Introduction to Progent's Security and Compliance Support Services
Progent's certified network security professionals can provide a broad selection of support services designed to assist companies of any size to identify and correct security weaknesses, block attacks, recover from the issues caused by a breakdown of protection, and comply with government mandates for guarding data and reporting security incidents. Progent can deliver advanced help for key cybersecurity and restoration technologies including AI-based End Point Protection and Response, Managed Detection and Response, full system restore validation and testing, immutable backup, and off-premises backup.
Progent offers a choice of service models:
- On-demand remote and on-site assistance billed by the minute
- On-going managed services invoiced at an affordable flat monthly rate
- Set-price service packages for a single security evaluation
- Urgent ransomware recovery. Progent will submit a bid based on an evaluation of the damage.
(If your system has been victimized by any strain of ransomware, do not panic. Get fast help by calling Progent's 24-hour Ransomware Hot Line at 800-462-8800.)
As-needed Security and Compliance Support Services
After you sign up for Progent's services (signing up is free), you can receive on-demand remote or on-premises support from one of Progent security and compliance consultant. This classic service model is essentially reactive and optimized for rapidly taking care of technical issues that are affecting your productivity or that have stumped your own support personnel. Typical examples are debugging a firewall or VPN connection, installing a critical security patch for a Cisco switch or router, designing compliant access to a public cloud, or restoring data after a ransomware assault. These security services are invoiced to the nearest minute, which eliminates the annoying case of receiving large bills for quick repairs.
Delivery alternatives for Progent's as-needed support include:
- Remote Security Services
The majority security-related problems can be handled online through a mix of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security support by offering easy access to consultants who have the background and technical resources to resolve many of the most difficult issues quickly, making your support expenses low and reducing lost productivity.
- Onsite Security Support
For cases where on-premises support is necessary, Progent can dispatch a technical professional to major cities across the U.S. Progent can also dispatch a security consultant with high-level certifications and advanced skills to any site in the U.S.
Progent's security engineers are premier to support systems based on Windows, Linux, macOS and OS X, Sun, and popular derivatives of UNIX. Progent's wide selection of services encompasses firewall expertise, e-mail systems, secure system architecture, and information recovery. Progent's technical support staff has earned the world's most advanced security accreditations including Certified Information Systems Auditor and Information System Security Architecture Professional. Progent also offers immediate access to remote Cisco CCIE network infrastructure consultants who can deliver advanced assistance with complex network technology issues.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that incorporates SentinelOne's next generation behavior analysis tools to guard endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely get by traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to manage the complete threat progression including protection, detection, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense based on SentinelOne technology.
- ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is an expanding suite of real-time and in-depth management reporting tools designed to integrate with the top ticketing and network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to highlight and contextualize critical issues like inconsistent support follow-up or machines with out-of-date AVs. By exposing ticketing or network health problems concisely and in near-real time, ProSight Reporting improves productivity, lowers management hassle, and saves money. For details, see ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge technologies packaged within one agent accessible from a unified control. Progent's data protection and virtualization consultants can help your business to plan and implement a ProSight ESP environment that addresses your company's specific needs and that allows you prove compliance with legal and industry data protection standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent's consultants can also assist your company to install and verify a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates your backup processes and allows fast recovery of vital data, apps and virtual machines that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FIRPA, and PCI and, whenever necessary, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further level of inspection for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, DLP, and encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.
- ProSight Duo MFA: Two-Factor Identity Authentication
ProSight Duo is a suite of managed services incorporating top-ranked technology from Duo, a Cisco company, to create two-factor authentication (2FA) environments. 2FA uses an out-of-band device to validate user identity, providing an additional layer of protection beyond just passwords. This protects against the most common causes of network security breaches such as social engineering, brute-force password guessing, and burglarized personal credentials. Duo's push capability can save time and minimize frustration by allowing users to prove their identity as easily as clicking "Approve" on the authentication box on their unique endpoint, which can be an Android or iOS smartphone, a watch, or other compatible out-of-band device. This one-click procedure eliminates the requirement to find an email or text message and transcribe a security passcode. Find out more about Progent's ProSight Duo MFA multi-factor identity authentication service plans.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller businesses to map out, monitor, enhance and debug their networking hardware like routers, firewalls, and wireless controllers as well as servers, printers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch makes sure that network diagrams are kept updated, captures and manages the configuration information of virtually all devices on your network, tracks performance, and sends alerts when problems are detected. By automating tedious management and troubleshooting processes, ProSight WAN Watch can knock hours off common tasks like network mapping, reconfiguring your network, locating devices that require important software patches, or identifying the cause of performance problems. Learn more details about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring service that uses advanced remote monitoring and management (RMM) techniques to keep your IT system operating at peak levels by checking the state of critical assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alarm is sent immediately to your specified IT management personnel and your Progent engineering consultant so that all potential issues can be resolved before they have a chance to impact your network Learn more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host set up and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved easily to a different hosting environment without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and safeguard data related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT documentation, you can save as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you're making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost alternative for small and mid-size businesses to get an objective evaluation of the overall health of their information system. Powered by some of the leading remote monitoring and management (RMM) tools available, and overseen by Progent's world-class team of IT professionals, ProSight Network Audits show you how well the configuration of your core infrastructure devices adhere to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver immediate benefits like a cleaner Active Directory system. Both also come with a year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, improved compliance with data security requirements, more efficient utilization of IT assets, quicker troubleshooting, more dependable backup and restore, and increased uptime. Read more information about ProSight Network Audits IT infrastructure review.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service built around a brief interview with a Progent backup/recovery expert. The interview is designed to help evaluate your company's ability to stop or recover rapidly after an attack by a ransomware strain like Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you directly to gather information about your existing cybersecurity profile and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to create an efficient AV and backup system that meets your company's needs. For additional information, see The ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Validation Bundles
Progent offers a number of fixed-price security evaluation bundles that provide exceptional value by utilizing Progent's advanced network monitoring software plus Progent's technical skills to produce an unbiased and comprehensive evaluation of your IT environment security profile.
