Overview of Progent's Security Consulting Services
Progent's industry certified computer security and compliance consultants offer a wide selection of support services designed to assist organizations of any size to detect and correct security vulnerabilities, defend against malicious attacks, recover from any damage resulting from a breakdown of security, and meet government mandates for protecting data and reporting security incidents. Progent can provide a selection of service modes:

  • On-demand online and on-site assistance billed by the minute
  • On-going fully managed services invoiced at a low fixed monthly fee
  • Set-price service bundles for a one-time security evaluation
As-needed Security Support Services
Once you register for Progent's services (registration is free), you can receive on-demand remote or on-premises assistance from one of Progent security and compliance expert. This traditional service model is essentially reactive and optimized for quickly taking care of IT problems that are disrupting your productivity or that have stumped your own support personnel. Common scenarios are debugging a firewall or VPN tunnel, implementing a critical security update for a Cisco switch, setting up secure access to cloud-based resources, or recovering from a ransomware assault. These services are invoiced by the minute, which eliminates the annoying case of getting large invoices for fast repairs.

Delivery options for Progent's as-needed support services include:

  • Online Security Support
    The majority security problems can be handled remotely via a combination of phone support and an Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide online security help by offering efficient access to consultants who have the background and resources to resolve many of the most challenging problems quickly, keeping your service expenses low and minimizing downtime.
  • On-premises Security Support Services
    For cases where on-premises assistance is necessary, Progent can send a technical expert to major cities across the United States. Progent can also dispatch a security specialist with top certifications and advanced skills to any location in the country.
Progent's accredited consultants are certified to provide help for environments powered by Windows, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's wide array of services encompasses firewall configuration, email and messaging systems, protected system design, and information restoration. Progent's support team has been awarded the industry's top security credentials including Global Information Assurance Certification and Certified Information Systems Security Professional. Progent also can provide immediate access to online Cisco-certified CCIE network infrastructure consultants who can deliver advanced support with tough network technology problems.

ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior machine learning technology to guard endpoint devices as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus tools. ProSight ASM safeguards local and cloud resources and provides a unified platform to manage the entire malware attack progression including filtering, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint control, and web filtering through leading-edge technologies packaged within one agent managed from a single control. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP deployment that addresses your organization's unique needs and that allows you achieve and demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent attention. Progent can also assist you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services offer small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and allows fast recovery of vital files, apps and VMs that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can deliver world-class support to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical information. Learn more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to deliver web-based control and world-class security for your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of inspection for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, optimize and troubleshoot their networking hardware like routers and switches, firewalls, and wireless controllers as well as servers, client computers and other devices. Incorporating state-of-the-art RMM technology, WAN Watch ensures that infrastructure topology diagrams are always current, captures and manages the configuration information of almost all devices connected to your network, monitors performance, and generates alerts when potential issues are discovered. By automating complex management and troubleshooting processes, ProSight WAN Watch can knock hours off common tasks like making network diagrams, expanding your network, finding devices that need critical updates, or isolating performance bottlenecks. Learn more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to help keep your IT system running efficiently by checking the state of critical assets that power your information system. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your designated IT management staff and your assigned Progent consultant so any potential problems can be resolved before they have a chance to disrupt your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard data about your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and medium-size businesses to obtain an unbiased assessment of the health of their network. Powered by some of the top remote monitoring and management platforms in the industry, and overseen by Progent's world-class group of information technology experts, ProSight Network Audits help you see how closely the configuration of your core network assets adhere to best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate ROI such as a more manageable Active Directory (AD) environment. Both also include a year of state-of-the-art remote network monitoring and management (RMM). Benefits can include easier management, improved compliance with data security requirements, higher utilization of network resources, quicker troubleshooting, more dependable backup and recovery, and increased uptime. See more information about Progent's ProSight Network Audits network infrastructure review.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief discussion with a Progent information assurance consultant. The fact-finding interview is intended to evaluate your company's preparedness to block or recover quickly following an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to gather information about your current antivirus tools and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can follow best practices to deploy an efficient security and backup system that meets your company's needs. For details, see The ProSight Ransomware Preparedness Report.

