Overview of Progent's Security Support Services
Progent's industry certified network security and compliance consultants can provide a broad range of support services designed to assist organizations of any size to identify and eliminate security vulnerabilities, defend against assaults, recover from any problems resulting from a breakdown of security, and meet government requirements for protecting information and reporting security incidents. Progent can provide a choice of service models:

  • As-needed remote and on-premises assistance billed to the nearest minute
  • Continual managed services billed at a low fixed monthly rate
  • Value-priced service bundles for a one-time security evaluation
On-demand Security Consulting Services
Once you sign up for Progent's services (signing up is free), you can receive as-needed remote or on-premises assistance from one of Progent security and compliance consultant. This classic service model is essentially reactive and geared toward rapidly taking care of technical problems that are impacting your network or that are beyond the scope of your in-house support staff. Typical scenarios are replacing a firewall appliance or VPN connection, installing a critical security update for a Cisco switch or router, designing compliant access to a public cloud, or recovering from a ransomware assault. These security services are billed to the nearest minute, which avoids the frustrating situation of getting large bills for fast fixes.

Delivery options for Progent's on-demand support services include:

  • Online Security Services
    The majority security problems can be handled online through a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide online security help by offering efficient access to consultants who have the background and resources to fix many of the most difficult issues quickly, keeping your support expenses affordable and minimizing lost productivity.
  • On-premises Security Support Services
    For cases where onsite support is necessary, Progent can dispatch a technical professional to major cities across the U.S. Progent can also send a security consultant with high-level certifications and advanced skills to any location in the country.
Progent's accredited security consultants are certified to provide help for environments powered by Microsoft Windows, Linux, Mac, Solaris, and major versions of UNIX. Progent's wide selection of services addresses firewall expertise, e-mail security, protected network design, and data restoration. Progent's support staff has earned the world's most advanced security certifications including CISA and Information System Security Architecture Professional (ISSAP). Progent also offers fast access to remote Cisco CCIE network consultants who can provide advanced support with tough network configuration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to guard endpoints and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely evade legacy signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to automate the complete malware attack progression including protection, detection, containment, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Endpoint Security
    ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, device management, and web filtering via cutting-edge tools packaged within one agent managed from a single control. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent can also assist you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and enables fast recovery of vital files, applications and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to deliver centralized control and comprehensive protection for your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of analysis for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized organizations to map out, monitor, reconfigure and troubleshoot their networking hardware such as routers and switches, firewalls, and access points plus servers, printers, client computers and other devices. Using cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that network diagrams are always current, copies and manages the configuration of almost all devices connected to your network, monitors performance, and generates alerts when potential issues are discovered. By automating tedious management and troubleshooting activities, WAN Watch can knock hours off common tasks like making network diagrams, expanding your network, finding appliances that require important software patches, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management technology to help keep your network operating efficiently by tracking the state of critical computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alarm is sent immediately to your designated IT staff and your Progent consultant so all looming issues can be addressed before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hosting environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard information related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size organizations to get an unbiased assessment of the overall health of their network. Based on some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's world-class group of information technology experts, ProSight Network Audits show you how closely the configuration of your core network devices adhere to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant ROI like a more manageable Active Directory (AD) environment. Both also include a year of cutting-edge remote network monitoring and management (RMM). Advantages can include simpler management, improved compliance with government and industry security standards, more efficient utilization of network assets, quicker problem resolution, more reliable backup and recovery, and less downtime. Learn more about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service centered on a brief phone interview with a Progent backup/recovery expert. The fact-finding interview is designed to assess your company's ability to stop or recover quickly following an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you directly to collect information about your current antivirus tools and backup platform, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can follow industry best practices to create an efficient security and backup/recovery environment that meets your company's requirements. For details, see Progent's ProSight Ransomware Preparedness Report Service.

Flat-rate Security Evaluation and Validation Bundles
Progent has put together a variety of flat-rate security assessment packages that deliver exceptional value by deploying Progent's advanced system monitoring tools plus Progent's technical skills to create an objective and thorough assessment of your IT environment security profile.

  • Security Inventory Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory scanning service packages designed to allow small businesses to get an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your IT system from beyond your firewalled perimeter to determine potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan using an authorized computer within your corporate firewall to evaluate your vulnerability to inside attacks. These two security inventory services are configured and run from a secured offsite location. The scan is administered by an engineer who has been awarded high-level security certifications and who produces a report that details and evaluates the information collected by the scan and suggests practical enhancements where appropriate.
  • Security Vulnerability Evaluation Bundles for Large Organizations
    Progent has developed three levels of fixed-price security evaluation service bundles designed for enterprises who want to meet security standards required by government or industry agencies. Progent's security assessment service bundles offer enterprises a chance to get an objective look at the strength of their security profile. For each security evaluation package, Progent engineers with top security credentials analyze and report on collected data and provide recommendations for efficient improvements. Each of the network security assessment bundles include an extra-cost option for onsite consultants anywhere in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, commonly called PEN testing, is an accepted tool for helping businesses to determine how open their network systems are to current-generation threats. Progent's stealth penetration testing services check how effectively your existing security procedures and technologies resist authorized but unannounced intrusion attempts managed by Progent's certified security specialists using advanced hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Do We Do?
Network Security ConsultantsIf your business is currently experiencing a security crisis and you have no detailed response plan, refer to Progent's Online Network Support to see how to receive fast assistance. Progent provides remote technical support from skilled engineers and can escalate problems to high-level security experts if required. Your organization does not need to be a current Progent customer to get urgent support for a security breach, but you can sign up as a Progent customer in advance at no cost and your status as a current customer can save valuable time in a crisis.

