Introduction to Progent's Security Support Services
Progent's industry certified network security consultants offer a wide range of support services designed to help organizations of all sizes to uncover and eliminate security vulnerabilities, block assaults, remediate the issues resulting from a breach of protection, and meet government mandates for guarding information and reporting security incidents. Progent can provide a selection of service delivery models:

  • On-demand remote and on-site support billed by the minute
  • Continual fully managed services invoiced at a low fixed monthly rate
  • Value-priced service packages for a single security and compliance assessment
On-demand Security and Compliance Consulting Services
Once you sign up for Progent's services (registration is free), you can receive on-demand remote or onsite assistance from a Progent security and compliance consultant. This classic service model is primarily reactive and optimized for quickly resolving IT problems that are affecting your network or that are beyond the scope of your own support staff. Typical scenarios are debugging a firewall or VPN tunnel, installing a critical security patch for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These security services are billed by the minute, which eliminates the frustrating situation of receiving large invoices for fast repairs.

Delivery options for Progent's on-demand support include:

  • Online Security Support
    Most security-related issues can be resolved remotely through a mix of phone support and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can deliver online security help by offering efficient access to consultants who have the background and technical resources to fix many of the most challenging problems quickly, making your service costs affordable and reducing lost productivity.
  • Onsite Security Services
    For cases where on-premises assistance is necessary, Progent can send a technical professional to major cities throughout the U.S. Progent can also dispatch a security specialist with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited consultants are premier to support systems based on Microsoft, Linux, macOS and OS X, Sun, and major versions of UNIX. Progent's broad array of services covers firewall configuration, e-mail security, secure network design, and data recovery. Progent's support staff has been awarded the world's most advanced security certifications including Certified Information Systems Auditor and CISSP. Progent also can provide fast access to online Cisco-certified CCIE network engineers who can deliver world-class assistance with tough network configuration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior machine learning technology to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the entire malware attack progression including protection, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection services deliver economical in-depth protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your company's unique requirements and that helps you prove compliance with legal and industry data protection regulations. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent can also help your company to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.

  • ProSight DPS: Managed Backup
    ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup processes and allows rapid restoration of vital files, applications and VMs that have become lost or damaged as a result of hardware failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class support to set up ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security companies to deliver centralized control and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for small and mid-sized businesses to diagram, monitor, reconfigure and debug their networking appliances such as routers, firewalls, and wireless controllers as well as servers, printers, endpoints and other devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are always updated, captures and displays the configuration information of almost all devices on your network, monitors performance, and sends alerts when problems are discovered. By automating time-consuming management and troubleshooting processes, WAN Watch can knock hours off common chores such as making network diagrams, expanding your network, locating appliances that need important software patches, or identifying the cause of performance problems. Learn more about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management technology to keep your network operating at peak levels by tracking the health of vital computers that drive your information system. When ProSight LAN Watch uncovers an issue, an alert is sent immediately to your designated IT personnel and your assigned Progent engineering consultant so all looming problems can be resolved before they have a chance to impact productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved immediately to a different hosting solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect data about your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or warranties. By updating and organizing your network documentation, you can eliminate up to half of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and mid-size businesses to obtain an unbiased assessment of the health of their network. Based on some of the top remote monitoring and management platforms in the industry, and overseen by Progent's certified team of information technology experts, ProSight Network Audits show you how closely the deployment of your core network devices conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory environment. Both also include one year of cutting-edge remote network monitoring and management. Benefits can include simpler management, better compliance with government and industry security standards, higher utilization of network assets, faster problem resolution, more dependable backup and recovery, and less downtime. See more about ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service centered on a brief phone discussion with a Progent backup/recovery expert. The fact-finding interview is intended to assess your company's ability either to block or recover quickly after an assault by a ransomware variant like Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you personally to collect information concerning your existing security profile and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can apply industry best practices to create an efficient AV and backup system that meets your business needs. For additional information, visit Progent's ProSight Ransomware Preparedness Report Service.

Set-price Security Evaluation and Validation Packages
Progent has put together a number of fixed-price security evaluation bundles that deliver exceptional value by deploying Progent's advanced network monitoring tools plus Progent's technical skills to produce an unbiased and thorough assessment of your IT environment security profile.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two value-priced security inventory scanning service packages designed to enable small businesses to obtain an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your IT system from beyond your firewalled perimeter to identify potential risks in the security profile you expose to the outside. With Progent's Internal Security Inventory Scan, a security expert executes a system scan using an authorized machine inside your corporate firewall to evaluate your vulnerability to inside assaults. The two security inventory scans are set up and executed from a secured external site. The project is administered by a consultant who has been awarded advanced security certifications and who creates a report that details and interprets the data collected by the security scan and recommend various improvements where required.
  • Security Vulnerability Evaluation Packages for Large Organizations
    Progent offers three levels of flat-rate security evaluation service bundles designed for enterprises who need to meet security standards required by government or industry agencies. Progent's security assessment service packages offer larger businesses a chance to get an objective look at the strength of their security posture. For each security assessment bundle, Progent engineers with top security credentials study and report on captured data and offer recommendations for efficient improvements. All the network security audit packages include an extra-cost option for on-premises engineers at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, often known as PEN testing, is a critical technique for allowing businesses to find out how vulnerable their network environments are to current-generation threats. Progent's stealth penetration testing test how well your corporate security policies and platforms resist authorized but unannounced intrusion attempts launched by Progent's certified security experts utilizing advanced hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Should We Do?
Network Security ConsultantsIf your business is currently experiencing a security crisis and you have no formal response procedure, visit Progent's Remote Technical Help to see how to get immediate assistance. Progent provides online help from skilled network technicians and can escalate problems to certified security specialists if necessary. Your business does not need to be a current Progent client to get emergency help for a security problem, but you can sign up as a Progent customer ahead of time for free and your standing as a current customer could save valuable time in case of a crisis.

