Overview of Progent's Security Consulting Services
Progent's certified computer security experts can provide a wide selection of services intended to assist companies of any size to identify and eliminate security vulnerabilities, defend against attacks, recover from the problems resulting from a breakdown of protection, and meet regulatory requirements for protecting data and reporting security incidents. Progent can provide a choice of service delivery modes:
On-demand Security Consulting Services
- As-needed remote and on-site assistance invoiced by the minute
- On-going fully managed services invoiced at a low fixed monthly fee
- Set-price service bundles for a one-time security and compliance assessment
Once you sign up for Progent's services (signing up is free), you can receive as-needed remote or on-premises assistance from a Progent security and compliance consultant. This traditional service model is primarily reactive and optimized for rapidly resolving technical issues that are affecting your network or that have stumped your own support personnel. Typical examples include replacing a firewall or VPN tunnel, installing a critical security patch for a Cisco switch or router, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are invoiced to the nearest minute, which avoids the frustrating situation of getting big invoices for quick fixes.
Delivery options for Progent's as-needed support services include:
Progent's accredited engineers are premier to support environments powered by Microsoft, Linux, Apple Mac, Sun Solaris, and major versions of UNIX. Progent's broad range of consulting services addresses firewall expertise, email systems, protected system architecture, and data recovery. Progent's support staff has been awarded the industry's most advanced security certifications including Certified Information Systems Auditor and Information System Security Architecture Professional. Progent also can provide fast access to online Cisco-certified CCIE network engineers who can deliver world-class assistance with complex network integration problems.
- Remote Security Support
Most security-related problems can be handled remotely via a combination of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide remote security support by offering efficient access to consultants who have the background and technical resources to resolve some of the most challenging issues quickly, making your support expenses affordable and reducing lost productivity.
- Onsite Security Support
For cases where onsite support is necessary, Progent can dispatch a technical professional to major metropolitan areas across the United States. Progent can also send a security consultant with top certifications and world-class skills to any site in the U.S.
ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight suite of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based analysis tools to guard endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete malware attack lifecycle including blocking, identification, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, device control, and web filtering via leading-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your company's unique needs and that helps you demonstrate compliance with government and industry data security standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate attention. Progent can also help you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast restoration of critical data, apps and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical information. Find out more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security companies to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper level of inspection for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized businesses to map, monitor, optimize and troubleshoot their connectivity hardware such as switches, firewalls, and wireless controllers as well as servers, printers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network diagrams are kept updated, copies and displays the configuration information of virtually all devices connected to your network, monitors performance, and sends notices when issues are discovered. By automating time-consuming network management processes, ProSight WAN Watch can cut hours off ordinary tasks like making network diagrams, reconfiguring your network, finding devices that need important updates, or isolating performance problems. Find out more about ProSight WAN Watch infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring service that uses advanced remote monitoring and management techniques to keep your IT system operating efficiently by tracking the state of vital assets that drive your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted automatically to your designated IT staff and your assigned Progent consultant so that all looming issues can be addressed before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be ported immediately to a different hardware environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can save as much as 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Find out more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size organizations to get an objective assessment of the overall health of their IT system. Based on a selection of the leading remote monitoring and management platforms in the industry, and supervised by Progent's world-class group of IT experts, ProSight Network Audits show you how well the deployment of your essential network assets conform to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI like a cleaner Active Directory environment. Both also come with one year of cutting-edge remote network monitoring and management. Advantages can include easier management, improved compliance with data security regulations, higher utilization of network assets, faster problem resolution, more reliable backup and recovery, and less downtime. Learn more about ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a phone interview with a Progent backup/recovery expert. The interview is designed to evaluate your company's ability to block or recover quickly after an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to collect information concerning your existing antivirus tools and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to build an efficient security and backup system that meets your company's needs. For details, visit The ProSight Ransomware Preparedness Report.
Set-price Security Evaluation and Validation Bundles
Progent has put together a portfolio of flat-rate security assessment bundles that provide exceptional value by deploying Progent's enterprise-class network monitoring and analysis software plus Progent's technical skills to produce an unbiased and thorough assessment of your IT environment security posture.
Our Network Has Been Hacked: What Can We Do?
- Security Inventory Service Bundles for Small Businesses
Progent offers two value-priced security inventory scanning service packages intended to enable small organizations to get a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your IT system from outside your firewalled perimeter to identify potential gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan using an authorized computer inside your company firewall to evaluate your exposure to inside attacks. The two security inventory scans are configured and executed from a secured external site. The scan is managed by a consultant who has earned advanced security certifications and who creates a report that details and evaluates the data captured by the scan and recommend various improvements where required.
- Security Vulnerability Assessment Packages for Large Businesses
Progent offers three levels of set-price security evaluation service bundles designed for large organizations who want to meet compliance standards required by government or industry regulators. Progent's security assessment service bundles offer enterprises a chance to get an objective look at the viability of their security profile. For each security assessment package, Progent engineers with advanced security credentials analyze and report on captured data and provide recommendations for efficient improvements. Each of the network security audit packages include an added-cost option for onsite engineers anywhere in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is an accepted tool for helping businesses to determine how open their IT environments are to modern threats. Progent's stealth penetration testing check how effectively your corporate security procedures and technologies resist authorized but unannounced intrusion attempts launched by Progent's veteran security experts using advanced hacking methods. Read about Progent's stealth penetration testing services.
If your business is currently experiencing a network security emergency and you have no detailed response plan, visit Progent's Remote Network Help to learn how to get fast help. Progent provides remote assistance from experienced network technicians and can refer trouble tickets to high-level security experts if required. Your business does not need to be a current Progent customer to get emergency help for a security problem, but you can sign up as a Progent customer ahead of time at no cost and your status as a registered customer could save precious time in case of an emergency.
