Overview of Progent's Security Support Services
Progent's certified computer security professionals offer a wide selection of services designed to assist businesses of any size to uncover and eliminate security vulnerabilities, block assaults, remediate any damage resulting from a breach of protection, and comply with government mandates for protecting information and reporting security incidents. Progent offers a selection of service models:
As-needed Security and Compliance Support Services
- On-demand online and on-premises support invoiced by the minute
- On-going managed services billed at an affordable flat monthly rate
- Value-priced service bundles for a single security evaluation
Once you register for Progent's services (registration is free), you can receive on-demand remote or on-premises support from one of Progent security expert. This classic service model is primarily reactive and optimized for rapidly taking care of technical issues that are impacting your network or that are beyond the scope of your in-house support personnel. Typical examples include replacing a firewall or VPN tunnel, installing a vital security update for a Cisco switch, designing secure access to cloud-based resources, or recovering from a ransomware assault. These services are invoiced to the nearest minute, which eliminates the annoying situation of getting large invoices for quick fixes.
Delivery alternatives for Progent's on-demand support include:
Progent's accredited consultants are certified to provide help for systems based on Windows, Linux, macOS and OS X, Solaris, and popular versions of UNIX. Progent's wide array of consulting services covers firewall technology, e-mail security, secure network architecture, and data restoration. Progent's technical support team has been awarded the world's most advanced security credentials including GIAC and Information System Security Architecture Professional. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can deliver world-class support with tough network integration issues.
- Remote Security Services
The majority security issues can be handled online via a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver online security support by offering easy access to consultants with the background and resources to resolve some of the most difficult issues quickly, keeping your service expenses affordable and minimizing downtime.
- On-premises Security Support Services
For cases where onsite support is necessary, Progent can send a technical expert to major metropolitan areas across the United States. Progent can also dispatch a security specialist with high-level certifications and world-class skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior analysis technology to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to automate the entire malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows VSS and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services deliver economical in-depth security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to security threats from all vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to plan and configure a ProSight ESP deployment that addresses your organization's specific requirements and that helps you prove compliance with government and industry information protection regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for immediate attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical data, applications and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FINRA, and PCI and, whenever needed, can assist you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the technology of top data security vendors to deliver web-based management and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your vulnerability to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for smaller organizations to map out, monitor, reconfigure and troubleshoot their connectivity appliances like routers and switches, firewalls, and access points plus servers, client computers and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network diagrams are always updated, captures and displays the configuration information of virtually all devices connected to your network, tracks performance, and sends alerts when issues are discovered. By automating tedious management and troubleshooting activities, ProSight WAN Watch can knock hours off common tasks such as making network diagrams, reconfiguring your network, locating appliances that need important updates, or identifying the cause of performance bottlenecks. Learn more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your IT system running efficiently by checking the state of critical assets that power your business network. When ProSight LAN Watch uncovers a problem, an alarm is transmitted immediately to your designated IT management personnel and your assigned Progent consultant so that all potential problems can be addressed before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hardware solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can save up to half of time thrown away trying to find critical information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a fast and affordable alternative for small and mid-size organizations to obtain an objective assessment of the overall health of their network. Powered by some of the top remote monitoring and management (RMM) tools in the industry, and supervised by Progent's certified team of IT experts, ProSight Network Audits help you see how closely the configuration of your core infrastructure devices conform to best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory (AD) environment. Both versions also come with a year of cutting-edge remote network monitoring and management (RMM). Benefits can include simpler network management, improved compliance with information security standards, higher utilization of network resources, faster problem resolution, more reliable backup and restore, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service based on a phone interview with a Progent information assurance consultant. The fact-finding interview is designed to help assess your organization's ability either to stop or recover quickly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to gather information concerning your current AV defense and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply industry best practices to deploy an efficient security and backup system that aligns with your business needs. For more information, see Progent's ProSight Ransomware Preparedness Report Service.
Flat-rate Security Evaluation and Validation Packages
Progent offers a selection of flat-rate security and compliance assessment packages that deliver high value by deploying Progent's enterprise-class network monitoring and analysis tools as well as Progent's consulting skills to produce an objective and thorough evaluation of your IT environment security posture.
We've Been Hacked: What Can We Do?
- Security Assessment Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages intended to allow small organizations to obtain an objective security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your network from outside your corporate firewall to identify potential risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan from an authorized machine inside your firewalled perimeter to evaluate your exposure to inside assaults. The two security inventory scanning services are configured and run from a secured external site. The project is administered by an engineer who has been awarded advanced security certifications and who creates a report that details and evaluates the data captured by the security scan and recommend various improvements where appropriate.
- Security Vulnerability Evaluation Bundles for Large Organizations
Progent has developed three levels of flat-rate security evaluation service bundles intended for enterprises who need to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer larger organizations an opportunity to get an objective look at the viability of their security posture. For every security assessment package, Progent engineers with top security credentials study and report on captured data and offer suggestions for cost-effective improvements. All the network security audit packages include an added-cost option for on-premises engineers at any location in the United States.
- Stealth Penetration Testing
Stealth penetration testing, commonly called PEN testing, is an accepted technique for allowing organizations to find out how open their IT systems are to current-generation attacks. Progent's stealth penetration testing services test how well your existing security procedures and platforms resist authorized but unannounced penetration attempts managed by Progent's veteran security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
If your company is now experiencing a network security emergency and you have not prepared a formal response procedure, visit Progent's Remote Technical Help to see how to get immediate help. Progent provides online assistance from experienced engineers and can escalate problems to high-level security specialists if required. Your business does not need to be a registered Progent client to receive emergency help for a security breakdown, but you can sign up as a Progent customer in advance for free and your standing as a registered client could save valuable time when there is a crisis.