Fixed-price Security Evaluation and Verification Bundles
Progent offers a number of fixed-price security and compliance assessment packages that deliver exceptional value by utilizing Progent's enterprise-class network monitoring and analysis tools as well as Progent's consulting skills to produce an unbiased and thorough assessment of your IT environment security profile.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory scanning service packages designed to allow small businesses to obtain an objective security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive assessment of your IT system from beyond your firewalled perimeter to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan using an authorized machine inside your corporate firewall to assess your vulnerability to internal threats. The two security inventory scanning services are configured and run from a secured external site. The scan is managed by a consultant who has earned high-level security certifications and who produces a report that details and interprets the data captured by the security scan and suggests various enhancements where appropriate.
  • Security Vulnerability Assessment Packages for Large Organizations
    Progent has developed three levels of set-price security evaluation service bundles designed for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security assessment service packages offer enterprises an opportunity to get a professional assessment at the strength of their security profile. For every security evaluation bundle, Progent consultants with top security credentials analyze and report on captured data and provide suggestions for cost-effective improvements. All the network security assessment packages include an extra-cost option for on-premises consultants anywhere in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often referred to as PEN testing, is a critical tool for helping businesses to find out how open their IT systems are to current-generation threats. Progent's stealth penetration testing services test how well your existing security policies and platforms resist authorized but unannounced intrusion attempts launched by Progent's veteran security experts using cutting-edge hacking methods. Find out about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Can We Do?
Network Security ConsultantsIf your company is now fighting a network security emergency and you have not prepared a detailed recovery plan, go to Progent's Online Computer Help to see how to receive immediate assistance. Progent provides online technical support from experienced network technicians and can escalate problems to certified security specialists if necessary. Your organization does not need to be a registered Progent client to get emergency support for a security breakdown, but you can register as a Progent client in advance for free and your status as a current client could save valuable time during an emergency.

Typically, smaller businesses have not documented a response plan in the event of a successful penetration. This is not good, since the damage from a successful security assault can be more catastrophic for a small company than for a big corporation. Progent's security specialists can help your you to design a sensible response and event reporting plan that reduces the network downtime resulting from a security breach. The formal incident response model promoted by GIAC (Global Information Assurance Certification) is Progent's recommended method for responding to a major security incident.

Advanced Security Services Offered by Progent
Progent's certified security consultants can provide specialized help in key facets of network compliance such as:

