Introduction to Progent's Security and Compliance Support Services
Progent's industry certified network security and compliance experts offer a wide range of services designed to assist businesses of any size to identify and eliminate security weaknesses, block assaults, recover from any problems caused by a breakdown of security, and comply with government requirements for guarding data and reporting security incidents. Progent offers a selection of service delivery models:

  • As-needed online and on-site support invoiced to the nearest minute
  • Continual fully managed services billed at a low flat monthly rate
  • Value-priced service packages for a single security evaluation
As-needed Security Consulting Services
After you register for Progent's services (signing up is free), you can get on-demand remote or on-premises assistance from one of Progent security and compliance expert. This traditional support model is primarily reactive and geared toward quickly resolving IT issues that are affecting your productivity or that have stumped your in-house support personnel. Common scenarios are debugging a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch or router, setting up compliant access to a public cloud, or restoring data after a ransomware attack. These security services are invoiced by the minute, which eliminates the annoying case of getting big invoices for fast fixes.

Delivery alternatives for Progent's as-needed support services include:

  • Remote Security Support Services
    Most security issues can be handled remotely through a combination of phone-based help and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver online security support by offering efficient access to consultants who have the experience and resources to resolve some of the most difficult issues quickly, keeping your service costs low and minimizing lost productivity.
  • Onsite Security Support
    For cases where onsite support is required, Progent can send a technical expert to major cities throughout the U.S. Progent can also send a security specialist with top certifications and advanced skills to any site in the U.S.
Progent's accredited engineers are premier to support environments based on Microsoft, Linux, macOS and OS X, Sun Solaris, and popular derivatives of UNIX. Progent's wide array of services addresses firewall technology, email and messaging systems, secure network architecture, and data recovery. Progent's technical support staff has been awarded the world's most advanced security credentials including GIAC and Certified Information Systems Security Professional. Progent also offers immediate access to online Cisco-certified CCIE network infrastructure engineers who can deliver advanced support with complex network technology issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which easily evade legacy signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a single platform to automate the complete malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alarms, device control, and web filtering via leading-edge tools packaged within a single agent managed from a single control. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP environment that meets your company's specific requirements and that helps you demonstrate compliance with government and industry data security regulations. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate attention. Progent can also help you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of critical data, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your critical data. Read more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security vendors to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the local gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller organizations to map, monitor, optimize and troubleshoot their connectivity appliances such as switches, firewalls, and load balancers plus servers, endpoints and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that network maps are kept current, captures and displays the configuration information of virtually all devices on your network, monitors performance, and sends alerts when problems are detected. By automating time-consuming management processes, WAN Watch can knock hours off common tasks like network mapping, expanding your network, finding appliances that need critical software patches, or resolving performance issues. Find out more about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to keep your network running at peak levels by tracking the state of vital assets that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is sent immediately to your designated IT management staff and your assigned Progent engineering consultant so that any potential problems can be resolved before they can disrupt productivity Learn more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hardware environment without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable way for small and mid-size organizations to get an objective assessment of the overall health of their information system. Based on a selection of the leading remote monitoring and management platforms in the industry, and supervised by Progent's certified group of information technology professionals, ProSight Network Audits help you see how closely the deployment of your essential network devices conform to best practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver instant benefits like a cleaner Active Directory (AD) system. Both versions also come with one year of advanced remote network monitoring and management (RMM). Advantages can include simpler network management, better compliance with government and industry security requirements, higher utilization of network resources, faster troubleshooting, more reliable backup and recovery, and higher availability. See more information about ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service built around a phone interview with a Progent backup/recovery consultant. The interview is intended to help assess your organization's preparedness either to block or recover quickly following an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to collect information concerning your current security profile and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can apply best practices to build a cost-effective AV and backup/recovery environment that aligns with your company's requirements. For additional information, refer to The ProSight Ransomware Preparedness Report.

Fixed-price Security Evaluation and Validation Bundles
Progent offers a portfolio of flat-rate security assessment packages that provide high value by deploying Progent's enterprise-class system monitoring software plus Progent's technical experience to produce an unbiased and thorough assessment of your IT environment security profile.

  • Security Inventory Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory scanning service packages designed to allow small organizations to get a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your network from outside your firewalled perimeter to determine potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan from an authorized computer within your corporate firewall to assess your vulnerability to internal threats. The two security inventory scans are set up and run from a secured offsite location. The scan is administered by an engineer who has been awarded high-level security certifications and who produces a report that details and evaluates the information collected by the scan and suggests practical enhancements where required.
  • Security Vulnerability Assessment Packages for Enterprises
    Progent offers three levels of fixed-price security evaluation service packages designed for enterprises who need to meet security standards required by state or industry regulators. Progent's security assessment service bundles offer enterprises an opportunity to obtain an objective look at the viability of their security profile. For every security evaluation bundle, Progent consultants with top security credentials study and report on captured data and provide suggestions for efficient improvements. Each of the network security audit packages include an extra-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly known as PEN testing, is a critical tool for helping businesses to determine how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing services check how well your corporate security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's certified security specialists using advanced hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Do We Do?
Network Security ConsultantsIf you are now faced with a security emergency and you have no formal recovery plan, go to Progent's Remote Computer Support to see how to receive immediate help. Progent offers online technical support from skilled engineers and can escalate problems to certified security specialists if necessary. Your organization does not have to be a registered Progent customer to receive urgent support for a security problem, but you can register as a Progent customer ahead of time for free and your status as a registered customer could save precious time in an emergency.

Usually, smaller companies do not have a recovery plan in case of a damaging attack. This is not good, because the damage from a successful security attack can be more catastrophic for a small business than for a large enterprise. Progent's security engineers can assist your company to create an efficient recovery and event reporting plan that reduces the IT system downtime following an attack. The step-by-step post-attack response model promoted by Global Information Assurance Certification is Progent's preferred method for reacting to a serious security incident.

