Introduction to Progent's Security Support Services
Progent's certified computer security and compliance consultants can provide a broad range of services intended to assist organizations of all sizes to identify and eliminate security weaknesses, defend against assaults, recover from any damage resulting from a breakdown of protection, and meet government requirements for guarding information and reporting security incidents. Progent can provide a selection of service delivery models:

  • As-needed remote and on-site support billed to the nearest minute
  • Continual managed services billed at an affordable flat monthly rate
  • Set-price service bundles for a one-time security evaluation
As-needed Security and Compliance Consulting Services
Once you register for Progent's services (signing up is free), you can receive as-needed remote or on-premises assistance from a Progent security expert. This traditional support model is essentially reactive and optimized for rapidly resolving IT issues that are impacting your productivity or that have stumped your in-house support staff. Typical scenarios are configuring a firewall or VPN tunnel, implementing a critical security update for a Cisco switch or router, setting up compliant access to a public cloud, or recovering from a ransomware assault. These services are billed to the nearest minute, which eliminates the annoying case of getting large invoices for quick repairs.

Delivery options for Progent's as-needed support services include:

  • Online Security Support
    The majority security-related issues can be handled remotely via a mix of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide remote security support by offering easy access to consultants who have the background and technical resources to resolve some of the most challenging issues quickly, keeping your service expenses affordable and reducing lost productivity.
  • On-premises Security Support
    For cases where onsite assistance is required, Progent can dispatch a technical expert to major metropolitan areas throughout the United States. Progent can also send a security consultant with top certifications and advanced skills to any site in the country.
Progent's accredited consultants are certified to support environments based on Microsoft Windows, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's broad selection of services covers firewall configuration, email and messaging systems, protected system architecture, and data recovery. Progent's technical support staff has been awarded the world's most advanced security accreditations including GIAC and Information System Security Architecture Professional (ISSAP). Progent also can provide immediate access to online Cisco-certified CCIE network engineers who can provide world-class support with tough network technology issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices and servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to manage the complete malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering through cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP environment that meets your organization's specific needs and that allows you achieve and demonstrate compliance with government and industry information security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent's consultants can also help you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical files, apps and virtual machines that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security vendors to provide web-based management and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller businesses to diagram, monitor, optimize and debug their connectivity appliances like routers and switches, firewalls, and wireless controllers plus servers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network maps are kept updated, captures and displays the configuration of virtually all devices connected to your network, tracks performance, and sends alerts when potential issues are discovered. By automating complex network management activities, WAN Watch can cut hours off ordinary chores like making network diagrams, reconfiguring your network, finding devices that need critical updates, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) technology to help keep your IT system operating efficiently by tracking the health of critical computers that power your information system. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your designated IT management staff and your assigned Progent engineering consultant so that all potential problems can be resolved before they have a chance to disrupt your network Find out more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported immediately to an alternate hardware environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard data about your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your network documentation, you can eliminate as much as 50% of time wasted searching for critical information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre planning improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable alternative for small and mid-size businesses to get an unbiased evaluation of the health of their information system. Based on a selection of the leading remote monitoring and management tools available, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential infrastructure assets conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide immediate ROI such as a more manageable Active Directory (AD) environment. Both versions also come with one year of cutting-edge remote network monitoring and management (RMM). Advantages can include simpler network management, improved compliance with information security requirements, higher utilization of IT assets, quicker problem resolution, more reliable backup and restore, and increased uptime. Learn more information about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is a low-cost service built around a brief phone interview with a Progent information assurance consultant. The fact-finding interview is intended to help assess your organization's preparedness either to stop or recover rapidly after an assault by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to gather information about your current security profile and backup system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can apply industry best practices to build a cost-effective AV and backup system that aligns with your company's needs. For more information, refer to Progent's ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Validation Bundles
Progent offers a number of fixed-price security evaluation bundles that deliver exceptional value by deploying Progent's advanced system monitoring and analysis software plus Progent's consulting skills to produce an unbiased and thorough assessment of your IT environment security profile.

  • Security Assessment Service Packages for Small Organizations
    Progent offers two value-priced security inventory scanning packages intended to enable small organizations to obtain an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your IT system from beyond your firewalled perimeter to identify possible gaps in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized machine within your corporate firewall to assess your vulnerability to inside assaults. These two security inventory services are configured and run from a secured offsite location. The scan is managed by an engineer who has been awarded high-level security certifications and who produces a document that describes and evaluates the information captured by the scan and suggests various enhancements where appropriate.
  • Security Vulnerability Evaluation Bundles for Large Organizations
    Progent offers three levels of set-price security assessment service packages intended for enterprises who need to meet compliance standards required by state or industry regulators. Progent's security assessment service packages offer larger businesses a chance to obtain an objective look at the viability of their security profile. For each security assessment package, Progent consultants with top security credentials study and report on collected data and offer suggestions for efficient improvements. All the network security audit packages include an extra-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is a vital technique for allowing organizations to determine how vulnerable their network environments are to modern attacks. Progent's stealth penetration testing check how effectively your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf you are now fighting a security emergency and you do not have a formal response procedure, go to Progent's Online Network Help to find out how to receive fast assistance. Progent provides remote assistance from skilled network technicians and can refer trouble tickets to high-level security specialists if required. Your business does not need to be a registered Progent client to receive urgent help for a security breakdown, but you can sign up as a Progent customer in advance for free and your standing as a registered client could save precious time when there is an emergency.