- Security Inventory Service Packages for Small Businesses
Progent offers two value-priced security inventory service packages designed to enable small businesses to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your IT system from outside your firewalled perimeter to identify possible gaps in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan from an authorized computer within your corporate firewall to assess your vulnerability to inside attacks. The two security inventory scans are set up and run from a secured external site. The project is managed by an engineer who has been awarded high-level security certifications and who produces a report that details and interprets the information captured by the scan and recommend practical enhancements where required.
- Security Vulnerability Assessment Packages for Large Organizations
Progent has developed three levels of flat-rate security assessment service packages intended for enterprises who want to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer larger organizations an opportunity to obtain a professional look at the strength of their security posture. For each security evaluation bundle, Progent engineers with advanced security credentials study and report on collected data and provide suggestions for efficient remediation. Each of the network security audit bundles include an added-cost option for onsite consultants anywhere in the U.S.
- Consulting Services for Horizon3.ai's NodeZero Penetration Testing Platform
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that can deliver continuous, simultaneous, automated testing of your network so you can expose, rank, fix, and confirm cybersecurity weaknesses before threat actors can take advantage of them. Progent offers the skills of a NodeZero Certified Operator (NCO) who can help you to use NodeZero to perform thorough penetration tests of your network perimeter and your internal network so you can determine your current security profile. Progent's NodeZero experts can also help you to strengthen your existing network security and can help you to design and implement a cohesive cybersecurity ecosystem that simplifies management and provides optimum cyber defense for on-prem, cloud-based, and perimeter IT assets. To learn additional information about Progent's vulnerability analysis solutions based on on NodeZero's penetration test platform, refer to Consulting Support for NodeZero's Penetration Test Products.
- Stealth Penetration Testing
Stealth penetration testing, commonly known as PEN testing, is a vital tool for helping businesses to find out how vulnerable their network environments are to current-generation attacks. Progent's stealth penetration testing test how well your corporate security procedures and technologies stand up to authorized but unannounced penetration attempts launched by Progent's experienced security experts using cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Download the Security Services Overview Datasheet
To download a datasheet with an overview of Progent's services for IT security, click:
Overview of Progent's Network Security Services Portfolio (PDF - 511 KB).
Our Network Has Been Hacked: What Do We Do?
If you are now faced with a network security crisis and you have no formal response procedure, refer to Progent's Remote Computer Support to find out how to get fast help. Progent offers online help from experienced network technicians and can refer problems to high-level security specialists if required. Your business does not have to be a current Progent client to get urgent support for a security breach, but you can sign up as a Progent customer ahead of time for free and your status as a registered client could save valuable time in case of a crisis.
Typically, smaller businesses have no recovery plan in the event of a damaging penetration. This is not good, because the cost of a serious security attack can be more catastrophic for a small company than for a large corporation. Progent's security specialists can assist your business to create an efficient response and event reporting plan that minimizes the IT system downtime resulting from a security breach. The formal incident response model outlined by Global Information Assurance Certification is Progent's suggested procedure for handling a serious security attack.
High-value Security Expertise Offered by Progent
Progent's certified security engineers offer world-class consulting in key facets of network security such as:
- Vulnerability Evaluation and Security Compliance Assessment
Progent offers expertise with security auditing software such as MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network scans to uncover potential security holes. Progent has broad skills with scanning tools and can help you to understand audit results and respond appropriately. Progent's certified security consultants also can perform web application validation and can conduct thorough assessments of corporate-wide security to determine your company's compliance with important global security standards including FISMA, PCI, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless protection including stationary wireless appliances plus portable handsets. Read additional information concerning Progent's Security Vulnerability Evaluation and Security Compliance Testing.
