Introduction to Progent's Security Consulting Services
Progent's certified network security experts offer a wide selection of services intended to assist organizations of all sizes to detect and correct security weaknesses, defend against attacks, remediate any problems caused by a breach of protection, and comply with government requirements for guarding data and reporting incidents. Progent can provide a selection of service delivery modes:

  • On-demand remote and on-premises assistance invoiced to the nearest minute
  • On-going fully managed services billed at a low fixed monthly rate
  • Value-priced service bundles for a single security and compliance evaluation
On-demand Security and Compliance Support Services
Once you register for Progent's services (registration is free), you can receive as-needed remote or on-premises assistance from a Progent security consultant. This traditional support model is primarily reactive and geared toward quickly taking care of technical issues that are disrupting your network or that are beyond the scope of your own support personnel. Common scenarios are debugging a firewall or VPN tunnel, implementing a critical security patch for a Cisco switch or router, designing compliant access to a public cloud, or restoring data after a ransomware attack. These security services are billed by the minute, which avoids the annoying situation of receiving big bills for fast fixes.

Delivery options for Progent's on-demand support services include:

  • Remote Security Support
    Most security-related problems can be resolved remotely through a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver online security help by offering efficient access to consultants with the background and technical resources to fix some of the most challenging issues quickly, making your service costs low and minimizing lost productivity.
  • Onsite Security Support
    For cases where onsite assistance is required, Progent can send a technical professional to major cities throughout the United States. Progent can also send a security specialist with high-level certifications and advanced skills to any site in the U.S.
Progent's accredited engineers are certified to support systems based on Microsoft Windows, Linux, Mac, Sun Solaris, and major derivatives of UNIX. Progent's broad array of services covers firewall expertise, email and messaging security, protected network design, and data restoration. Progent's technical support team has earned the industry's top security credentials including Certified Information Security Manager and Information System Security Architecture Professional (ISSAP). Progent also offers immediate access to remote Cisco-certified CCIE network consultants who can provide world-class assistance with complex network configuration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis tools to defend endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to automate the entire malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, device control, and web filtering via leading-edge tools incorporated within a single agent accessible from a unified control. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and enables fast recovery of vital files, apps and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Read more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security companies to deliver centralized management and comprehensive protection for all your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized organizations to map, monitor, optimize and troubleshoot their networking hardware like routers and switches, firewalls, and load balancers as well as servers, printers, endpoints and other devices. Using cutting-edge RMM technology, WAN Watch ensures that network diagrams are kept updated, copies and manages the configuration information of almost all devices connected to your network, monitors performance, and generates alerts when problems are detected. By automating tedious network management processes, ProSight WAN Watch can knock hours off common tasks such as making network diagrams, reconfiguring your network, finding appliances that need important software patches, or isolating performance problems. Learn more details about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management technology to keep your network operating at peak levels by tracking the state of vital computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted automatically to your specified IT staff and your assigned Progent consultant so that all potential problems can be resolved before they have a chance to impact your network Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported immediately to a different hardware environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect information about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By updating and organizing your network documentation, you can eliminate up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable way for small and mid-size organizations to get an unbiased evaluation of the overall health of their network. Based on a selection of the top remote monitoring and management (RMM) platforms available, and supervised by Progent's world-class group of information technology professionals, ProSight Network Audits help you see how well the configuration of your core network devices conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide immediate ROI such as a cleaner Active Directory environment. Both versions also come with a year of state-of-the-art remote network monitoring and management (RMM). Benefits can include simpler management, improved compliance with information security requirements, more efficient utilization of network resources, faster problem resolution, more dependable backup and restore, and less downtime. Read more about ProSight Network Audits network infrastructure review.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service built around a brief interview with a Progent information assurance consultant. The fact-finding interview is designed to help assess your organization's ability to block or recover rapidly following an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you directly to collect information concerning your existing security profile and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow best practices to create a cost-effective AV and backup environment that aligns with your company's requirements. For details, refer to The ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Verification Packages
Progent offers a variety of fixed-price security and compliance evaluation packages that deliver exceptional value by utilizing Progent's advanced network monitoring software plus Progent's technical experience to produce an objective and comprehensive evaluation of your IT environment security profile.

  • Security Assessment Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory scanning service packages intended to allow small businesses to obtain a professional security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your network from beyond your corporate firewall to determine possible gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan from an authorized machine within your company firewall to assess your vulnerability to internal assaults. The two security inventory scans are set up and run from a secured external site. The scan is administered by an engineer who has been awarded high-level security certifications and who creates a report that describes and interprets the information collected by the security scan and suggests various improvements where appropriate.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent offers three levels of flat-rate security evaluation service packages designed for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security evaluation service packages offer larger businesses a chance to get an objective look at the viability of their security profile. For every security assessment bundle, Progent consultants with advanced security credentials analyze and report on collected data and provide recommendations for efficient remediation. Each of the network security audit bundles include an added-cost option for onsite consultants at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is a critical tool for allowing organizations to determine how vulnerable their IT systems are to current-generation attacks. Progent's stealth penetration testing services test how effectively your corporate security procedures and technologies resist authorized but unannounced penetration attempts launched by Progent's experienced security experts utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your business is now experiencing a network security crisis and you have not prepared a detailed response procedure, go to Progent's Remote Computer Help to learn how to receive immediate assistance. Progent provides remote assistance from skilled engineers and can escalate trouble tickets to certified security specialists if required. Your organization does not need to be a current Progent client to receive emergency help for a security breakdown, but you can sign up as a Progent customer in advance at no cost and your status as a current customer can save precious time during a crisis.

