Overview of Progent's Security and Compliance Consulting Services
Progent's certified network security and compliance professionals can provide a broad selection of services intended to assist businesses of all sizes to uncover and eliminate security weaknesses, block attacks, remediate the problems resulting from a breakdown of protection, and meet regulatory requirements for guarding information and reporting incidents. Progent offers a choice of service delivery modes:
As-needed Security and Compliance Support Services
- As-needed online and on-premises assistance billed by the minute
- On-going managed services invoiced at a low fixed monthly rate
- Value-priced service packages for a single security and compliance assessment
Once you register for Progent's services (signing up is free), you can receive on-demand online or on-premises support from one of Progent security and compliance consultant. This classic service model is essentially reactive and geared toward rapidly taking care of IT problems that are affecting your network or that are beyond the scope of your in-house support personnel. Typical examples are debugging a firewall appliance or VPN tunnel, installing a critical security patch for a Cisco switch, setting up secure access to a public cloud, or recovering from a ransomware attack. These security services are invoiced to the nearest minute, which avoids the annoying case of getting big invoices for fast repairs.
Delivery alternatives for Progent's on-demand support include:
Progent's security engineers are certified to provide help for environments based on Windows, Linux, Mac, Sun, and major versions of UNIX. Progent's broad selection of consulting services encompasses firewall technology, e-mail security, secure network design, and information recovery. Progent's technical support staff has been awarded the industry's top security accreditations including Global Information Assurance Certification and CISSP. Progent also offers fast access to online Cisco CCIE network infrastructure engineers who can provide advanced assistance with complex network configuration issues.
- Online Security Support Services
Most security problems can be handled remotely through a mix of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver online security help by offering easy access to consultants with the background and resources to resolve many of the most challenging issues quickly, making your service expenses affordable and minimizing lost productivity.
- Onsite Security Services
For cases where onsite support is necessary, Progent can dispatch a technical professional to major cities throughout the United States. Progent can also dispatch a security consultant with top certifications and advanced skills to any site in the country.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight suite of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based analysis tools to guard endpoints and physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to address the complete threat progression including filtering, identification, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer economical in-depth protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP provides firewall protection, intrusion alerts, device management, and web filtering through cutting-edge tools packaged within a single agent accessible from a single console. Progent's data protection and virtualization consultants can assist you to design and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you demonstrate compliance with legal and industry information protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent's consultants can also assist you to install and verify a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital files, applications and VMs that have become lost or damaged as a result of component breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced expertise to set up ProSight DPS to to comply with government and industry regulatory standards like HIPAA, FIRPA, and PCI and, when necessary, can assist you to restore your critical information. Read more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the technology of leading data security companies to deliver centralized management and comprehensive security for your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.
- ProSight WAN Watch: Infrastructure Management
Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to diagram, track, optimize and troubleshoot their networking appliances such as routers, firewalls, and access points plus servers, printers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are always current, copies and displays the configuration of virtually all devices connected to your network, monitors performance, and sends alerts when problems are discovered. By automating complex network management processes, WAN Watch can cut hours off ordinary chores like network mapping, reconfiguring your network, finding appliances that need critical updates, or resolving performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management techniques to keep your network operating at peak levels by checking the state of vital computers that drive your business network. When ProSight LAN Watch detects an issue, an alert is sent immediately to your specified IT staff and your Progent consultant so that any potential problems can be resolved before they can disrupt your network Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to a different hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or domains. By updating and managing your network documentation, you can eliminate as much as 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size organizations to get an unbiased assessment of the overall health of their IT system. Powered by a selection of the leading remote monitoring and management tools in the industry, and supervised by Progent's certified team of IT experts, ProSight Network Audits help you see how well the deployment of your core infrastructure devices adhere to leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide immediate ROI like a more manageable Active Directory (AD) system. Both also include a year of state-of-the-art remote network monitoring and management. Benefits can include lower-cost network management, better compliance with data security standards, higher utilization of network resources, quicker problem resolution, more reliable backup and restore, and increased uptime. Read more information about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief discussion with a Progent backup/recovery expert. The fact-finding interview is intended to assess your organization's preparedness either to block or recover rapidly following an assault by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to collect information concerning your existing security profile and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow best practices to create a cost-effective AV and backup/recovery environment that aligns with your business requirements. For more information, refer to The ProSight Ransomware Preparedness Report Service.
