Overview of Progent's Security Consulting Services
Progent's industry certified computer security and compliance experts can provide a wide selection of services designed to help businesses of all sizes to identify and correct security weaknesses, block malicious attacks, remediate the problems resulting from a breach of protection, and meet regulatory requirements for protecting data and reporting incidents. Progent offers a choice of service modes:
On-demand Security Consulting Services
- On-demand remote and on-premises support billed to the nearest minute
- On-going managed services invoiced at a low fixed monthly fee
- Set-price service bundles for a single security assessment
Once you sign up for Progent's services (signing up is free), you can receive on-demand online or onsite assistance from a Progent security and compliance consultant. This classic support model is primarily reactive and geared toward quickly taking care of technical problems that are affecting your network or that have stumped your own support staff. Common examples are replacing a firewall or VPN connection, installing a vital security patch for a Cisco switch or router, designing secure access to a public cloud, or recovering from a ransomware attack. These security services are billed by the minute, which eliminates the frustrating situation of receiving large bills for quick repairs.
Delivery options for Progent's on-demand support services include:
Progent's accredited engineers are premier to provide help for environments based on Windows, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's wide array of services encompasses firewall configuration, email and messaging systems, protected system design, and data recovery. Progent's support staff has been awarded the industry's top security accreditations including GIAC and Certified Information Systems Security Professional (CISSP). Progent also offers fast access to remote Cisco-certified CCIE network infrastructure consultants who can deliver world-class support with complex network technology problems.
- Online Security Support Services
The majority security problems can be handled online through a combination of phone help and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide online security help by offering efficient access to consultants with the background and resources to resolve many of the most challenging problems quickly, making your support costs low and minimizing downtime.
- Onsite Security Support Services
For cases where onsite assistance is required, Progent can send a technical expert to major cities throughout the U.S. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any location in the U.S.
ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and email phishing, which easily escape traditional signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to manage the entire threat progression including protection, infiltration detection, containment, cleanup, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth protection for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device control, and web filtering through cutting-edge tools packaged within one agent accessible from a single console. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that addresses your company's specific needs and that allows you demonstrate compliance with legal and industry information protection regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for immediate attention. Progent can also help you to install and test a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup processes and allows rapid recovery of critical data, apps and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to configure ProSight DPS to be compliant with regulatory requirements such as HIPPA, FINRA, and PCI and, when necessary, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security vendors to deliver centralized control and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to diagram, monitor, reconfigure and troubleshoot their connectivity appliances such as routers, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that network diagrams are always updated, copies and manages the configuration of almost all devices connected to your network, monitors performance, and sends notices when problems are discovered. By automating tedious network management activities, WAN Watch can cut hours off common tasks like making network diagrams, expanding your network, finding devices that require critical updates, or isolating performance problems. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to help keep your network running at peak levels by checking the health of critical computers that power your business network. When ProSight LAN Watch detects an issue, an alert is transmitted automatically to your specified IT management personnel and your assigned Progent consultant so that any potential problems can be addressed before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hosting environment without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard data related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and affordable alternative for small and mid-size businesses to get an unbiased assessment of the overall health of their information system. Based on some of the leading remote monitoring and management platforms in the industry, and overseen by Progent's certified group of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential network assets adhere to best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate ROI like a more manageable Active Directory (AD) environment. Both versions also include one year of state-of-the-art remote network monitoring and management. Benefits can include easier network management, better compliance with government and industry security standards, higher utilization of network assets, faster problem resolution, more dependable backup and recovery, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure review.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service centered on a phone discussion with a Progent information assurance consultant. The fact-finding interview is designed to help assess your organization's ability either to stop or recover quickly after an assault by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to collect information concerning your existing AV defense and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can apply industry best practices to build a cost-effective AV and backup system that aligns with your company's needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Validation Bundles
Progent has put together a number of flat-rate security evaluation bundles that deliver high value by deploying Progent's advanced network monitoring software plus Progent's technical skills to produce an unbiased and comprehensive evaluation of your network security profile.
Our Network Has Been Hacked: What Can We Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two value-priced security inventory packages intended to allow small businesses to obtain an objective security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your network from beyond your firewalled perimeter to identify possible gaps in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine within your company firewall to assess your exposure to inside threats. These two security inventory scans are set up and executed from a secured external site. The project is administered by a consultant who has been awarded high-level security certifications and who produces a report that describes and evaluates the information collected by the scan and suggests various enhancements where appropriate.
- Security Vulnerability Assessment Packages for Enterprises
Progent offers three levels of set-price security evaluation service packages intended for large organizations who need to meet security standards required by state or industry regulators. Progent's security evaluation service bundles offer larger organizations a chance to obtain a professional assessment at the strength of their security profile. For every security evaluation package, Progent consultants with top security credentials study and report on collected data and offer recommendations for efficient remediation. All the network security audit packages include an added-cost option for on-premises engineers anywhere in the United States.
- Stealth Penetration Testing
Stealth penetration testing, often referred to as PEN testing, is an accepted technique for allowing organizations to find out how open their network systems are to modern attacks. Progent's stealth penetration testing services check how effectively your existing security procedures and technologies resist authorized but unannounced intrusion attempts launched by Progent's certified security experts using cutting-edge hacking techniques. Read about Progent's stealth penetration testing services.
If your company is currently experiencing a security crisis and you do not have a detailed response procedure, go to Progent's Online Network Help to see how to get immediate help. Progent offers online assistance from experienced engineers and can refer problems to certified security specialists if necessary. Your organization does not have to be a registered Progent client to receive emergency support for a security problem, but you can sign up as a Progent customer ahead of time for free and your status as a current customer can save precious time in an emergency.
