Overview of Progent's Security Consulting Services
Progent's industry certified computer security experts offer a broad selection of services designed to assist companies of any size to detect and correct security weaknesses, defend against assaults, remediate any damage resulting from a breakdown of security, and comply with regulatory requirements for protecting information and reporting incidents. Progent can provide world-class help for key security and recovery technologies including AI-based End Point Protection and Response, Managed Detection and Response, complete system restoration validation, immutable backup, and off-site backup.
Progent can provide a choice of service models:
- As-needed remote and on-site assistance billed by the minute
- On-going managed services invoiced at an affordable fixed monthly rate
- Set-price service packages for a single security and compliance evaluation
- Urgent ransomware recovery. Progent will propose a bid based on an evaluation of the extent of the damage.
(If your system has been breached by any version of ransomware, don't panic. Get immediate help by contacting Progent's 24-hour Ransomware Hot Line at 800-462-8800.)
As-needed Security Support Services
After you register for Progent's services (signing up is free), you can get on-demand online or on-premises assistance from a Progent security and compliance consultant. This classic support model is essentially reactive and optimized for quickly taking care of technical issues that are affecting your network or that have stumped your in-house support personnel. Typical scenarios are debugging a firewall appliance or VPN tunnel, installing a critical security patch for a Cisco switch, designing compliant access to a public cloud, or recovering from a ransomware attack. These security services are billed by the minute, which avoids the frustrating case of getting big invoices for fast repairs.
Delivery options for Progent's as-needed support include:
- Remote Security Services
Most security-related issues can be handled remotely through a combination of phone-based help and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide online security support by offering efficient access to consultants with the background and technical resources to fix many of the most difficult problems quickly, keeping your support costs affordable and minimizing downtime.
- On-premises Security Services
For cases where onsite assistance is required, Progent can send a technical professional to major metropolitan areas throughout the United States. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any site in the country.
Progent's security consultants are premier to provide help for systems based on Microsoft Windows, Linux, Mac, Sun Solaris, and popular versions of UNIX. Progent's broad selection of consulting services addresses firewall technology, email and messaging security, secure system architecture, and data restoration. Progent's support staff has been awarded the industry's top security accreditations including Certified Information Security Manager and Information System Security Architecture Professional (ISSAP). Progent also can provide fast access to online Cisco-certified CCIE network infrastructure consultants who can deliver advanced assistance with tough network integration issues.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates SentinelOne's next generation behavior machine learning tools to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to address the complete malware attack lifecycle including protection, identification, mitigation, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery based on SentinelOne technology.
- ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is an expanding line of in-depth reporting plug-ins created to work with the industry's top ticketing and remote network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to surface and contextualize critical issues like inconsistent support follow-through or machines with out-of-date AVs. By exposing ticketing or network health problems concisely and in near-real time, ProSight Reporting improves network value, reduces management overhead, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection services offer affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge tools packaged within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can assist you to plan and implement a ProSight ESP deployment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with government and industry information security regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also assist your company to set up and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup activities and enables fast recovery of vital data, applications and VMs that have become lost or corrupted as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPAA, FIRPA, and PCI and, when necessary, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the technology of leading information security vendors to deliver web-based control and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.
- ProSight Duo MFA: Two-Factor Identity Authentication
ProSight Duo MFA is a selection of managed services incorporating industry-leading cybersecurity technology from Duo, a Cisco-owned company, to create two-factor authentication solutions. Two-factor authentication utilizes an outside-channel device to validate identity, offering a second layer of protection beyond merely passwords. This protects against the majority of IT security break-ins like social engineering, brute-force password guessing, and stolen credentials. Duo's push technology can avoid wasted time and reduce hassle by allowing users to prove their identity as easily as tapping "Approve" on the authentication box on their personal endpoint, which could be a smartphone, a watch, or other compatible device. This single-tap verification process eliminates the need to open an email or text and copy a security passcode. Learn more about Progent's ProSight Duo MFA multi-factor identity authentication service plans.
- ProSight WAN Watch: Network Infrastructure Management
Progent's ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for small and mid-sized businesses to map, track, optimize and troubleshoot their networking appliances such as routers, firewalls, and access points as well as servers, printers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that infrastructure topology maps are always updated, copies and displays the configuration information of virtually all devices connected to your network, tracks performance, and generates alerts when issues are detected. By automating tedious management and troubleshooting activities, WAN Watch can cut hours off common tasks such as network mapping, expanding your network, locating appliances that need important software patches, or identifying the cause of performance issues. Learn more about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progent's server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management technology to help keep your network operating at peak levels by tracking the state of vital assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your specified IT management personnel and your assigned Progent engineering consultant so all potential problems can be resolved before they have a chance to impact your network Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the apps. Because the system is virtualized, it can be moved easily to an alternate hosting environment without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSLs or domains. By updating and managing your IT documentation, you can eliminate up to half of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether you're making improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost alternative for small and mid-size organizations to get an objective assessment of the overall health of their IT system. Based on some of the top remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's world-class group of IT experts, ProSight Network Audits show you how well the configuration of your essential infrastructure devices conform to best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver instant benefits such as a more manageable Active Directory (AD) environment. Both versions also include one year of state-of-the-art remote network monitoring and management. Benefits can include easier management, better compliance with government and industry security requirements, more efficient utilization of IT assets, faster problem resolution, more reliable backup and recovery, and increased uptime. Read more about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service centered on a phone interview with a Progent information assurance expert. The interview is designed to assess your organization's preparedness to block or recover quickly after an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to collect information about your existing antivirus tools and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to build a cost-effective security and backup/recovery system that aligns with your company's needs. For details, refer to The ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Packages
Progent offers a portfolio of flat-rate security evaluation bundles that provide high value by utilizing Progent's enterprise-class system monitoring and analysis tools plus Progent's consulting experience to create an unbiased and comprehensive evaluation of your IT environment security posture.