Typically, smaller organizations have not documented a response plan in case of a successful penetration. This is not good, since the damage from a successful security attack can be more catastrophic for a small company than for a large corporation. Progent's security specialists can assist your company to create a sensible recovery and event reporting procedure that reduces the IT system disruption following a security breach. The step-by-step post-attack handling procedure outlined by GIAC is Progent's recommended method for handling a serious security incident.

High-value Security Expertise Offered by Progent
Progent's security engineers offer specialized help in key areas of computer compliance including:

  • Vulnerability Audits and Security Compliance Assessment
    Progent offers experience with security auditing tools like MS Baseline Security Analyzer and LANguard from GFI for conducting a set of automatic system scans to identify potential security gaps. Progent has extensive skills with scanning tools and can help you to understand assessment results and respond appropriately. Progent's certified security engineers also offer web software validation and can perform expert assessments of enterprise-wide security to validate your organization's compliance with key worldwide security specifications including HIPAA, PCI, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security including fixed wireless appliances as well as portable devices. Get more details about Progent's Information Risk Evaluation and Compliance Assessment.
  • Planning, Building, and Testing Secure Environments
    Every organization should have a thoroughly considered security plan that incorporates both proactive and reactive steps. The pre-attack strategy is a set of precautions that works to minimize security holes. The post-attack strategy specifies activities to help security personnel to evaluate the damage resulting from a breach, remediate the damage, document the event, and revive business activity as soon as possible. Progent can show you how to build security into your business processes, install scanning utilities, define and execute a safe IT architecture, and propose procedures and policies that will optimize the safety of your computing environment. Progent's security professionals are available to assist you to configure a firewall, design safe remote access to email and files, and configure an effective VPN. If you are interested in an economical way for jobbing out your network security management, Progent's 24x7 Monitoring Options feature continual remote system tracking and fast response to emergencies.
  • Data Restoration and Security Forensics
    Progent provides expertise in recovering networks and devices that have been compromised, are suspect, or have failed because of a security attack. Progent can help determine the damage caused by the breach, restore normal functions, and retrieve information lost owing to the breach. Progent's certified specialists can also manage a comprehensive forensic evaluation by going over activity logs and using a variety of proven assessment techniques. Progent's experience with security consulting minimizes your off-air time and allows Progent to suggest effective ways to prevent or contain future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
    Cisco Certified CCIE Network Security ConsultantsThe current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower integration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    In addition to supporting a broad range of protection technologies available from Microsoft and Cisco, Progent can provide small and mid-size businesses top-level consulting for technologies from other important firewall and Virtual Private Network vendors such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are designed to digest the massive quantity of information collected in security event records generated by multiple sources including network appliances, servers, and application software and monitoring tools. SIEM software analyzes the security logs from these diverse sources and produces consolidated reports of security events as mandated by state regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network consultants can assist organizations to plan, install and manage a SIEM solution that enables them to understand the progress of attacks and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Credentials
Progent's security specialists have been awarded the most prestigious certifications available in the industry. These accreditations require exhaustive examinations and proven field background to ensure that candidates have mastered a significant body of security information and methodologies and can offer high-level security solutions to computer networks of any size.
  • CISM Security Support Services
    CISM defines the fundamental competencies and international benchmarks of performance that computer security professionals are expected to achieve. It offers business management the assurance that those who have earned their CISM possess the experience and knowledge to provide efficient security management and consulting support. Progent can provide a CISM-certified support professional to assist your enterprise in key security areas including information security governance, vulnerability assessment, information security process management, and incident handling support. Learn more information about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP accreditation as a result of verified experience, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in a worldwide standard for information security. American National Standards Institute has given the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Areas of expertise included under CISSP include security management practices, security design and test systems, access permission methodology, applications development security, operations security, physical security, encryption, telecommunications, Internet security, and disaster recovery planning. Find out additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.

  • CISSP-ISSAP} Security Architecture Consulting Services
    Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have been awarded ISSAP certification following rigorous examination and extensive hands-on work with network security design. ISSAP security experts have acquired in-depth understanding of access management systems and techniques, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security experts can help your business with all aspects of architecture security. Get the details about Progent's ISSAP Certified Secure Network Infrastructure Consulting Assistance.

  • Certified Information Systems Auditor (CISA) Support Services
    The CISA credential is an important qualification that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an exhaustive examination given by the ISACA professional association. Progent offers the services of a CISA-Certified security engineer able to assist businesses in the areas of information systems audit services, IT administration, systems and architecture planned useful life, information technology service delivery, safeguarding information resources, and disaster recovery planning. Read additional information about Progent's CISA Consulting Services.

  • CRISC IT Risk Management Experts
    The CRISC certification program was established by ISACA to validate an IT professional's skills to design, implement, and support information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's network risk management services are a good fit the services available from Progent's CISA-Certified security engineers for objectively evaluating your IS control design and also with the expertise of Progent's CISM support professionals for designing security policies and procedures. Find out additional details about Progent's CRISC-certified Risk Management Expertise.

  • Global Information Assurance Certification Support Services
    Global Information Assurance Certification was established in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to make sure that an accredited security consultant possesses the skills needed to deliver support in key categories of network, data, and software security. GIAC accreditations are recognized by businesses and institutions all over the world including and the U.S. NSA. Progent offers the support of GIAC certified security engineers for all of the network security disciplines covered under GIAC certification programs including assessing security systems, incident response, intrusion detection, and web-based application security. Learn more details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Assistance.
Get in Touch with Progent for Computer Security Expertise
If you want security support services, phone Progent at 800-993-9400 or go to Contact Progent.