Overview of Progent's Security Consulting Services
Progent's industry certified network security consultants offer a wide range of support services designed to help organizations of all sizes to detect and correct security weaknesses, defend against malicious attacks, recover from the damage caused by a breakdown of security, and comply with regulatory mandates for guarding data and reporting incidents. Progent can provide a selection of service delivery modes:
As-needed Security Support Services
- On-demand remote and on-premises support invoiced to the nearest minute
- On-going fully managed services billed at a low flat monthly fee
- Value-priced service packages for a one-time security and compliance assessment
After you sign up for Progent's services (registration is free), you can receive as-needed remote or onsite assistance from a Progent security expert. This traditional support model is primarily reactive and optimized for quickly resolving technical issues that are disrupting your network or that have stumped your in-house support staff. Typical examples include configuring a firewall or VPN connection, installing a vital security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or restoring data after a ransomware assault. These security services are billed to the nearest minute, which avoids the annoying situation of getting large invoices for fast repairs.
Delivery alternatives for Progent's as-needed support include:
Progent's security consultants are premier to support systems powered by Microsoft, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's broad array of services encompasses firewall technology, e-mail systems, protected network design, and information recovery. Progent's technical support staff has earned the world's top security credentials including GIAC and ISSAP. Progent also can provide immediate access to remote Cisco-certified CCIE network infrastructure engineers who can deliver world-class support with tough network technology problems.
- Remote Security Support Services
Most security-related issues can be resolved remotely via a mix of phone help and a remote connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can deliver remote security help by offering efficient access to consultants with the background and resources to resolve many of the most difficult issues quickly, making your support expenses affordable and reducing downtime.
- On-premises Security Services
For cases where onsite support is required, Progent can send a technical expert to major cities throughout the United States. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis technology to defend endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to manage the entire threat lifecycle including blocking, detection, containment, cleanup, and forensics. Key capabilities include one-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer affordable in-depth security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge tools packaged within a single agent managed from a unified control. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry data protection regulations. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical data, applications and VMs that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical data. Learn more about ProSight DPS Managed Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to provide centralized management and world-class protection for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for smaller organizations to map out, track, optimize and debug their networking hardware such as routers and switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch makes sure that infrastructure topology diagrams are always updated, captures and manages the configuration information of virtually all devices on your network, tracks performance, and sends alerts when problems are detected. By automating complex management processes, ProSight WAN Watch can knock hours off common tasks like making network diagrams, expanding your network, finding devices that require important updates, or identifying the cause of performance issues. Learn more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management techniques to help keep your network operating at peak levels by checking the state of critical computers that power your information system. When ProSight LAN Watch detects an issue, an alert is sent automatically to your designated IT staff and your assigned Progent engineering consultant so all potential issues can be addressed before they have a chance to impact productivity Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about impending expirations of SSLs or domains. By cleaning up and managing your network documentation, you can save as much as half of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Find out more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size businesses to obtain an objective assessment of the overall health of their information system. Based on some of the top remote monitoring and management tools available, and supervised by Progent's certified team of IT professionals, ProSight Network Audits show you how closely the deployment of your essential infrastructure devices conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide instant benefits like a more manageable Active Directory (AD) environment. Both also include a year of advanced remote network monitoring and management (RMM). Advantages can include easier network management, improved compliance with information security regulations, higher utilization of IT resources, quicker problem resolution, more dependable backup and recovery, and increased uptime. Read more information about Progent's ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is an affordable service based on a brief discussion with a Progent information assurance consultant. The interview is intended to evaluate your company's preparedness to stop or recover rapidly after an assault by a ransomware variant such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to collect information concerning your existing AV defense and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow best practices to build a cost-effective AV and backup/recovery system that meets your company's needs. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Verification Bundles
Progent offers a selection of fixed-price security evaluation bundles that provide high value by deploying Progent's advanced system monitoring and analysis software plus Progent's consulting experience to produce an unbiased and comprehensive evaluation of your IT environment security profile.
Our Network Has Been Hacked: What Can We Do?
- Security Inventory Service Bundles for Small Businesses
Progent offers two value-priced security inventory scanning service packages designed to allow small businesses to obtain an objective security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from outside your firewalled perimeter to determine possible gaps in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security expert executes a system scan from an authorized computer within your corporate firewall to evaluate your vulnerability to internal assaults. The two security inventory scanning services are set up and run from a secured offsite location. The project is managed by a consultant who has been awarded high-level security certifications and who produces a report that describes and evaluates the data captured by the security scan and suggests various enhancements where required.
- Security Vulnerability Assessment Packages for Enterprises
Progent has developed three levels of set-price security evaluation service packages designed for enterprises who want to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer enterprises an opportunity to get a professional look at the viability of their security profile. For every security assessment package, Progent consultants with advanced security credentials study and report on captured data and provide recommendations for efficient improvements. Each of the network security assessment packages include an added-cost option for on-premises engineers at any location in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is a critical technique for allowing organizations to determine how open their network systems are to current-generation threats. Progent's stealth penetration testing services check how effectively your corporate security policies and technologies stand up to authorized but unannounced penetration attempts managed by Progent's experienced security specialists utilizing advanced hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
If your company is currently faced with a security crisis and you have not prepared a formal response plan, visit Progent's Online Network Support to find out how to receive fast help. Progent offers online technical support from experienced network technicians and can refer problems to high-level security experts if necessary. Your company does not need to be a current Progent client to get urgent help for a security breach, but you can sign up as a Progent client ahead of time for free and your standing as a registered customer can save precious time in a crisis.