Flat-rate Security Evaluation and Verification Bundles
Progent has put together a variety of set-price security and compliance evaluation packages that provide high value by deploying Progent's enterprise-class system monitoring and analysis software as well as Progent's consulting experience to create an objective and thorough evaluation of your IT environment security profile.
We've Been Hacked: What Are We Supposed to Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory scanning service packages designed to enable small businesses to get a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your IT system from beyond your firewalled perimeter to determine potential risks in the security profile you expose to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan using an authorized computer within your company firewall to assess your exposure to internal threats. The two security inventory scanning services are set up and executed from a secured external site. The scan is administered by a consultant who has earned high-level security certifications and who produces a report that details and evaluates the information collected by the scan and suggests various improvements where appropriate.
- Security Vulnerability Evaluation Bundles for Enterprises
Progent offers three levels of set-price security assessment service bundles designed for large organizations who need to meet compliance standards required by state or industry regulators. Progent's security evaluation service bundles offer larger businesses an opportunity to get a professional look at the viability of their security profile. For every security assessment bundle, Progent engineers with advanced security credentials analyze and report on captured data and provide suggestions for efficient remediation. Each of the network security audit bundles include an added-cost option for on-premises engineers at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often referred to as PEN testing, is a vital tool for allowing organizations to determine how vulnerable their IT environments are to current-generation attacks. Progent's stealth penetration testing test how well your existing security procedures and technologies resist authorized but unannounced intrusion attempts launched by Progent's experienced security experts using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If your business is currently experiencing a security emergency and you have no formal response plan, visit Progent's Remote Network Support to find out how to get fast assistance. Progent provides remote help from skilled engineers and can refer trouble tickets to certified security experts if necessary. Your organization does not need to be a current Progent customer to get emergency support for a security problem, but you can sign up as a Progent client in advance at no cost and your status as a registered client could save valuable time in a crisis.
Usually, smaller organizations have not documented a recovery plan in the event of a successful attack. This is risky, since the cost of a successful security attack can be more catastrophic for a small business than for a big corporation. Progent's security engineers can help your company to create an effective recovery and incident reporting plan that reduces the IT system downtime resulting from an attack. The formal incident response procedure outlined by GIAC is Progent's suggested procedure for responding to a serious security incident.
High-value Security Expertise Offered by Progent
Progent's certified engineers offer world-class consulting in vital areas of network protection such as:
Progent's Security Accreditations
- Security Vulnerability Audits and Security Compliance Testing
Progent provides expertise with information risk auditing software like Microsoft Baseline Security Analyzer or LANguard for conducting a set of comprehensive network scans to identify possible security gaps. Progent has extensive experience with these and similar tools and can help your company to understand audit reports and react appropriately. Progent's certified security consultants also can perform web software validation and can conduct thorough assessments of enterprise-wide security to verify your organization's compliance with major industry security specifications such as HIPAA, NIST, and ISO. In addition, Progent can assess the effectiveness of your wireless security covering stationary wireless equipment as well as mobile handsets. Learn additional information concerning Progent's Security Vulnerability Evaluation and Compliance Testing.
- Designing, Implementing, and Validating Secure Environments
Every company ought to develop a thoroughly considered security plan that incorporates both proactive and responsive steps. The pre-attack strategy is a set of precautions that works to reduce vulnerabilities. The post-attack strategy specifies activities to assist IT personnel to evaluate the losses resulting from an attack, repair the damage, record the experience, and revive network activity as quickly as possible. Progent can advise you how to build protection into your company processes, install auditing software, create and implement a secure IT infrastructure, and recommend procedures and policies that will maximize the safety of your network. Progent's security professionals are ready to help you to set up a firewall, design protected online and mobile connectivity to email and data, and install an efficient virtual private network. If your company is interested in an economical option for jobbing out your security administration, Progent's Round-the-clock Network Support Packages include continual online server tracking and quick resolution of emergencies.
