Overview of Progent's Security Consulting Services
Progent's certified network security and compliance consultants can provide a broad selection of services designed to assist companies of any size to identify and eliminate security weaknesses, defend against attacks, recover from any problems resulting from a breakdown of protection, and comply with regulatory mandates for guarding data and reporting security incidents. Progent can provide a selection of service modes:
On-demand Security Consulting Services
- On-demand remote and on-site support invoiced to the nearest minute
- On-going managed services billed at a low fixed monthly fee
- Value-priced service packages for a one-time security evaluation
Once you register for Progent's services (signing up is free), you can receive as-needed remote or on-premises support from a Progent security expert. This classic support model is essentially reactive and geared toward quickly resolving IT issues that are impacting your productivity or that have stumped your in-house support staff. Common scenarios include replacing a firewall appliance or VPN tunnel, implementing a vital security patch for a Cisco switch, designing compliant access to cloud-based resources, or restoring data after a ransomware attack. These services are billed to the nearest minute, which avoids the frustrating case of receiving large invoices for fast fixes.
Delivery options for Progent's on-demand support services include:
Progent's accredited consultants are premier to support systems based on Microsoft, Linux, Mac, Sun Solaris, and popular versions of UNIX. Progent's wide selection of services encompasses firewall technology, e-mail systems, protected system design, and data recovery. Progent's technical support team has earned the world's most advanced security certifications including CISM and Information System Security Architecture Professional (ISSAP). Progent also offers immediate access to remote Cisco CCIE network engineers who can deliver world-class support with complex network configuration problems.
- Online Security Services
Most security-related problems can be resolved remotely through a combination of phone support and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver remote security support by offering easy access to consultants with the background and resources to resolve many of the most difficult problems quickly, keeping your support costs affordable and reducing lost productivity.
- Onsite Security Support
For cases where on-premises assistance is required, Progent can dispatch a technical professional to major metropolitan areas across the United States. Progent can also dispatch a security consultant with top certifications and advanced skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior analysis tools to defend endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely escape traditional signature-matching anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the entire threat progression including blocking, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools incorporated within one agent managed from a unified console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your company's unique requirements and that helps you demonstrate compliance with government and industry data security regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent action. Progent can also assist you to set up and test a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical data, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards such as HIPAA, FIRPA, and PCI and, when needed, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for smaller organizations to diagram, track, optimize and troubleshoot their networking hardware like switches, firewalls, and load balancers plus servers, printers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network diagrams are always updated, captures and displays the configuration information of almost all devices connected to your network, tracks performance, and generates alerts when problems are detected. By automating time-consuming management activities, WAN Watch can knock hours off common tasks like making network diagrams, expanding your network, finding devices that need critical software patches, or identifying the cause of performance problems. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management (RMM) technology to help keep your network operating at peak levels by checking the health of critical assets that power your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted automatically to your designated IT personnel and your assigned Progent consultant so any potential problems can be addressed before they can impact productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as half of time wasted searching for vital information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size organizations to get an objective evaluation of the overall health of their information system. Based on some of the leading remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's world-class group of IT professionals, ProSight Network Audits show you how well the deployment of your essential infrastructure assets conform to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits such as a cleaner Active Directory (AD) environment. Both versions also come with a year of cutting-edge remote network monitoring and management. Advantages can include lower-cost network management, better compliance with government and industry security standards, higher utilization of network assets, faster problem resolution, more reliable backup and recovery, and increased uptime. Learn more about ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is an affordable service built around a phone interview with a Progent backup/recovery consultant. The interview is designed to help evaluate your company's preparedness to stop or recover quickly following an attack by a ransomware strain like Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you directly to collect information about your current AV defense and backup/recovery platform, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow best practices to deploy a cost-effective AV and backup system that aligns with your company's needs. For more information, see Progent's ProSight Ransomware Preparedness Report.
Set-price Security Assessment and Verification Bundles
Progent has put together a variety of fixed-price security evaluation packages that deliver exceptional value by utilizing Progent's enterprise-class network monitoring software as well as Progent's consulting experience to create an unbiased and thorough assessment of your network security posture.
Our System Has Been Hacked: What Are We Supposed to Do Now?
- Security Assessment Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to enable small organizations to obtain a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your IT system from beyond your firewalled perimeter to identify possible risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a network scan from an authorized machine within your company firewall to evaluate your exposure to internal assaults. The two security inventory scanning services are configured and executed from a secured external site. The project is administered by a consultant who has earned high-level security certifications and who produces a report that describes and interprets the information captured by the security scan and recommend various enhancements where required.
- Security Vulnerability Assessment Packages for Enterprises
Progent offers three levels of fixed-price security evaluation service bundles intended for enterprises who want to meet security standards required by state or industry regulators. Progent's security evaluation service bundles offer larger organizations an opportunity to obtain a professional assessment at the strength of their security posture. For each security assessment bundle, Progent consultants with top security credentials analyze and report on captured data and offer recommendations for cost-effective improvements. Each of the network security audit bundles include an added-cost option for on-premises engineers at any location in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, often known as PEN testing, is a critical technique for helping businesses to determine how vulnerable their network environments are to current-generation threats. Progent's stealth penetration testing services check how well your corporate security procedures and platforms resist authorized but unannounced penetration attempts launched by Progent's veteran security experts utilizing advanced hacking techniques. Read about Progent's stealth penetration testing services.
If your business is now experiencing a network security emergency and you have not prepared a formal response plan, go to Progent's Online Computer Help to learn how to receive fast help. Progent offers online technical support from skilled network technicians and can refer problems to certified security experts if required. Your organization does not have to be a registered Progent client to receive urgent help for a security problem, but you can sign up as a Progent client ahead of time for free and your status as a current client can save valuable time in an emergency.
