Overview of Progent's Security and Compliance Support Services
Progent's industry certified network security consultants can provide a wide range of services designed to help companies of all sizes to detect and eliminate security weaknesses, defend against malicious attacks, remediate any damage resulting from a breakdown of protection, and meet government mandates for guarding information and reporting incidents. Progent can provide a choice of service modes:
On-demand Security and Compliance Support Services
- As-needed remote and on-premises assistance billed by the minute
- On-going managed services billed at an affordable flat monthly rate
- Value-priced service packages for a one-time security and compliance evaluation
After you register for Progent's services (signing up is free), you can get as-needed remote or onsite support from a Progent security and compliance consultant. This traditional service model is essentially reactive and optimized for rapidly taking care of IT issues that are disrupting your productivity or that have stymied your in-house support personnel. Common scenarios include debugging a firewall appliance or VPN connection, implementing a critical security update for a Cisco switch or router, designing secure access to a public cloud, or recovering from a ransomware attack. These security services are billed by the minute, which eliminates the frustrating situation of receiving large invoices for quick fixes.
Delivery alternatives for Progent's as-needed support services include:
Progent's accredited consultants are premier to provide help for environments based on Microsoft, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's wide range of consulting services covers firewall technology, e-mail security, protected system architecture, and information recovery. Progent's technical support team has been awarded the industry's top security certifications including Certified Information Systems Auditor and Information System Security Architecture Professional (ISSAP). Progent also offers fast access to remote Cisco CCIE network infrastructure engineers who can provide world-class assistance with complex network technology problems.
- Remote Security Support
Most security-related problems can be resolved remotely through a mix of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can deliver online security support by offering efficient access to consultants with the experience and technical resources to fix some of the most difficult issues quickly, keeping your service costs low and minimizing lost productivity.
- On-premises Security Support
For instances where onsite support is required, Progent can dispatch a technical expert to major metropolitan areas across the United States. Progent can also send a security consultant with high-level certifications and world-class skills to any site in the U.S.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based machine learning tools to guard endpoints and servers and VMs against new malware assaults such as ransomware and email phishing, which easily evade legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to manage the entire threat progression including filtering, infiltration detection, mitigation, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer ultra-affordable multi-layer security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge tools packaged within a single agent accessible from a unified console. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP deployment that addresses your organization's specific requirements and that allows you demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also assist your company to install and verify a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of vital data, apps and virtual machines that have become lost or damaged due to component breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical information. Learn more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to provide centralized management and comprehensive protection for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map, track, enhance and troubleshoot their connectivity hardware like routers and switches, firewalls, and wireless controllers plus servers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch makes sure that network maps are kept updated, copies and displays the configuration information of almost all devices on your network, monitors performance, and sends alerts when problems are detected. By automating time-consuming network management processes, WAN Watch can knock hours off ordinary tasks like network mapping, reconfiguring your network, locating devices that require important updates, or identifying the cause of performance bottlenecks. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management techniques to keep your network operating efficiently by checking the state of vital assets that power your business network. When ProSight LAN Watch detects an issue, an alarm is transmitted immediately to your specified IT management staff and your Progent consultant so any potential problems can be addressed before they can impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hosting environment without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect data about your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and affordable alternative for small and mid-size businesses to obtain an objective assessment of the health of their IT system. Based on a selection of the leading remote monitoring and management platforms in the industry, and supervised by Progent's certified team of IT professionals, ProSight Network Audits help you see how well the configuration of your essential infrastructure devices conform to industry best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate benefits like a more manageable Active Directory (AD) environment. Both versions also come with one year of advanced remote network monitoring and management. Benefits can include simpler management, better compliance with government and industry security standards, higher utilization of IT resources, quicker problem resolution, more dependable backup and restore, and higher availability. See more about ProSight Network Audits network infrastructure review.
The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a phone discussion with a Progent information assurance consultant. The fact-finding interview is intended to help assess your company's ability either to stop or recover quickly following an assault by a ransomware strain like Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you personally to collect information about your existing antivirus tools and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow best practices to deploy an efficient security and backup/recovery environment that aligns with your business requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Flat-rate Security Evaluation and Validation Packages
Progent offers a portfolio of fixed-price security assessment packages that deliver high value by deploying Progent's advanced network monitoring tools plus Progent's consulting skills to create an unbiased and comprehensive evaluation of your IT environment security profile.
Our Network Has Been Hacked: What Can We Do?
- Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to allow small businesses to obtain an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your IT system from outside your corporate firewall to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security expert executes a network scan using an authorized machine inside your firewalled perimeter to evaluate your vulnerability to internal assaults. These two security inventory scanning services are set up and executed from a secured external site. The scan is managed by a consultant who has been awarded high-level security certifications and who produces a report that describes and evaluates the data captured by the security scan and suggests various improvements where appropriate.
- Security Vulnerability Assessment Packages for Enterprises
Progent has developed three levels of flat-rate security evaluation service packages intended for large organizations who want to meet compliance standards required by state or industry regulators. Progent's security evaluation service packages offer larger businesses a chance to get a professional look at the viability of their security profile. For every security evaluation package, Progent engineers with advanced security credentials analyze and report on captured data and offer recommendations for cost-effective improvements. Each of the network security audit packages include an extra-cost option for on-premises engineers anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, commonly called PEN testing, is an accepted technique for helping organizations to determine how open their network environments are to current-generation attacks. Progent's stealth penetration testing services check how well your existing security policies and technologies resist authorized but unannounced intrusion attempts launched by Progent's experienced security experts using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
If your company is now fighting a security emergency and you have no formal recovery plan, visit Progent's Online Computer Support to learn how to get fast assistance. Progent provides online technical support from experienced engineers and can escalate problems to high-level security specialists if required. Your organization does not need to be a current Progent customer to receive urgent help for a security breach, but you can register as a Progent client ahead of time at no cost and your status as a registered customer could save precious time when there is an emergency.