Usually, smaller organizations have no response procedure in the event of a damaging attack. This is risky, since the damage from a successful security assault can be even more catastrophic for a small company than for a large enterprise. Progent's security consultants can assist your company to create an efficient recovery and incident reporting procedure that minimizes the network disruption resulting from an attack. The step-by-step post-attack response procedure outlined by GIAC is Progent's preferred procedure for handling a major security attack.
High-value Security Expertise Available from Progent
Progent's certified security engineers can provide advanced support in vital facets of computer security including:
Progent's Security Accreditations
- Vulnerability Audits and Security Compliance Testing
Progent provides expertise with security evaluation tools such as MS Baseline Security Analyzer or LANguard for conducting a variety of comprehensive network scans to reveal possible security gaps. Progent has broad skills with these tools and can help your company to understand audit results and respond appropriately. Progent's security consultants also offer web application testing and can conduct expert evaluation of corporate-wide security to verify your company's compliance with key industry security specifications such as FISMA, NIST, and ISO. Also, Progent can evaluate the strength of your wireless protection covering stationary wireless appliances plus portable devices. Learn more details about Progent's Security Vulnerability Audits and Security Compliance Assessment.
- Planning, Building, and Testing Secure Environments
Every organization ought to develop a thoroughly considered security strategy that incorporates both preventive and responsive elements. The pre-attack plan is a set of precautions that helps to reduce security holes. The reactive plan specifies procedures to help security personnel to evaluate the losses caused by a breach, remediate the damage, record the experience, and restore business activity as soon as feasible. Progent can show you how to build protection into your business processes, configure scanning software, define and execute a safe network architecture, and propose processes and policies to enhance the safety of your network. Progent's security professionals are ready to assist you to set up a firewall, design safe offsite connectivity to email and data, and install an efficient VPN. If you are interested in an affordable way for jobbing out your network security administration, Progent's 24x7 Network Support Options include non-stop online system monitoring and immediate response to problems.
- System Restoration and Security Forensics
Progent provides expertise in recovering systems and computers that have been compromised, are suspect, or have ceased to function as a result of a security breakdown. Progent can help assess the losses caused by the attack, return your company to ordinary functions, and recover information compromised as a result of the event. Progent's certified engineers can also manage a comprehensive forensic analysis by examining event logs and using a variety of proven forensics tools. Progent's experience with security issues reduces your business disruption and allows Progent to suggest efficient strategies to avoid or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services integration and troubleshooting support.
- Other Firewall and Virtual Private Network Consulting Services Provided by Progent
As well as offering support for a wide range of protection technologies from Microsoft and Cisco, Progent can provide small and mid-size organizations top-tier support for security products from other major firewall and VPN vendors by providing services such as:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are intended to digest the enormous amounts of data represented by security event logs created by a wide range of sources including network appliances, operating systems, and application software and monitoring tools. SIEM software analyzes the security event records from these various sources and creates summary reports of security events as required by government regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network experts can assist businesses to design, deploy and operate a SIEM solution that enables them to see the progress of attacks and comply with event reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's security specialists have earned some of the most respected certifications offered in the industry. All of these accreditations demand extensive testing and demonstrated work experience to ensure that recipients have mastered a significant body of security information and methodologies and can provide advanced solutions to computer networks of any complexity.
Get in Touch with Progent for Network Security Consulting Services
- Certified Information Security Manager Security Support Expertise
CISM identifies the basic skills and international benchmarks of service that IT security managers are required to master. CISM offers business management the confidence that those who have been awarded their CISM possess the experience and skill to provide effective security management and consulting services. Progent can provide a CISM-certified support professional to assist your organization in critical security disciplines including information security governance, risk assessment, data protection program management, and crisis handling support. Find out additional details about Progent's CISM Security Consulting Expertise.
- Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification as a result of demonstrated experience, rigorous study, and formal testing. CISSP qualification recognizes expertise in an international standard for IT security. ANSI has granted the CISSP status official recognition in the field of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include security management procedures, security architecture and test systems, access permission systems, software development security, business processes security, hardware security, cryptography, communications, network security, and disaster recovery planning. Get the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier security architecture consultants have been awarded ISSAP certification following thorough testing and substantial experience. field experience with information security design. ISSAP consultants have acquired comprehensive understanding of access control systems and methodologies, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-premier security specialists can help your business with all phases of secure network architecture. Find out additional details concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Assistance.
- Certified Information Systems Auditor (CISA) Professional Expertise
The Certified Information Systems Auditor accreditation is a prestigious qualification that represents expertise in network security auditing. Certified by ANSI, the CISA accreditation has consultants pass an exhaustive test administered by the ISACA professional association. Progent offers the expertise of a CISA-Certified security engineer able to help companies in the fields of information systems audit services, information technology governance, systems and infrastructure planned useful life, information technology service delivery, protecting information resources, and business continuity preparedness. Read more information concerning Progent's Certified Information Systems Auditor Consulting Expertise.
- CRISC Risk Mitigation Specialists
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's ability to design, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to develop and execute a business continuity plan based on industry best practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and IT budget. Progent's network risk mitigation services are a good fit the support provided by Progent's CISA-Premier consultants for impartially auditing your IS management mechanisms and also with the services of Progent's CISM experts for designing security policies. Get more information about Progent's CRISC-certified IT Risk Management Consulting.
- Global Information Assurance Certification Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security professionals. GIAC's goal is to make sure that an accredited professional possesses the skills necessary to provide support in important categories of network, information, and application software security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent can provide the expertise of certified consultants for all of the network security capabilities covered under GIAC accreditation programs such as assessing IT infrastructure, security incident handling, intrusion detection, and web-based application security. Read additional details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Assistance.
If you're looking for network security engineering help, phone Progent at 800-993-9400 or go to Contact Progent.