Typically, smaller businesses do not have a response plan in case of a successful security breach. This is not good, because the damage from a successful security assault can be more devastating for a small business than for a big corporation. Progent's security engineers can help your you to design an efficient response and incident reporting procedure that reduces the IT system disruption resulting from a security breach. The step-by-step post-attack response model outlined by GIAC is Progent's preferred procedure for responding to a major security penetration.
Advanced Security Expertise Offered by Progent
Progent's security consultants offer world-class consulting in key areas of computer security including:
Progent's Security Accreditations
- Vulnerability Evaluation and Security Compliance Assessment
Progent offers expertise with information risk auditing utilities such as Microsoft Baseline Security Analyzer and LANguard for performing a set of comprehensive network scans to uncover possible security gaps. Progent has extensive skills with these and similar utilities and can help your company to understand audit results and react efficiently. Progent's certified security consultants also provide web software testing and can perform expert evaluation of enterprise-wide security to confirm your company's compliance with important global security specifications including HIPAA, NIST, and ISO. Also, Progent can evaluate the effectiveness of your wireless protection including fixed wireless appliances plus portable handsets. Get additional details concerning Progent's Information Risk Evaluation and Compliance Testing.
- Planning, Implementing, and Validating Secure Networks
Any organization should develop a carefully thought out security plan that incorporates both proactive and reactive activity. The pre-attack plan is a collection of precautions that helps to reduce security holes. The post-attack plan defines procedures to help security personnel to assess the losses caused by an attack, remediate the damage, document the event, and restore business activity as soon as feasible. Progent can show you how to build protection into your business operations, configure auditing utilities, define and execute a safe IT infrastructure, and propose processes and policies that will maximize the safety of your network. Progent's security experts are available to help you to set up a firewall, deploy safe online and mobile access to email and files, and configure an efficient virtual private network (VPN). If you are looking for an affordable way for outsourcing your security management, Progent's 24x7 Monitoring Services include automated remote network tracking and quick resolution of problems.
- Data Recovery and Failure Analysis
Progent provides expertise in recovering systems and computers that have been compromised, are quarantined, or have failed because of a security breach. Progent can show you how to determine the damage resulting from the breach, return your company to ordinary business operations, and recover information lost as a result of the attack. Progent's security engineers can also perform a comprehensive forensic analysis by examining event logs and using a variety of advanced forensics tools. Progent's experience with security consulting reduces your business disruption and permits Progent to suggest efficient strategies to avoid or contain new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, integrate, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
- Additional Firewall and VPN Solutions Offered by Progent
As well as offering support for a broad array of protection technologies from Microsoft and Cisco, Progent can provide small and mid-size companies top-tier engineering services for technologies from other popular firewall and VPN suppliers by offering services including:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are intended to interpret the massive quantity of data collected in security event records generated by a wide range of sources such as network appliances, servers, and applications and tools. SIEM software analyzes the security event records from these diverse sources and produces consolidated reports of security incidents as required by state regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure experts can assist organizations to design, install and operate a SIEM solution that helps them to see the progress of security incidents and comply with event reporting requirements. (Visit Progent's SIEM solutions.)
Progent's security professionals have been awarded some of the most respected certifications offered in the industry. These accreditations require exhaustive testing and demonstrated work background to guarantee that candidates have mastered a substantial amount of security information and methodologies and can offer advanced consulting to computer networks of any complexity.
Depend on Progent for Network Security Help
- Certified Information Security Manager (CISM) Security Support Services
Certified Information Security Manager identifies the core competencies and international standards of performance that IT security managers are expected to master. CISM offers business management the assurance that consultants who have been awarded their certification possess the experience and knowledge to provide effective security administration and engineering services. Progent can provide a CISM-certified expert to assist your enterprise in critical security areas including information security governance, vulnerability assessment, information protection program management, and crisis response support. Learn additional details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP consultants are security engineers who have earned CISSP status as a result of verified experience, extensive study, and formal examination. CISSP Certification recognizes expertise in an international standard for IT security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration practices, security architecture and test systems, connection control systems, software development security, operations security, physical security, encryption, communications, network security, and business continuity planning. Find out additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
- CISSP-ISSAP} Security Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have been awarded ISSAP accreditation as a result of thorough examination and extensive hands-on work with network security design. ISSAP security experts have acquired in-depth understanding of access management mechanisms and methodologies, telecommunications and network protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security specialists can assist your company with all phases of secure network architecture. Learn additional details about Progent's ISSAP Accredited Protected System Infrastructure Consulting Services.
- Certified Information Systems Auditor (CISA) Consulting Expertise
The Certified Information Systems Auditor credential is an important qualification that indicates expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass a comprehensive examination administered by the ISACA international professional group. Progent offers the expertise of a CISA-Certified security consultant trained to help companies in the fields of IS audit process, information technology administration, network assets and architecture lifecycle, IT support, protecting data resources, and business continuity planning. Read additional information about Progent's Certified Information Systems Auditor Consulting Services.
- CRISC Network Risk Mitigation Specialists
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and maintain information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and carry out a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's network risk mitigation services are a good fit the support available from Progent's CISA-Certified security engineers for impartially assessing your IT control design and also with the expertise of Progent's CISM-certified consultants for defining security policies and procedures. Learn the details about Progent's CRISC-certified IT Risk Management Support.
- Global Information Assurance Certification Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to assure that an accredited professional has the skills necessary to deliver support in vital categories of network, data, and application program security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent can provide the expertise of GIAC certified security engineers for all of the security services covered under GIAC accreditation programs such as assessing networks, security incident response, intrusion detection, and web-based services security. Read more details about Progent's Global Information Assurance Certification Consulting Expertise.
If you're trying to find network security expertise, telephone Progent at 800-993-9400 or go to Contact Progent.