- Security Assessment Service Bundles for Small Organizations
Progent offers two value-priced security inventory packages intended to allow small businesses to obtain an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your network from beyond your corporate firewall to identify potential gaps in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan using an authorized machine inside your company firewall to assess your exposure to internal threats. These two security inventory services are set up and run from a secured offsite location. The project is administered by an engineer who has earned advanced security certifications and who creates a document that describes and interprets the information collected by the security scan and recommend practical enhancements where appropriate.
- Security Vulnerability Assessment Bundles for Large Businesses
Progent offers three levels of flat-rate security assessment service bundles designed for enterprises who need to meet security standards required by government or industry agencies. Progent's security assessment service packages offer enterprises a chance to get a professional look at the viability of their security profile. For each security assessment bundle, Progent engineers with top security credentials study and report on captured data and provide recommendations for efficient improvements. Each of the network security audit bundles include an added-cost option for on-premises consultants anywhere in the United States.
- Expertise with Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that supports continuous, simultaneous, programmable testing of your network so you can uncover, rank, fix, and verify security weaknesses before malicious hackers can exploit them. Progent can provide the skills of a NodeZero Certified Operator (NCO) who can assist you to use NodeZero to perform comprehensive penetration tests of your perimeter and your internal IT infrastructure so you can evaluate your present security profile. Progent's NodeZero experts can also help you to strengthen your network security and can help you to design and deploy a unified cybersecurity ecosystem that streamlines management and delivers maximum cyber defense for on-prem, multi-cloud, and perimeter IT assets. To learn more details about Progent's vulnerability analysis services powered by on NodeZero's pentest products, refer to Consulting Support for NodeZero's Pentest Platform.
- Stealth Penetration Testing
Stealth penetration testing, often known as PEN testing, is an accepted tool for helping organizations to determine how vulnerable their IT systems are to modern threats. Progent's stealth penetration testing test how well your existing security policies and technologies stand up to authorized but unannounced penetration attempts managed by Progent's certified security experts utilizing advanced hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Download the Security Services Overview Datasheet
To download a datasheet with an overview of Progent's portfolio of services for IT security, click:
Overview of Progent's Network Security Services (PDF - 511 KB).
We've Been Hacked: What Are We Supposed to Do Now?
If your company is now fighting a security emergency and you have no formal recovery plan, refer to Progent's Online Technical Support to find out how to get immediate help. Progent provides online help from experienced network technicians and can refer problems to high-level security experts if required. Your organization does not need to be a current Progent customer to get emergency help for a security breakdown, but you can sign up as a Progent customer in advance for free and your standing as a current customer could save valuable time in an emergency.
Typically, smaller organizations have not documented a recovery plan in case of a successful security breach. This is risky, because the cost of a successful security attack can be more devastating for a small company than for a big corporation. Progent's security engineers can assist your you to create a sensible recovery and event reporting procedure that minimizes the IT system downtime resulting from a security breach. The formal incident response model outlined by Global Information Assurance Certification is Progent's suggested procedure for responding to a major security penetration.
High-value Security Services Available from Progent
Progent's certified security consultants can provide expertise in key areas of IT protection such as:
- Information Risk Audits and Security Compliance Assessment
Progent provides expertise with information risk auditing tools like Microsoft Baseline Security Analyzer and LANguard for performing a set of comprehensive system scans to uncover possible security gaps. Progent has broad experience with these utilities and can assist you to understand assessment results and respond efficiently. Progent's security consultants also provide web software testing and can perform thorough assessments of enterprise-wide security to confirm your company's compliance with important worldwide security specifications including FISMA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless protection covering stationary wireless equipment as well as mobile devices. Learn the details about Progent's Security Vulnerability Evaluation and Security Compliance Testing.
- Planning, Implementing, and Testing Secure Environments
Every business ought to develop a thoroughly thought out security strategy that includes both preventive and reactive steps. The pre-attack strategy is a set of steps that helps to reduce vulnerabilities. The reactive plan defines procedures to assist security staff to assess the losses caused by an attack, remediate the damage, record the event, and revive business activity as quickly as possible. Progent can advise you how to design protection into your business operations, install scanning software, define and execute a secure network infrastructure, and recommend procedures and policies that will enhance the safety of your network. Progent's security experts are available to help you to set up a firewall, deploy protected remote access to e-mail and files, and configure an efficient VPN. If your company is looking for an affordable way for outsourcing your security management, Progent's Round-the-clock Monitoring Services feature continual remote network tracking and immediate response to problems.