Typically, smaller companies have no recovery plan in the event of a successful security breach. This is risky, because the cost of a serious security attack can be even more devastating for a small business than for a big corporation. Progent's security consultants can help your business to design a practical recovery and event reporting procedure that reduces the IT system disruption resulting from an attack. The formal incident response model promoted by GIAC (Global Information Assurance Certification) is Progent's recommended method for handling a serious security penetration.

Advanced Security Services Available from Progent
Progent's certified engineers offer specialized help in key facets of computer security such as:

  • Information Risk Evaluation and Compliance Testing
    Progent offers experience with information risk auditing tools like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive system tests to uncover possible security holes. Progent has extensive experience with these tools and can assist your company to understand audit results and react efficiently. Progent's certified security engineers also can perform web software validation and can perform thorough assessments of corporate-wide security to confirm your organization's compliance with major industry security specifications including FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security including fixed wireless appliances plus mobile handsets. Get additional details about Progent's Security Vulnerability Audits and Compliance Testing.
  • Planning, Implementing, and Testing Secure Networks
    Any business ought to have a carefully considered security strategy that incorporates both preventive and responsive elements. The pre-attack plan is a collection of steps that helps to minimize security holes. The post-attack strategy defines procedures to help IT personnel to evaluate the losses caused by an attack, repair the damage, record the experience, and restore network activity as soon as feasible. Progent can show you how to build security into your business processes, configure scanning software, define and build a safe IT architecture, and recommend processes and policies to optimize the protection of your computing environment. Progent's security experts are ready to assist you to set up a firewall, design protected offsite connectivity to email and files, and configure an efficient VPN. If you are looking for an economical option for jobbing out your network security administration, Progent's 24x7 Network Support Services feature automated remote network monitoring and fast response to emergencies.
  • System Restoration and Failure Analysis
    Progent has skill in restoring networks and computers that have been compromised, are in question, or have failed as a result of a security breakdown. Progent can help assess the damage resulting from the assault, restore normal business operations, and recover information lost owing to the breach. Progent's security specialists can also oversee a comprehensive failure analysis by going over activity logs and using a variety of advanced forensics techniques. Progent's background with security consulting minimizes your business disruption and allows Progent to propose efficient strategies to avoid or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security EngineersThe latest generation of ASA 5500-X Family of firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
  • Additional Firewall and VPN Solutions
    As well as being expert in a wide array of network security solutions available from Microsoft and Cisco, Progent offers small and mid-size companies top-level engineering services for solutions from other major firewall and Virtual Private Network vendors such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are designed to interpret the massive quantity of information collected in security event records created by a wide range of sources including network appliances, operating systems, and application software and tools. SIEM applications organizes the security logs from these diverse sources and produces consolidated reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified network security consultants and Cisco CCIE certified network experts can help organizations to plan, install and manage a SIEM system that helps them to understand the behavior of attacks and comply with event reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Accreditations
Progent's security specialists have been awarded some of the most respected certifications available in the industry. All of these accreditations demand exhaustive examinations and proven work background to guarantee that recipients have mastered a substantial amount of security information and methodologies and can offer high-level security solutions to information environments of any size.
  • CISM Security Consulting Expertise
    Certified Information Security Manager identifies the core skills and worldwide standards of performance that computer security managers are expected to master. It offers executive management the confidence that those who have earned their certification have the background and skill to offer effective security management and engineering services. Progent can provide a CISM-certified expert to help your enterprise in key security disciplines such as data security governance, vulnerability management, data security process control, and crisis handling management. Read additional information concerning Progent's Certified Information Security Manager Security Consulting Services.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's CISSP experts are security engineers who have been awarded CISSP accreditation as a result of demonstrated experience, rigorous study, and exhaustive examination. CISSP Certification recognizes mastery of an international standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management practices, security design and test systems, connection permission systems, software development security, operations security, hardware security, cryptography, communications, Internet security, and business continuity planning. Find out more information concerning Progent's CISSP Consulting Services.

  • CISSP-ISSAP} Security Architecture Consulting Support Services
    Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have earned ISSAP status after thorough examination and significant hands-on work with information security architecture. ISSAP security experts possess in-depth understanding of access control mechanisms and techniques, telecommunications and network infrastructure security, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-premier security experts can help your company with all phases of secure network architecture. Read more details about Progent's ISSAP Certified Protected System Infrastructure Consulting Assistance.

  • CISA Consulting Expertise
    The CISA credential is a prestigious qualification that signifies expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo an exhaustive examination given by the ISACA international professional group. Progent offers the expertise of a CISA-Premier security consultant trained to help companies in the areas of IS audit services, information technology enforcement, network assets and architecture planned useful life, information technology service delivery, protecting data assets, and business continuity preparedness. Learn more details concerning Progent's Certified Information Systems Auditor Professional Services.

  • CRISC IT Risk Management Consultants
    The CRISC program was initiated by ISACA to verify a consultant's skills to design, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's risk mitigation expertise is a good fit the support available from Progent's CISA-Certified security engineers for objectively assessing your IT management design and also with the services of Progent's CISM consultants for implementing company-wide security policies. Learn the details about Progent's CRISC IT Risk Management Consulting.

  • GIAC (Global Information Assurance Certification) Support Expertise
    GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security engineers. GIAC's goal is to ensure that a certified security consultant possesses the skills needed to deliver support in critical areas of system, data, and application security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. NSA. Progent can provide the support of certified security engineers for all of the network security capabilities covered under GIAC certification programs including assessing security systems, security incident response, intrusion detection, and web-based application security. Find out more information about Progent's GIAC (Global Information Assurance Certification) Professional Expertise.
Contact Progent for Computer Security Support
If you need computer security support services, telephone Progent at 800-993-9400 or go to Contact Progent.