Usually, smaller organizations do not have a recovery procedure in the event of a damaging penetration. This is risky, because the cost of a successful security assault can be even more devastating for a small company than for a large corporation. Progent's security consultants can assist your business to design a practical response and incident reporting procedure that minimizes the IT system downtime following a security breach. The formal post-attack handling model promoted by GIAC is Progent's recommended procedure for reacting to a serious security penetration.
High-value Security Expertise Available from Progent
Progent's security engineers offer advanced support in vital areas of network security such as:
Progent's Security Certifications
- Information Risk Audits and Compliance Testing
Progent offers expertise with security auditing utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of comprehensive system scans to identify possible security problems. Progent has extensive experience with these tools and can help your company to understand assessment reports and react efficiently. Progent's security engineers also offer web software validation and can conduct thorough evaluation of enterprise-wide security to confirm your organization's compliance with key global security specifications including HIPAA, PCI, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless security including fixed wireless appliances plus portable handsets. Find out additional details concerning Progent's Information Risk Evaluation and Compliance Assessment.
- Planning, Implementing, and Validating Secure Networks
Any business should develop a carefully considered security plan that incorporates both proactive and responsive steps. The proactive plan is a collection of precautions that works to minimize vulnerabilities. The post-attack plan defines activities to assist IT personnel to assess the damage resulting from a breach, repair the damage, document the event, and revive network functions as soon as feasible. Progent can show you how to build security into your company processes, install auditing software, define and execute a secure IT infrastructure, and propose procedures and policies to enhance the safety of your computing environment. Progent's security professionals are ready to help you to set up a firewall, design protected offsite connectivity to email and files, and install an effective VPN. If your company is looking for an economical option for outsourcing your network security administration, Progent's Round-the-clock Network Support Packages include automated online server monitoring and immediate response to problems.
- Data Recovery and Failure Analysis
Progent offers expertise in restoring networks and devices that have been compromised, are in question, or have stopped working because of a security penetration. Progent can help determine the losses resulting from the breach, restore ordinary functions, and retrieve information compromised owing to the event. Progent's certified specialists can also perform a thorough failure analysis by examining event logs and using other proven forensics tools. Progent's background with security issues reduces your off-air time and allows Progent to recommend effective ways to avoid or contain new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist you to manage your current PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
- Additional Firewall and VPN Solutions Provided by Progent
As well as supporting a broad range of security solutions available from Microsoft and Cisco, Progent offers small organizations expert support for security products from other important firewall and Virtual Private Network suppliers by delivering services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are designed to interpret the massive quantity of information represented by security incident records generated by multiple sources such as network appliances, operating systems, and application software and tools. SIEM software organizes the security logs from these various sources and produces consolidated reports of security events as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified network security consultants and Cisco-certified network infrastructure experts can help businesses to design, deploy and operate a SIEM solution that helps them to understand the progress of attacks and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's security engineers have earned some of the most prestigious accreditations available in the industry. All of these accreditations require extensive testing and proven field background to ensure that recipients have mastered a substantial amount of security knowledge and techniques and can offer advanced security solutions to computer networks of any complexity.
Get in Touch with Progent for Computer Security Expertise
- CISM Security Support Expertise
CISM identifies the fundamental skills and international benchmarks of performance that computer security professionals are expected to master. It provides executive management the assurance that those who have earned their accreditation possess the experience and knowledge to provide effective security management and engineering services. Progent can offer a CISM support professional to help your organization in critical security areas including data security governance, vulnerability management, data protection program management, and crisis handling management. Find out more information concerning Progent's Certified Information Security Manager Security Support Assistance.
- CISSP Security Consulting Expertise
Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified professional work, rigorous study, and exhaustive testing. CISSP Certification indicates expertise in a worldwide standard for IT security. ANSI has given the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management practices, security design and test systems, access permission systems, software development security, operations security, physical security, cryptography, telecommunications, network security, and business continuity planning. Find out additional details concerning Progent's CISSP Support Assistance.
- CISSP-ISSAP} Security Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier security architecture consultants have been awarded ISSAP accreditation following rigorous testing and extensive hands-on work with information security architecture. ISSAP security experts have in-depth understanding of access control systems and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security experts can help your business with all aspects of secure network architecture. Get more information about Progent's ISSAP Certified Protected IT Infrastructure Consulting Services.
- Certified Information Systems Auditor (CISA) Support Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that indicates expertise in network security audit and control. Accredited by ANSI, the CISA credential has consultants undergo an extensive test administered by the ISACA professional association. Progent can provide the expertise of a CISA-Premier security professional trained to help companies in the fields of information systems audit services, information technology administration, systems and infrastructure planned useful life, IT support, protecting data assets, and disaster recovery preparedness. Find out more information concerning Progent's Certified Information Systems Auditor Consulting Services.
- CRISC Network Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's ability to plan, deploy, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and carry out a business continuity strategy based on leading practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's risk mitigation expertise is complementary to the services available from Progent's CISA-Premier consultants for impartially auditing your IS control mechanisms and with the expertise of Progent's CISM support professionals for implementing company-wide security policies and procedures. Learn additional details about Progent's CRISC IT Risk Management Consulting.
- Global Information Assurance Certification Consulting Services
GIAC was established in 1999 to certify the knowledge of network security experts. GIAC's mission is to verify that a certified security consultant possesses the skills necessary to provide support in critical areas of system, information, and program security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States National Security Agency. Progent can provide the expertise of certified security engineers for any of the network security services covered under GIAC certification programs including assessing networks, security incident handling, intrusion detection, and web-based services security. Find out the details concerning Progent's GIAC (Global Information Assurance Certification) Support Assistance.
If you need computer security consulting, telephone Progent at 800-993-9400 or go to Contact Progent.