  • Security Vulnerability Evaluation and Compliance Assessment
    Progent offers expertise with security auditing software like MS Baseline Security Analyzer or LANguard for performing a variety of comprehensive network tests to uncover possible security gaps. Progent has broad experience with these utilities and can assist you to understand assessment reports and react efficiently. Progent's security engineers also can perform web software validation and can conduct thorough evaluation of enterprise-wide security to determine your organization's compliance with major industry security standards including FISMA, NIST, and ISO. Also, Progent can assess the effectiveness of your wireless protection including fixed wireless appliances as well as mobile handsets. Find out the details about Progent's Information Risk Evaluation and Compliance Assessment.
  • Designing, Implementing, and Testing Secure Networks
    Any company should develop a thoroughly thought out security strategy that incorporates both proactive and responsive activity. The pre-attack plan is a set of precautions that helps to reduce security holes. The reactive strategy specifies procedures to assist security staff to assess the losses caused by an attack, remediate the damage, record the experience, and restore business activity as soon as possible. Progent can advise you how to build security into your business operations, configure scanning software, create and build a secure IT architecture, and recommend procedures and policies to optimize the protection of your information system. Progent's security professionals are ready to assist you to configure a firewall, design protected remote access to email and files, and configure an efficient virtual private network. If you are interested in an affordable way for jobbing out your security management, Progent's Round-the-clock Monitoring Services feature non-stop remote server tracking and fast resolution of emergencies.
  • System Recovery and Failure Analysis
    Progent offers expertise in recovering networks and servers that have been compromised, are quarantined, or have stopped working as a result of a security breach. Progent can help determine the damage resulting from the assault, restore ordinary functions, and recover information lost owing to the breach. Progent's certified specialists can also oversee a thorough failure evaluation by examining activity logs and utilizing a variety of advanced forensics techniques. Progent's background with security problems minimizes your downtime and permits Progent to suggest efficient measures to prevent or contain future assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
    Cisco CCIE Security ExpertsThe new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to manage your current PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
  • Additional Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
    In addition to supporting a broad array of protection technologies from Microsoft and Cisco, Progent offers small and mid-size businesses top-tier support for solutions from other popular firewall and Virtual Private Network vendors by delivering services such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) applications and services are intended to make sense the enormous amounts of information represented by security event records generated by multiple sources including network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM applications organizes the security event records from these diverse sources and creates summary reports of security incidents as required by state regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure consultants can assist businesses to plan, install and manage a SIEM solution that enables them to see the progress of security incidents and comply with event reporting regulations. (See Progent's SIEM solutions.)
Progent's Security Accreditations
Progent's security specialists have been awarded some of the most respected certifications available in the industry. All of these accreditations require exhaustive testing and demonstrated field background to ensure that recipients have acquired expertise with a substantial amount of security knowledge and techniques and can provide advanced consulting to information networks of any size.
  • Certified Information Security Manager (CISM) Security Consulting Expertise
    Certified Information Security Manager identifies the basic skills and international standards of service that computer security managers are required to achieve. It offers executive management the confidence that consultants who have earned their accreditation have the background and skill to provide effective security management and consulting support. Progent can provide a CISM expert to assist your organization in vital security areas including information protection governance, vulnerability assessment, information security program management, and crisis handling management. Read additional details concerning Progent's CISM Security Support Services.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have earned CISSP status as a result of demonstrated experience, extensive study, and formal examination. CISSP Certification indicates mastery of an international standard for information security. ANSI has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Fields of knowledge included within CISSP include security administration practices, security design and test systems, access permission methodology, applications development security, operations security, physical security, encryption, communications, network security, and business continuity planning. Learn additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support
    Progent's CISSP-ISSAP Premier security architecture experts have been awarded ISSAP certification after thorough testing and extensive hands-on work with network security design. ISSAP consultants have acquired comprehensive understanding of access management mechanisms and methodologies, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security experts can assist your company with all aspects of architecture security. Find out more details concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Assistance.

  • CISA Consulting Services
    The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that represents mastery in IS security audit and control. Accredited by ANSI, the CISA accreditation has candidates undergo a comprehensive test given by the ISACA professional association. Progent can provide the services of a CISA-Premier security professional able to assist companies in the areas of information systems audit process, IT governance, network assets and architecture planned useful life, IT support, protecting information assets, and business continuity planning. Get more information about Progent's CISA Professional Services.

  • CRISC IT Risk Mitigation Consultants
    The CRISC program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and maintain information system controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a workplace continuity plan based on leading practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's risk management services are complementary to the services available from Progent's CISA-Certified consultants for impartially evaluating your IT management design and also with the expertise of Progent's CISM support professionals for implementing company-wide security policies and procedures. Read the details about Progent's CRISC Network Risk Management Services.

  • Global Information Assurance Certification Consulting Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to verify that a certified security consultant possesses the skills necessary to deliver support in important areas of network, information, and application software security. GIAC certifications are recognized by companies and government organizations all over the world including and the United States National Security Agency (NSA). Progent offers the assistance of GIAC certified consultants for any of the network security capabilities addressed within GIAC certification programs such as assessing networks, incident response, intrusion detection, and web-based services security. Read additional information about Progent's GIAC (Global Information Assurance Certification) Consulting Expertise.
Get in Touch with Progent for Computer Security Help
If you want network security consulting, call Progent at 800-993-9400 or visit Contact Progent.