Typically, smaller companies have no recovery plan in case of a damaging penetration. This is risky, since the damage from a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security specialists can assist your you to design an efficient response and incident reporting procedure that reduces the IT system disruption resulting from an attack. The step-by-step post-attack handling model promoted by Global Information Assurance Certification is Progent's recommended procedure for responding to a major security penetration.
Advanced Security Expertise Available from Progent
Progent's security engineers can provide expertise in key areas of IT protection including:
Progent's Security Certifications
- Information Risk Evaluation and Compliance Assessment
Progent provides expertise with security evaluation tools such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic system tests to identify possible security holes. Progent has extensive skills with scanning tools and can assist you to analyze audit reports and react efficiently. Progent's security engineers also provide web software testing and can perform thorough evaluation of corporate-wide security to confirm your organization's compliance with key industry security specifications including FISMA, PCI, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering fixed wireless equipment plus portable devices. Read more details about Progent's Vulnerability Audits and Compliance Testing.
- Planning, Implementing, and Testing Protected Environments
Every organization should have a thoroughly thought out security plan that incorporates both preventive and responsive activity. The proactive plan is a set of steps that works to minimize security holes. The post-attack plan defines procedures to help security personnel to assess the damage resulting from an attack, repair the damage, record the event, and revive business activity as quickly as feasible. Progent can advise you how to incorporate security into your company operations, set up scanning utilities, define and execute a safe computer infrastructure, and propose processes and policies to optimize the safety of your computing environment. Progent's security professionals are ready to assist you to configure a firewall, design protected online and mobile access to email and data, and configure an efficient virtual private network (VPN). If your company is looking for an economical option for outsourcing your security administration, Progent's Round-the-clock Network Support Packages feature non-stop online server monitoring and quick resolution of problems.
- System Recovery and Failure Analysis
Progent has skill in recovering systems and servers that have been compromised, are quarantined, or have stopped working following a security attack. Progent can help determine the damage caused by the attack, return your company to ordinary functions, and recover information lost as a result of the event. Progent's security specialists can also perform a thorough forensic evaluation by going over activity logs and using other proven forensics techniques. Progent's experience with security problems reduces your downtime and permits Progent to recommend efficient ways to avoid or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower Services configuration and troubleshooting support.
- Additional Firewall and VPN Technologies
In addition to supporting a broad range of security solutions from Microsoft and Cisco, Progent offers small and mid-size businesses top-level consulting for technologies from other important firewall and Virtual Private Network vendors such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are designed to interpret the enormous quantity of data represented by security event logs generated by a wide range of sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM applications analyzes the security event records from these diverse sources and produces summary reports of security incidents as required by state regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco-certified network consultants can help businesses to plan, deploy and operate a SIEM system that enables them to see the progress of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's security professionals have been awarded some of the most prestigious certifications available in the security industry. These accreditations require extensive testing and demonstrated work experience to guarantee that candidates have mastered a substantial amount of security information and methodologies and can offer advanced consulting to computer environments of any size.
Contact Progent for Network Security Consulting Services
- Certified Information Security Manager Security Support Services
Certified Information Security Manager (CISM) identifies the basic skills and worldwide standards of performance that IT security professionals are expected to achieve. CISM provides business management the assurance that those who have been awarded their certification have the background and skill to provide effective security management and engineering support. Progent can offer a CISM-certified expert to assist your organization in key security disciplines including data security governance, vulnerability management, information protection program management, and incident response management. Get the details about Progent's CISM Security Support Assistance.
- CISSP Security Consulting Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification as a result of verified professional work, extensive study, and formal examination. CISSP Certification indicates mastery of a worldwide standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management practices, security design and test systems, access permission methodology, software development security, operations security, physical security, cryptography, telecommunications, network security, and disaster recovery planning. Learn more details about Progent's CISSP Support Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Premier security architecture consultants have earned ISSAP accreditation as a result of rigorous examination and significant experience. field experience with information security design. ISSAP consultants have acquired comprehensive knowledge of access control systems and methodologies, phone system and network protection, cryptography, needs evaluation, BCP and DRP, and physical security integration. Progent's CISSP-ISSAP-certified security experts can help your business with all phases of secure network architecture. Read more details concerning Progent's ISSAP Accredited Protected System Architecture Consulting Services.
- CISA Professional Expertise
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that represents expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an exhaustive examination administered by the ISACA professional association. Progent can provide the expertise of a CISA-Premier security engineer trained to assist companies in the fields of IS audit services, IT governance, network assets and infrastructure lifecycle, information technology support, safeguarding data resources, and business continuity preparedness. Read more information concerning Progent's Certified Information Systems Auditor Support Assistance.
- CRISC-certified Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to plan, deploy, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity plan that follows industry best practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's risk mitigation expertise is complementary to the services provided by Progent's CISA-Premier security engineers for impartially assessing your IS control mechanisms and with the services of Progent's CISM-certified consultants for defining security policies. Find out additional details concerning Progent's CRISC-certified Network Risk Management Services.
- Global Information Assurance Certification Support Expertise
GIAC was founded in 1999 to certify the knowledge of computer security professionals. GIAC's goal is to ensure that an accredited professional possesses the knowledge appropriate to provide services in important categories of network, information, and program security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency. Progent can provide the support of certified professionals for any of the network security disciplines addressed under GIAC certification topics including assessing networks, incident response, intrusion detection, and web-based services security. Read additional details about Progent's Global Information Assurance Certification Support Assistance.
If you're looking for network security support services, phone Progent at 800-993-9400 or refer to Contact Progent.