Introduction to Progent's Security Support Services
Progent's industry certified computer security experts offer a broad range of support services intended to assist businesses of all sizes to detect and correct security vulnerabilities, defend against attacks, remediate any damage resulting from a breach of protection, and meet regulatory mandates for protecting information and reporting security incidents. Progent offers a selection of service delivery models:
On-demand Security Consulting Services
- As-needed online and on-premises support billed by the minute
- Continual fully managed services billed at an affordable flat monthly rate
- Value-priced service bundles for a one-time security assessment
After you register for Progent's services (registration is free), you can receive on-demand online or on-premises support from one of Progent security and compliance expert. This traditional support model is primarily reactive and optimized for rapidly resolving technical problems that are disrupting your network or that have stumped your own support staff. Common examples are configuring a firewall appliance or VPN connection, installing a vital security patch for a Cisco switch or router, designing compliant access to a public cloud, or recovering from a ransomware attack. These security services are invoiced by the minute, which eliminates the frustrating situation of getting large invoices for fast fixes.
Delivery options for Progent's on-demand support services include:
Progent's accredited engineers are premier to support environments based on Microsoft, Linux, macOS and OS X, Sun, and major derivatives of UNIX. Progent's wide range of consulting services covers firewall expertise, email and messaging systems, protected network design, and data restoration. Progent's support team has earned the industry's most advanced security certifications including GIAC (Global Information Assurance Certification) and CISSP. Progent also can provide immediate access to remote Cisco-certified CCIE network infrastructure engineers who can deliver world-class assistance with tough network technology problems.
- Remote Security Support Services
Most security-related problems can be handled online via a combination of phone support and an connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver remote security help by offering easy access to consultants with the experience and technical resources to resolve some of the most challenging issues quickly, keeping your service expenses low and reducing downtime.
- Onsite Security Services
For instances where on-premises assistance is necessary, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also send a security specialist with high-level certifications and world-class skills to any location in the U.S.
ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior analysis technology to guard endpoint devices and servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily escape legacy signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to manage the complete threat lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer economical multi-layer protection for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a single control. Progent's data protection and virtualization consultants can assist you to design and configure a ProSight ESP deployment that addresses your company's specific requirements and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate action. Progent's consultants can also help your company to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.
- ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup processes and allows fast restoration of critical data, apps and VMs that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide world-class expertise to configure ProSight DPS to be compliant with regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the technology of leading information security companies to provide centralized management and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for small and mid-sized businesses to diagram, monitor, reconfigure and debug their connectivity hardware like switches, firewalls, and wireless controllers plus servers, printers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that infrastructure topology maps are kept current, copies and manages the configuration of almost all devices connected to your network, tracks performance, and generates notices when issues are discovered. By automating time-consuming management and troubleshooting activities, WAN Watch can knock hours off ordinary tasks like network mapping, expanding your network, locating devices that require important updates, or isolating performance problems. Learn more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management techniques to help keep your network running efficiently by tracking the health of vital computers that power your information system. When ProSight LAN Watch uncovers an issue, an alert is sent immediately to your designated IT management personnel and your assigned Progent consultant so that any looming problems can be resolved before they can impact your network Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hardware solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard data about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSLs or warranties. By updating and organizing your network documentation, you can save as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and affordable way for small and medium-size businesses to get an unbiased evaluation of the health of their information system. Powered by a selection of the leading remote monitoring and management platforms available, and supervised by Progent's certified group of IT professionals, ProSight Network Audits help you see how closely the configuration of your essential network devices conform to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver immediate benefits like a cleaner Active Directory environment. Both versions also come with one year of state-of-the-art remote network monitoring and management. Advantages can include simpler network management, better compliance with data security regulations, higher utilization of IT assets, faster problem resolution, more dependable backup and restore, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a phone discussion with a Progent information assurance expert. The interview is designed to evaluate your organization's ability either to block or recover rapidly following an assault by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to collect information about your existing antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to create an efficient security and backup/recovery environment that aligns with your business needs. For details, refer to Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Packages
Progent has put together a number of fixed-price security evaluation packages that provide high value by deploying Progent's enterprise-class system monitoring and analysis tools as well as Progent's consulting experience to produce an unbiased and thorough assessment of your IT environment security profile.
Our Network Has Been Hacked: What Should We Do?
- Security Assessment Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory service packages intended to enable small businesses to get a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers an extensive assessment of your IT system from outside your firewalled perimeter to identify possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert runs a system scan from an authorized computer inside your corporate firewall to evaluate your exposure to internal attacks. These two security inventory scanning services are set up and executed from a secured external site. The scan is managed by a consultant who has been awarded advanced security certifications and who produces a document that describes and interprets the information collected by the scan and recommend various enhancements where required.
- Security Vulnerability Assessment Bundles for Large Businesses
Progent offers three levels of fixed-price security evaluation service bundles designed for enterprises who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service packages offer enterprises an opportunity to obtain an objective assessment at the strength of their security posture. For each security assessment package, Progent engineers with advanced security credentials study and report on captured data and offer suggestions for cost-effective improvements. Each of the network security audit bundles include an added-cost option for onsite engineers anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, often called PEN testing, is a critical tool for allowing organizations to find out how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing check how effectively your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security specialists using cutting-edge hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If your company is currently faced with a network security crisis and you do not have a formal response plan, go to Progent's Online Computer Help to find out how to receive fast help. Progent offers remote help from skilled engineers and can refer trouble tickets to high-level security specialists if necessary. Your company does not have to be a current Progent customer to receive urgent help for a security problem, but you can sign up as a Progent customer in advance at no cost and your status as a registered client could save precious time in a crisis.