- Data Recovery and Security Forensics
Progent has skill in restoring systems and servers that have been hacked, are in question, or have ceased to function following a security attack. Progent can show you how to determine the losses caused by the breach, restore ordinary business operations, and retrieve data lost owing to the breach. Progent's certified engineers can also manage a thorough forensic analysis by going over activity logs and utilizing other advanced assessment techniques. Progent's experience with security problems reduces your business disruption and allows Progent to suggest efficient strategies to avoid or contain new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services deliver significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.
- Additional Firewall and Virtual Private Network Technologies Offered by Progent
In addition to supporting a broad array of protection technologies available from Microsoft and Cisco, Progent can provide small and mid-size organizations expert engineering services for technologies from other major firewall and Virtual Private Network suppliers by providing services including:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are designed to interpret the enormous amounts of information collected in security incident records generated by a wide range of sources including network infrastructure appliances, operating systems, and application software and tools. SIEM applications organizes the security logs from these various sources and creates summary reports of security incidents as required by government regulations and business compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco CCIE certified network consultants can help organizations to plan, install and manage a SIEM solution that enables them to understand the behavior of security incidents and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's security consultants have been awarded the most prestigious certifications available in the industry. These accreditations require exhaustive testing and proven field background to ensure that candidates have acquired expertise with a substantial amount of security information and techniques and can provide advanced consulting to computer environments of any complexity.
Contact Progent for Network Security Expertise
- Certified Information Security Manager (CISM) Security Support Services
Certified Information Security Manager (CISM) identifies the fundamental competencies and worldwide benchmarks of performance that IT security managers are required to master. It offers business management the assurance that those who have been awarded their CISM have the experience and knowledge to provide efficient security administration and consulting services. Progent can provide a CISM support professional to assist your enterprise in critical security areas including data protection governance, vulnerability assessment, information protection process management, and crisis response management. Get additional information concerning Progent's CISM Security Support Expertise.
- CISSP Security Consulting Expertise
Progent's CISSP experts are security engineers who have earned CISSP accreditation through demonstrated experience, rigorous study, and formal testing. CISSP qualification recognizes mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security design and test systems, connection permission methodology, applications development security, operations security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Find out more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support
Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP certification as a result of rigorous examination and extensive hands-on work with network security design. ISSAP security experts possess comprehensive knowledge of access management systems and techniques, phone system and network protection, cryptography, requirements analysis, business continuity and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-certified security experts can help your business with all phases of secure network architecture. Read the details about Progent's ISSAP Certified Secure Network Architecture Consulting Services.
- Certified Information Systems Auditor Professional Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that represents mastery in IS security auditing. Accredited by ANSI, the CISA accreditation has consultants undergo an extensive test given by the ISACA professional group. Progent offers the expertise of a CISA-Premier security audit professional trained to help companies in the fields of IS audit services, IT governance, systems and infrastructure lifecycle, IT service delivery, safeguarding information assets, and disaster recovery preparedness. Find out additional details about Progent's CISA Support Assistance.
- CRISC-certified Risk Mitigation Specialists
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's ability to design, deploy, and maintain IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and carry out a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's risk mitigation expertise is complementary to the services available from Progent's CISA-Certified consultants for objectively auditing your IS control mechanisms and also with the expertise of Progent's CISM support professionals for implementing security policies and procedures. Read more information concerning Progent's CRISC Risk Management Consulting.
- GIAC (Global Information Assurance Certification) Support Services
GIAC was founded in 1999 to validate the knowledge of IT security professionals. GIAC's mission is to ensure that a certified security consultant possesses the skills appropriate to deliver services in key categories of system, information, and application program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency. Progent can provide the support of GIAC certified security engineers for any of the security capabilities addressed within GIAC accreditation programs including assessing IT infrastructure, security incident handling, intrusion detection, and web application security. Read the details about Progent's GIAC (Global Information Assurance Certification) Consulting Expertise.
If you want network security help, telephone Progent at 800-993-9400 or refer to Contact Progent.