- Designing, Building, and Validating Protected Environments
Every organization should have a carefully thought out security plan that incorporates both preventive and reactive elements. The proactive strategy is a set of precautions that works to reduce security holes. The post-attack strategy specifies procedures to help IT personnel to assess the losses resulting from a breach, repair the damage, document the event, and restore business functions as soon as possible. Progent can show you how to design protection into your business processes, set up auditing utilities, define and implement a secure network architecture, and recommend procedures and policies to maximize the protection of your computing environment. Progent's security professionals are ready to assist you to configure a firewall, design secure offsite access to email and data, and install an efficient VPN. If you are looking for an affordable option for jobbing out your network security management, Progent's 24x7 Monitoring Services include continual remote network monitoring and fast resolution of problems.
- System Recovery and Failure Analysis
Progent provides expertise in recovering systems and devices that have been compromised, are in question, or have stopped working because of a security penetration. Progent can help assess the losses resulting from the attack, restore ordinary functions, and retrieve data lost owing to the event. Progent's certified engineers can also oversee a thorough forensic evaluation by going over event logs and utilizing other proven forensics techniques. Progent's background with security consulting minimizes your off-air time and allows Progent to propose effective strategies to prevent or contain future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting support.
- Other Firewall and VPN Solutions Provided by Progent
In addition to supporting a broad array of network security technologies from Microsoft and Cisco, Progent can provide small and mid-size companies expert consulting for products from other important firewall and Virtual Private Network vendors by offering services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) applications and services are intended to make sense the massive quantity of information collected in security event records created by a wide range of sources such as network appliances, operating systems, and application software and tools. SIEM applications analyzes the security logs from these various sources and creates consolidated reports of security events as required by state regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure consultants can assist organizations to design, install and manage a SIEM system that helps them to understand the behavior of attacks and comply with event reporting requirements. (See Progent's SIEM solutions.)
- Patch Management Solutions
Patch management entails installing software or firmware updates to operating systems and apps, physical and virtual servers and endpoint devices, peripherals such as printers, network appliances like routers and wireless APs, and Internet-of-Things devices like alarms and robotics. Timely and properly managed updating optimizes cybersecurity, compliance, uptime, and capability. Sporadic software update management can cause security vulnerabilities, compatibility problems, sluggish or inconsistent performance, unnecessary downtime, or loss of key functions. Progent's support services for patch management offer businesses of all sizes a versatile and cost-effective alternative for assessing, testing, scheduling, implementing, and tracking updates to your dynamic information system. (See Progent's patch management solutions.)
Progent's Security Credentials
Progent's security specialists have been awarded some of the most prestigious accreditations available in the security industry. All of these accreditations demand exhaustive examinations and proven work experience to ensure that recipients have acquired expertise with a substantial body of security knowledge and techniques and can provide advanced consulting to computer networks of any size.
- Certified Information Security Manager (CISM) Security Consulting Services
Certified Information Security Manager (CISM) defines the fundamental skills and worldwide benchmarks of service that information technology security managers are expected to achieve. It provides business management the assurance that consultants who have earned their certification possess the experience and skill to provide efficient security management and engineering services. Progent can offer a CISM-certified expert to assist your enterprise in critical security areas such as data protection governance, vulnerability assessment, data security process control, and crisis response management. Get more information about Progent's Certified Information Security Manager (CISM) Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP experts are security specialists who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and exhaustive examination. CISSP Certification recognizes mastery of an international standard for IT security. American National Standards Institute has given the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration practices, security architecture and test systems, connection control systems, software development security, business processes security, physical security, cryptography, telecommunications, Internet security, and disaster recovery planning. Read the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP Cybersecurity Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have earned ISSAP certification after rigorous testing and extensive experience. field experience with network security architecture. ISSAP consultants have acquired in-depth understanding of access control systems and methodologies, phone system and network security, cryptography, requirements analysis, business continuity and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-premier security consultants can help your company with all phases of secure network architecture. Read more details concerning Progent's ISSAP Accredited Secure Network Infrastructure Consulting Assistance.
- Certified Information Systems Auditor (CISA) Professional Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that indicates mastery in network security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination administered by the ISACA professional association. Progent can provide the expertise of a CISA-Premier security audit engineer trained to help companies in the fields of IS audit services, IT enforcement, systems and architecture lifecycle, information technology support, protecting data resources, and disaster recovery preparedness. Get additional information about Progent's CISA Professional Expertise.
- CRISC IT Risk Mitigation Experts
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's skills to design, implement, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to create and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's network risk mitigation services are a good fit the support available from Progent's CISA-Certified security engineers for impartially assessing your IT control mechanisms and with the expertise of Progent's CISM consultants for defining security policies. Find out additional information about Progent's CRISC Risk Management Support.
- Global Information Assurance Certification Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security experts. GIAC's goal is to assure that an accredited security consultant possesses the knowledge necessary to deliver support in critical categories of network, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent can provide the assistance of GIAC certified security engineers for all of the network security services covered within GIAC certification programs including assessing IT infrastructure, incident handling, intrusion detection, and web application security. Learn more details concerning Progent's GIAC Consulting Expertise.
Depend on Progent for Computer Security Consulting Services
If you need security consulting, phone Progent at 800-993-9400 or go to Contact Progent.