- Data Restoration and Failure Analysis
Progent has expertise in restoring networks and devices that have been hacked, are quarantined, or have ceased to function following a security penetration. Progent can show you how to determine the damage caused by the breach, return your company to ordinary business operations, and retrieve data lost as a result of the event. Progent's security specialists can also perform a comprehensive forensic evaluation by examining event logs and utilizing a variety of proven assessment techniques. Progent's experience with security issues minimizes your business disruption and allows Progent to suggest effective measures to avoid or mitigate new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to manage your current PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower Services integration and debugging support.
- Additional Firewall and Virtual Private Network Technologies Offered by Progent
As well as offering support for a broad range of protection technologies from Microsoft and Cisco, Progent offers small companies top-tier consulting for solutions from other major firewall and Virtual Private Network vendors by providing services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) applications and services are intended to make sense the massive quantity of information collected in security event logs created by multiple sources including network appliances, servers, and application software and monitoring tools. SIEM applications organizes the security logs from these diverse sources and produces consolidated reports of security events as mandated by state regulations and industry compliance guidelines. Progent's GIAC-certified information assurance consultants and Cisco-certified network infrastructure consultants can help businesses to design, install and operate a SIEM solution that enables them to see the progress of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
- Patch Management Solutions
Patch management includes installing software or firmware updates to operating systems and applications, physical and virtual servers and endpoints, peripherals such as printers, infrastructure appliances such as switches and wireless APs, and Internet-of-Things devices like alarms and robotics. Prompt and properly managed patching optimizes cybersecurity, compliance, uptime, and capability. Sporadic patch management can result in security gaps, compatibility issues, slow or erratic responsiveness, excessive downtime, or loss of important functions. Progent's support services for software and firmware patch management provide businesses of any size a flexible and cost-effective option for assessing, validating, scheduling, applying, and documenting updates to your ever-evolving IT system. (Visit Progent's software update management solutions.)
Progent's Security Credentials
Progent's security professionals have earned some of the most prestigious certifications offered in the industry. All of these accreditations demand exhaustive testing and demonstrated work background to guarantee that recipients have mastered a significant body of security information and techniques and can offer high-level security solutions to computer environments of any complexity.
- Certified Information Security Manager Security Consulting Expertise
Certified Information Security Manager (CISM) identifies the fundamental competencies and worldwide benchmarks of service that IT security professionals are expected to master. CISM provides business management the assurance that those who have been awarded their certification have the background and knowledge to provide efficient security management and consulting support. Progent can offer a CISM-certified support professional to assist your enterprise in vital security areas such as information protection governance, vulnerability management, information protection process management, and incident response management. Read more information about Progent's Certified Information Security Manager Security Support Services.
- CISSP Security Consulting Services
Progent's CISSP experts are security engineers who have earned CISSP status through verified experience, extensive study, and formal examination. CISSP Certification indicates expertise in an international standard for information security. ANSI has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management practices, security architecture and models, access control methodology, applications development security, business processes security, hardware security, encryption, communications, network security, and business continuity planning. Learn additional details about Progent's CISSP Support Services.
- CISSP-ISSAP Cybersecurity Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified cybersecurity architecture experts have earned ISSAP status following rigorous testing and significant experience. field experience with network security design. ISSAP security experts have in-depth understanding of access management systems and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-premier security specialists can help your company with all aspects of architecture security. Learn more information concerning Progent's ISSAP Certified Secure Network Infrastructure Consulting Services.
- Certified Information Systems Auditor Professional Services
The Certified Information Systems Auditor credential is a prestigious qualification that signifies expertise in information system security audit and control. Certified by ANSI, the CISA accreditation requires that candidates pass a comprehensive test given by the ISACA professional group. Progent can provide the expertise of a CISA-Certified security audit engineer able to help businesses in the fields of information systems audit services, information technology governance, systems and infrastructure planned useful life, IT support, safeguarding information assets, and business continuity preparedness. Read more details concerning Progent's CISA Support Services.
- CRISC-certified Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's skills to design, implement, and maintain information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's network risk management expertise is complementary to the support available from Progent's CISA-Premier consultants for impartially assessing your IS management design and also with the expertise of Progent's CISM experts for implementing security policies. Get additional details about Progent's CRISC-certified Risk Management Support.
- Global Information Assurance Certification Consulting Expertise
GIAC was founded in 1999 to certify the skill of IT security engineers. GIAC's mission is to ensure that a certified professional has the skills appropriate to provide services in key areas of network, information, and program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent can provide the help of GIAC certified security engineers for any of the security capabilities covered within GIAC certification topics including assessing networks, security incident handling, traffic analysis, and web services security. Learn more information about Progent's Global Information Assurance Certification Consulting Assistance.
Contact Progent for Network Security Help
If you're trying to find security expertise, call Progent at 800-993-9400 or visit Contact Progent.