Typically, smaller businesses have no recovery procedure in the event of a successful attack. This is not good, since the cost of a successful security attack can be more catastrophic for a small business than for a big enterprise. Progent's security specialists can help your company to design an efficient recovery and incident reporting plan that reduces the network downtime following an attack. The step-by-step post-attack handling model outlined by GIAC (Global Information Assurance Certification) is Progent's recommended method for responding to a serious security attack.
High-value Security Expertise Available from Progent
Progent's seasoned engineers offer advanced support in key areas of network compliance such as:
Progent's Security Accreditations
- Security Vulnerability Audits and Security Compliance Testing
Progent offers expertise with information risk evaluation software such as Microsoft Baseline Security Analyzer or LANguard for conducting a variety of comprehensive system tests to identify possible security problems. Progent has extensive skills with these tools and can help your company to understand audit reports and react efficiently. Progent's security engineers also provide web application validation and can perform thorough assessments of enterprise-wide security to validate your organization's compliance with key industry security specifications such as FISMA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless protection covering fixed wireless equipment as well as mobile devices. Learn more information concerning Progent's Security Vulnerability Audits and Compliance Testing.
- Planning, Implementing, and Validating Secure Networks
Every organization should have a thoroughly considered security strategy that includes both preventive and responsive steps. The proactive plan is a collection of steps that helps to reduce security holes. The post-attack plan specifies procedures to help security personnel to assess the losses resulting from an attack, remediate the damage, record the event, and restore business activity as soon as possible. Progent can advise you how to incorporate security into your business processes, set up scanning utilities, define and build a safe computer architecture, and propose procedures and policies that will optimize the safety of your computing environment. Progent's security professionals are available to assist you to set up a firewall, deploy safe remote access to email and data, and configure an effective VPN. If your company is looking for an economical option for outsourcing your network security management, Progent's Round-the-clock Monitoring Services feature continual online network monitoring and fast resolution of problems.
- System Restoration and Security Forensics
Progent offers expertise in restoring networks and devices that have been hacked, are quarantined, or have failed following a security breach. Progent can help determine the losses caused by the breach, restore normal business operations, and recover data lost owing to the breach. Progent's certified specialists can also manage a comprehensive forensic analysis by examining event logs and utilizing other proven assessment tools. Progent's background with security consulting reduces your business disruption and allows Progent to suggest efficient measures to avoid or mitigate new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
- Additional Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
In addition to supporting a wide array of security technologies from Microsoft and Cisco, Progent offers small and mid-size companies top-level consulting for products from other major firewall and VPN vendors by delivering services including:
- SIEM Solutions
Security information and event management (SIEM) applications and services are intended to digest the massive amounts of information represented by security event records created by multiple sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM software organizes the security event records from these diverse sources and produces consolidated reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network consultants can help businesses to design, install and operate a SIEM solution that helps them to understand the behavior of security incidents and comply with security incident reporting regulations. (See Progent's SIEM solutions.)
Progent's security engineers have earned some of the most respected accreditations available in the industry. All of these accreditations require extensive examinations and proven work background to guarantee that candidates have mastered a significant body of security information and methodologies and can offer high-level consulting to information networks of any size.
Depend on Progent for Network Security Consulting Services
- Certified Information Security Manager Security Support Services
CISM identifies the basic skills and worldwide standards of service that IT security managers are expected to master. It provides executive management the assurance that consultants who have earned their CISM have the experience and skill to offer effective security management and engineering support. Progent can offer a CISM-certified support professional to help your enterprise in critical security disciplines such as data security governance, vulnerability management, data protection program control, and crisis handling management. Get additional information about Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP consultants are security engineers who have earned CISSP certification as a result of verified professional work, rigorous study, and formal examination. CISSP Certification recognizes mastery of an international standard for IT security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration procedures, security design and models, access permission methodology, software development security, operations security, physical security, encryption, communications, network security, and business continuity planning. Find out additional details concerning Progent's CISSP Support Expertise.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Certified security architecture experts have been awarded ISSAP accreditation as a result of rigorous testing and significant hands-on work with network security architecture. ISSAP consultants have acquired in-depth understanding of access control mechanisms and techniques, telecommunications and network security, cryptography, needs evaluation, business continuity and DRP, and physical security. Progent's CISSP-ISSAP-certified security experts can help your business with all phases of architecture security. Read the details concerning Progent's ISSAP Accredited Secure IT Architecture Consulting Support.
- Certified Information Systems Auditor Consulting Expertise
The CISA accreditation is a globally recognized qualification that represents expertise in network security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA international professional association. Progent can provide the expertise of a CISA-Premier security audit professional able to help businesses in the areas of information systems audit process, information technology governance, network assets and infrastructure planned useful life, information technology service delivery, safeguarding information assets, and disaster recovery preparedness. Get additional details concerning Progent's CISA Professional Assistance.
- CRISC Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to design, deploy, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's risk mitigation expertise is complementary to the services provided by Progent's CISA-Certified security engineers for objectively auditing your IT management mechanisms and with the expertise of Progent's CISM consultants for defining company-wide security policies and procedures. Get more details about Progent's CRISC Network Risk Management Support.
- GIAC (Global Information Assurance Certification) Consulting Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of IT security experts. GIAC's mission is to ensure that an accredited professional possesses the knowledge necessary to deliver services in important areas of system, information, and application software security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. NSA. Progent can provide the expertise of certified security engineers for all of the network security disciplines covered within GIAC certification programs including auditing IT infrastructure, incident response, intrusion detection, and web-based services security. Find out more details about Progent's GIAC Professional Services.
If you want security engineering help, call Progent at 800-993-9400 or visit Contact Progent.