information about Progent's GIAC (Global Information Assurance Certification) Professional Expertise.
Contact Progent for Network Security Help
If you need network security consulting expertise, call Progent at 800-993-9400 or see Contact Progent.