Usually, smaller businesses have not documented a recovery procedure in the event of a successful penetration. This is risky, since the damage from a successful security assault can be more catastrophic for a small business than for a large enterprise. Progent's security engineers can assist your company to create an efficient recovery and incident reporting procedure that minimizes the IT system disruption resulting from a security breach. The formal post-attack response model promoted by GIAC is Progent's preferred procedure for handling a serious security attack.
High-value Security Services Available from Progent
Progent's seasoned engineers offer specialized help in vital areas of computer protection such as:
Progent's Security Credentials
- Vulnerability Audits and Security Compliance Testing
Progent provides experience with information risk evaluation tools such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive network tests to reveal potential security gaps. Progent has extensive experience with these tools and can help your company to understand assessment results and respond efficiently. Progent's security engineers also can perform web application testing and can perform expert assessments of enterprise-wide security to validate your company's compliance with key worldwide security specifications including HIPAA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless security covering stationary wireless appliances as well as portable handsets. Find out more information about Progent's Information Risk Evaluation and Security Compliance Testing.
- Planning, Building, and Validating Secure Networks
Every organization ought to develop a carefully considered security plan that incorporates both proactive and responsive elements. The pre-attack plan is a collection of precautions that helps to minimize vulnerabilities. The reactive strategy specifies procedures to help security staff to evaluate the losses caused by an attack, repair the damage, document the event, and revive business activity as soon as possible. Progent can advise you how to build protection into your business operations, set up scanning software, create and implement a safe network infrastructure, and recommend procedures and policies that will optimize the protection of your network. Progent's security experts are ready to assist you to configure a firewall, deploy safe remote connectivity to e-mail and data, and configure an effective virtual private network. If your company is looking for an economical way for outsourcing your network security management, Progent's Round-the-clock Monitoring Packages include automated remote system monitoring and immediate resolution of problems.
- System Recovery and Security Forensics
Progent has skill in restoring systems and devices that have been compromised, are suspect, or have failed as a result of a security breach. Progent can show you how to assess the damage caused by the attack, return your company to ordinary business operations, and retrieve data compromised as a result of the event. Progent's security engineers can also perform a thorough failure evaluation by going over activity logs and using other proven forensics tools. Progent's experience with security consulting minimizes your off-air time and permits Progent to recommend effective strategies to prevent or mitigate new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower configuration and debugging services.
- Other Firewall and VPN Technologies
In addition to supporting a broad range of security technologies from Microsoft and Cisco, Progent offers small organizations expert engineering services for solutions from other popular firewall and Virtual Private Network (VPN) vendors including:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are intended to make sense the enormous amounts of information represented by security incident records created by multiple sources such as network infrastructure appliances, servers, and applications and monitoring tools. SIEM software analyzes the security event records from these various sources and produces summary reports of security incidents as required by state regulations and business compliance guidelines. Progent's GIAC-certified network security experts and Cisco-certified network experts can assist businesses to design, install and operate a SIEM system that enables them to see the behavior of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's security engineers have been awarded some of the most respected certifications offered in the industry. All of these certifications require extensive testing and proven field background to guarantee that candidates have mastered a significant amount of security knowledge and techniques and can provide high-level solutions to information networks of any complexity.
Get in Touch with Progent for Computer Security Consulting Services
- Certified Information Security Manager (CISM) Security Consulting Expertise
CISM defines the core competencies and international standards of service that IT security managers are required to achieve. CISM offers executive management the assurance that consultants who have been awarded their accreditation possess the experience and skill to provide efficient security management and engineering services. Progent can provide a CISM-certified expert to assist your enterprise in key security areas such as data security governance, vulnerability assessment, information protection program control, and incident handling management. Learn additional details concerning Progent's CISM Security Consulting Expertise.
- Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and formal examination. CISSP Certification recognizes expertise in an international standard for information security. ANSI has granted the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security management procedures, security architecture and models, connection control systems, software development security, business processes security, hardware security, cryptography, communications, network security, and business continuity planning. Find out the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Certified cybersecurity architecture experts have earned ISSAP certification as a result of thorough testing and extensive experience. field experience with network security architecture. ISSAP consultants have in-depth knowledge of access control systems and techniques, phone system and network infrastructure security, cryptography, needs evaluation, BCP and DRP, and physical security integration. Progent's CISSP-ISSAP-certified security specialists can assist your company with all aspects of architecture security. Learn more details about Progent's ISSAP Certified Secure IT Infrastructure Consulting Support.
- Certified Information Systems Auditor Professional Services
The Certified Information Systems Auditor (CISA) credential is an important achievement that represents expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates undergo an exhaustive examination administered by the ISACA professional group. Progent can provide the expertise of a CISA-Premier security engineer trained to assist businesses in the fields of IS audit process, IT governance, network assets and architecture planned useful life, IT service delivery, protecting data resources, and disaster recovery preparedness. Find out more details concerning Progent's Certified Information Systems Auditor (CISA) Professional Expertise.
- CRISC-certified Network Risk Management Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to help you to create and execute a business continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's risk management services are complementary to the support provided by Progent's CISA-Premier consultants for objectively assessing your IS control design and with the expertise of Progent's CISM-certified consultants for implementing company-wide security policies. Learn more details concerning Progent's CRISC Risk Management Support.
- GIAC (Global Information Assurance Certification) Support Expertise
GIAC was founded in 1999 to certify the knowledge of computer security experts. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge needed to provide services in vital categories of network, data, and software security. GIAC accreditations are recognized by businesses and government organizations around the world including and the United States National Security Agency. Progent offers the expertise of certified professionals for any of the security disciplines covered under GIAC accreditation topics such as auditing IT infrastructure, security incident handling, intrusion detection, and web application security. Get additional information about Progent's GIAC (Global Information Assurance Certification) Support Assistance.
If you need network security help, call Progent at 800-993-9400 or see Contact Progent.