Typically, smaller organizations have not documented a recovery procedure in the event of a successful attack. This is not good, since the damage from a successful security assault can be more catastrophic for a small company than for a large enterprise. Progent's security consultants can help your you to create a practical response and incident reporting procedure that reduces the network downtime following an attack. The step-by-step post-attack handling procedure outlined by Global Information Assurance Certification is Progent's preferred procedure for reacting to a serious security penetration.

High-value Security Expertise Available from Progent
Progent's certified engineers offer expertise in vital areas of IT security such as:

  • Security Vulnerability Audits and Security Compliance Testing
    Progent offers expertise with security auditing utilities like MS Baseline Security Analyzer and LANguard for conducting a variety of comprehensive network tests to identify possible security holes. Progent has broad skills with scanning utilities and can help your company to analyze audit reports and respond efficiently. Progent's certified security engineers also offer web application testing and can conduct thorough assessments of corporate-wide security to determine your organization's compliance with key industry security standards including FISMA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless security covering fixed wireless appliances plus mobile handsets. Read more information about Progent's Information Risk Audits and Security Compliance Assessment.
  • Planning, Building, and Validating Protected Environments
    Any organization should develop a thoroughly thought out security strategy that incorporates both preventive and reactive elements. The pre-attack strategy is a set of precautions that helps to reduce vulnerabilities. The reactive plan defines activities to help IT staff to assess the damage caused by a breach, repair the damage, record the event, and restore business functions as soon as feasible. Progent can show you how to design security into your company operations, set up scanning software, define and execute a safe network infrastructure, and recommend processes and policies to enhance the protection of your network. Progent's security professionals are ready to help you to configure a firewall, deploy safe offsite access to email and data, and configure an efficient VPN. If you are looking for an affordable way for outsourcing your network security management, Progent's Round-the-clock Monitoring Options include automated online network monitoring and quick response to emergencies.
  • Data Restoration and Security Forensics
    Progent offers skill in recovering networks and servers that have been compromised, are suspect, or have ceased to function as a result of a security attack. Progent can help assess the damage resulting from the attack, return your company to ordinary functions, and recover information compromised owing to the breach. Progent's security specialists can also manage a thorough failure analysis by going over event logs and utilizing other proven assessment techniques. Progent's background with security consulting minimizes your off-air time and allows Progent to suggest effective strategies to avoid or contain new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco CCIE Security ExpertsThe current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
  • Other Firewall and Virtual Private Network Technologies
    As well as supporting a wide range of network security technologies from Microsoft and Cisco, Progent can provide small businesses expert engineering services for security products from other major firewall and Virtual Private Network (VPN) vendors such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are designed to digest the massive amounts of data represented by security event records generated by multiple sources such as network infrastructure appliances, servers, and applications and monitoring tools. SIEM software organizes the security logs from these diverse sources and creates summary reports of security incidents as mandated by state regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network consultants can assist organizations to plan, install and manage a SIEM solution that helps them to understand the behavior of attacks and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security engineers have earned some of the most prestigious certifications available in the security industry. All of these accreditations demand extensive testing and proven work experience to ensure that candidates have mastered a significant body of security information and techniques and can provide advanced solutions to computer environments of any size.
  • Certified Information Security Manager Security Consulting Services
    Certified Information Security Manager identifies the core competencies and worldwide standards of service that information technology security professionals are required to master. CISM offers business management the assurance that consultants who have earned their accreditation have the background and knowledge to provide efficient security administration and engineering services. Progent can offer a CISM-certified expert to help your organization in key security areas including data protection governance, vulnerability management, information security program management, and crisis response management. Learn additional details concerning Progent's Certified Information Security Manager Security Support Expertise.

  • CISSP Security Support Services
    Progent's CISSP consultants are security engineers who have been awarded CISSP status as a result of verified experience, extensive study, and exhaustive examination. CISSP Certification indicates expertise in a worldwide standard for IT security. ANSI has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management procedures, security design and test systems, access permission methodology, software development security, operations security, hardware security, cryptography, communications, Internet security, and disaster recovery planning. Read additional details about Progent's CISSP Consulting Assistance.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support
    Progent's CISSP-ISSAP Certified cybersecurity architecture experts have earned ISSAP certification after rigorous testing and extensive experience. field experience with information security architecture. ISSAP consultants possess in-depth knowledge of access control mechanisms and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security specialists can assist your company with all phases of secure network architecture. Read more information concerning Progent's ISSAP Certified Secure System Architecture Consulting Assistance.

  • CISA Professional Expertise
    The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that represents expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination given by the ISACA international professional association. Progent offers the services of a CISA-Certified security audit engineer trained to help companies in the fields of information systems audit services, information technology governance, network assets and infrastructure lifecycle, information technology support, protecting data resources, and disaster recovery planning. Read additional information concerning Progent's Certified Information Systems Auditor Support Assistance.

  • CRISC-certified IT Risk Management Specialists
    The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, deploy, and support information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's risk management services are complementary to the services provided by Progent's CISA-Certified security engineers for objectively assessing your IT control mechanisms and with the services of Progent's CISM consultants for designing security policies and procedures. Find out additional details concerning Progent's CRISC-certified Network Risk Management Support.

  • Global Information Assurance Certification Professional Expertise
    Global Information Assurance Certification was established in 1999 to certify the skill of IT security professionals. GIAC's mission is to assure that a certified security consultant has the knowledge needed to provide support in important areas of network, information, and program security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States National Security Agency (NSA). Progent offers the support of certified consultants for any of the network security services covered within GIAC accreditation programs such as assessing security systems, security incident response, intrusion detection, and web-based services security. Get additional details concerning Progent's GIAC (Global Information Assurance Certification) Support Assistance.
Depend on Progent for Computer Security Expertise
If you're looking for network security support services, call Progent at 800-993-9400 or see Contact Progent.