Typically, smaller businesses have no recovery plan in the event of a successful security breach. This is not good, because the cost of a serious security attack can be more devastating for a small company than for a large corporation. Progent's security engineers can assist your business to create an efficient recovery and event reporting procedure that reduces the network downtime following a security breach. The step-by-step incident response model promoted by GIAC (Global Information Assurance Certification) is Progent's recommended method for reacting to a major security incident.
High-value Security Expertise Available from Progent
Progent's veteran engineers offer world-class consulting in key facets of IT security including:
Progent's Security Accreditations
- Information Risk Evaluation and Security Compliance Assessment
Progent provides expertise with information risk auditing utilities such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive network tests to uncover potential security problems. Progent has broad skills with these tools and can assist you to analyze audit reports and react efficiently. Progent's security consultants also provide web application validation and can perform thorough evaluation of enterprise-wide security to determine your company's compliance with key worldwide security standards such as FISMA, PCI, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection covering fixed wireless equipment as well as portable devices. Learn additional details concerning Progent's Security Vulnerability Audits and Security Compliance Assessment.
- Designing, Implementing, and Validating Protected Networks
Every organization ought to have a carefully considered security strategy that incorporates both proactive and reactive steps. The proactive plan is a set of steps that helps to reduce vulnerabilities. The reactive plan specifies procedures to assist security staff to inventory the damage resulting from an attack, repair the damage, document the experience, and restore network functions as quickly as possible. Progent can show you how to incorporate security into your business processes, configure auditing utilities, create and execute a secure network architecture, and recommend procedures and policies that will enhance the protection of your information system. Progent's security professionals are available to help you to configure a firewall, deploy safe online and mobile connectivity to e-mail and files, and install an efficient VPN. If you are looking for an affordable option for jobbing out your security administration, Progent's Round-the-clock Monitoring Packages feature automated online system tracking and fast resolution of emergencies.
- System Restoration and Security Forensics
Progent provides expertise in restoring systems and computers that have been hacked, are in question, or have ceased to function as a result of a security breakdown. Progent can show you how to evaluate the losses caused by the assault, restore ordinary business operations, and recover data lost owing to the event. Progent's security specialists can also manage a thorough forensic evaluation by examining activity logs and using other advanced forensics tools. Progent's background with security consulting reduces your downtime and allows Progent to suggest efficient ways to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, tune, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.
- Additional Firewall and Virtual Private Network (VPN) Technologies
In addition to being expert in a wide range of network security technologies from Microsoft and Cisco, Progent can provide small and mid-size businesses expert engineering services for technologies from other major firewall and Virtual Private Network suppliers such as:
- SIEM Solutions
Security information and event management (SIEM) software and services are designed to make sense the massive amounts of information represented by security event logs generated by multiple sources such as network infrastructure appliances, servers, and applications and tools. SIEM software organizes the security event records from these various sources and produces consolidated reports of security incidents as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network experts can help organizations to design, deploy and manage a SIEM solution that enables them to see the progress of attacks and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's security professionals have been awarded some of the most prestigious certifications available in the industry. All of these accreditations require extensive examinations and proven field experience to guarantee that recipients have acquired expertise with a substantial body of security information and methodologies and can provide high-level consulting to information environments of any size.
Get in Touch with Progent for Network Security Support
- CISM Security Consulting Expertise
CISM identifies the core competencies and international benchmarks of service that information technology security professionals are required to master. CISM provides business management the assurance that those who have earned their certification have the experience and skill to provide effective security administration and consulting services. Progent can offer a CISM support professional to help your organization in key security areas such as data protection governance, risk management, data security program control, and incident handling support. Learn additional details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
- CISSP Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP accreditation through demonstrated professional work, rigorous study, and exhaustive testing. CISSP qualification recognizes mastery of a worldwide standard for IT security. ANSI has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security administration practices, security design and models, connection control methodology, software development security, operations security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Read additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support
Progent's CISSP-ISSAP Certified security architecture consultants have been awarded ISSAP accreditation following thorough testing and extensive hands-on work with information security design. ISSAP consultants have acquired in-depth understanding of access control systems and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-premier security experts can help your company with all phases of architecture security. Learn more details concerning Progent's ISSAP Accredited Protected IT Infrastructure Consulting Assistance.
- Certified Information Systems Auditor (CISA) Support Services
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that represents mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass an extensive examination administered by the ISACA professional group. Progent can provide the services of a CISA-Premier security audit consultant able to assist businesses in the fields of IS audit process, IT governance, network assets and infrastructure planned useful life, IT support, safeguarding data resources, and business continuity preparedness. Read the details about Progent's CISA Support Assistance.
- CRISC IT Risk Management Experts
The CRISC certification program was initiated by ISACA to verify a consultant's ability to plan, implement, and maintain IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and carry out a business continuity plan that follows leading practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's risk mitigation expertise is complementary to the support provided by Progent's CISA-Premier consultants for impartially auditing your IS control mechanisms and also with the services of Progent's CISM-certified experts for defining security policies and procedures. Learn more information concerning Progent's CRISC-certified Network Risk Management Support.
- GIAC Professional Services
GIAC was founded in 1999 to certify the skill of information technology security engineers. GIAC's mission is to assure that a certified professional possesses the skills appropriate to provide services in important categories of system, information, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent can provide the help of certified consultants for any of the network security services addressed under GIAC certification topics including assessing perimeters, security incident handling, traffic analysis, and web application security. Get more information about Progent's GIAC Support Assistance.
If you need network security support services, telephone Progent at 800-993-9400 or refer to Contact Progent.