Advanced Security Services Available from Progent
Progent's seasoned engineers offer specialized help in key facets of computer compliance including:

  • Vulnerability Audits and Security Compliance Testing
    Progent provides experience with security auditing tools such as Microsoft Baseline Security Analyzer and LANguard for performing a variety of comprehensive system tests to uncover potential security gaps. Progent has broad skills with these and similar utilities and can assist your company to analyze audit results and respond efficiently. Progent's security engineers also offer web application testing and can perform thorough evaluation of enterprise-wide security to determine your organization's compliance with important worldwide security standards such as FISMA, PCI, and ISO 17799. Also, Progent can evaluate the strength of your wireless security covering stationary wireless equipment plus mobile devices. Read additional information about Progent's Information Risk Audits and Compliance Testing.
  • Designing, Implementing, and Testing Secure Networks
    Every business ought to have a carefully considered security plan that incorporates both preventive and reactive elements. The pre-attack plan is a collection of precautions that works to minimize vulnerabilities. The reactive strategy specifies procedures to help security personnel to evaluate the losses caused by an attack, remediate the damage, document the event, and restore network activity as quickly as feasible. Progent can advise you how to design security into your company processes, install scanning utilities, define and implement a secure computer infrastructure, and recommend procedures and policies to maximize the safety of your information system. Progent's security professionals are available to assist you to configure a firewall, deploy safe remote access to e-mail and files, and configure an efficient virtual private network. If your company is interested in an economical way for jobbing out your network security administration, Progent's Round-the-clock Network Support Options feature non-stop remote system tracking and quick response to emergencies.
  • Data Recovery and Security Forensics
    Progent has expertise in recovering networks and devices that have been hacked, are suspect, or have stopped working following a security attack. Progent can help evaluate the losses resulting from the assault, restore normal business operations, and retrieve information lost owing to the attack. Progent's security specialists can also manage a comprehensive failure analysis by examining activity logs and utilizing other proven forensics tools. Progent's experience with security issues minimizes your off-air time and allows Progent to recommend efficient measures to prevent or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco CCIE Security ExpertsThe latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower integration and debugging support.
  • Additional Firewall and Virtual Private Network (VPN) Technologies Offered by Progent
    As well as supporting a broad range of security technologies available from Microsoft and Cisco, Progent offers small organizations expert consulting for solutions from other important firewall and Virtual Private Network (VPN) suppliers by offering services such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to make sense the enormous amounts of data represented by security event records created by multiple sources such as network appliances, servers, and applications and monitoring tools. SIEM applications organizes the security event records from these diverse sources and creates consolidated reports of security events as mandated by state regulations and business compliance guidelines. Progent's GIAC-certified network security consultants and Cisco-certified network infrastructure consultants can assist businesses to plan, deploy and operate a SIEM solution that enables them to see the behavior of attacks and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Credentials
Progent's security professionals have been awarded some of the most respected accreditations available in the industry. All of these accreditations demand exhaustive testing and proven field experience to guarantee that recipients have acquired expertise with a significant body of security information and methodologies and can provide high-level security solutions to information networks of any complexity.
  • Certified Information Security Manager Security Consulting Expertise
    CISM defines the basic competencies and international standards of service that information security professionals are required to master. It provides executive management the confidence that consultants who have earned their CISM possess the background and knowledge to offer effective security administration and consulting support. Progent can provide a CISM-certified support professional to assist your enterprise in critical security areas including information protection governance, risk assessment, data security process control, and crisis handling support. Find out additional information about Progent's Certified Information Security Manager Security Support Assistance.

  • CISSP Security Support Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP accreditation through verified professional work, rigorous study, and exhaustive testing. CISSP qualification recognizes expertise in a worldwide standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration practices, security architecture and models, connection control methodology, software development security, business processes security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning. Learn more information concerning Progent's CISSP Consulting Services.

  • CISSP-ISSAP} Security Architecture Consulting Support
    Progent's CISSP-ISSAP Certified security architecture consultants have been awarded ISSAP certification after rigorous testing and significant experience. field experience with information security architecture. ISSAP consultants have acquired comprehensive understanding of access control systems and techniques, telecommunications and network protection, cryptography, requirements analysis, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security experts can help your business with all phases of secure network architecture. Find out more details about Progent's ISSAP Accredited Protected System Infrastructure Consulting Support.

  • CISA Professional Services
    The CISA credential is a globally recognized achievement that indicates mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass an extensive test given by the ISACA professional group. Progent can provide the services of a CISA-Certified security audit professional able to help businesses in the fields of IS audit services, information technology governance, systems and architecture lifecycle, information technology support, protecting data resources, and disaster recovery preparedness. Learn more details about Progent's Certified Information Systems Auditor (CISA) Consulting Expertise.

  • CRISC Risk Management Consultants
    The CRISC certification program was initiated by ISACA to verify an IT professional's skills to design, implement, and maintain IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk mitigation expertise is a good fit the support available from Progent's CISA-Certified consultants for objectively evaluating your IS control design and also with the services of Progent's CISM support professionals for defining company-wide security policies. Read more details about Progent's CRISC-certified Risk Management Support.

  • Global Information Assurance Certification Consulting Expertise
    GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to make sure that an accredited security consultant possesses the skills necessary to provide services in critical categories of network, data, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States NSA. Progent offers the assistance of GIAC certified consultants for all of the network security capabilities covered within GIAC certification programs including auditing IT infrastructure, incident response, intrusion detection, and web services security. Get the details about Progent's Global Information Assurance Certification Professional Expertise.
Depend on Progent for Network Security Support
If you want network security consulting, phone Progent at 800-993-9400 or see Contact Progent.