Typically, smaller businesses have no response procedure in case of a successful attack. This is not good, because the damage from a serious security attack can be more catastrophic for a small company than for a big enterprise. Progent's security consultants can help your company to create an efficient recovery and event reporting procedure that reduces the network disruption following a security breach. The formal post-attack handling model outlined by GIAC is Progent's suggested method for reacting to a serious security incident.

Advanced Security Services Available from Progent
Progent's veteran engineers offer expertise in key facets of IT protection such as:

  • Information Risk Audits and Security Compliance Assessment
    Progent offers expertise with information risk auditing software such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive system tests to uncover potential security problems. Progent has broad experience with monitoring tools and can assist your company to analyze assessment reports and react appropriately. Progent's security engineers also provide web application testing and can perform thorough evaluation of enterprise-wide security to determine your company's compliance with important global security standards including HIPAA, PCI, and ISO. In addition, Progent can evaluate the strength of your wireless security including fixed wireless equipment plus mobile handsets. Find out additional details concerning Progent's Vulnerability Audits and Security Compliance Assessment.
  • Designing, Building, and Testing Protected Environments
    Every organization should develop a thoroughly considered security strategy that includes both proactive and reactive activity. The pre-attack plan is a set of precautions that works to minimize security holes. The reactive plan defines activities to assist security personnel to inventory the losses resulting from an attack, remediate the damage, document the event, and revive business functions as quickly as possible. Progent can advise you how to design security into your business processes, set up auditing software, create and build a secure computer architecture, and propose processes and policies to optimize the protection of your information system. Progent's security professionals are available to assist you to set up a firewall, design safe online and mobile connectivity to e-mail and data, and install an effective VPN. If you are interested in an economical way for jobbing out your network security administration, Progent's 24x7 Network Support Services include non-stop remote server monitoring and quick response to problems.
  • System Recovery and Failure Analysis
    Progent offers expertise in recovering networks and devices that have been compromised, are quarantined, or have ceased to function following a security attack. Progent can help assess the losses resulting from the breach, return your company to ordinary functions, and recover data lost as a result of the assault. Progent's certified specialists can also oversee a comprehensive forensic evaluation by examining activity logs and utilizing a variety of advanced assessment techniques. Progent's background with security issues reduces your business disruption and allows Progent to propose efficient measures to prevent or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
    Cisco Certified CCIE Network Security EngineersThe latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your existing PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
  • Other Firewall and Virtual Private Network Consulting Services
    In addition to being expert in a broad array of security technologies available from Microsoft and Cisco, Progent can provide small businesses top-level engineering services for technologies from other important firewall and VPN suppliers including:
  • SIEM Solutions
    Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of data collected in security incident logs created by multiple sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM applications analyzes the security event records from these diverse sources and creates consolidated reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network experts can help businesses to plan, deploy and manage a SIEM system that enables them to see the progress of security incidents and comply with security incident reporting requirements. (Visit Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security specialists have been awarded some of the most respected accreditations available in the security industry. These certifications demand exhaustive testing and proven field experience to ensure that recipients have mastered a substantial body of security knowledge and methodologies and can offer advanced consulting to information networks of any size.
  • Certified Information Security Manager (CISM) Security Support Expertise
    Certified Information Security Manager (CISM) identifies the fundamental competencies and worldwide standards of service that information technology security professionals are required to achieve. It provides executive management the confidence that those who have earned their CISM possess the experience and skill to provide effective security management and engineering support. Progent can offer a CISM consultant to assist your enterprise in key security areas such as information protection governance, risk management, data security process management, and incident handling management. Learn additional information about Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP certification as a result of demonstrated experience, rigorous study, and formal examination. CISSP Certification recognizes mastery of an international standard for information security. American National Standards Institute has granted the CISSP status official recognition in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security design and models, connection control systems, applications development security, business processes security, physical security, cryptography, telecommunications, network security, and business continuity planning. Learn the details about Progent's CISSP Support Services.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support
    Progent's CISSP-ISSAP Certified cybersecurity architecture experts have earned ISSAP certification after thorough examination and significant experience. field experience with network security architecture. ISSAP consultants have comprehensive knowledge of access control systems and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity and DRP, and physical security. Progent's CISSP-ISSAP-certified security experts can assist your company with all aspects of secure network architecture. Get additional details concerning Progent's ISSAP Certified Secure Network Infrastructure Consulting Support.

  • Certified Information Systems Auditor Professional Expertise
    The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that represents expertise in network security audit and control. Accredited by ANSI, the CISA credential requires that candidates undergo an exhaustive test administered by the ISACA professional group. Progent offers the services of a CISA-Certified security engineer trained to assist businesses in the fields of information systems audit process, IT administration, network assets and infrastructure planned useful life, information technology service delivery, safeguarding information resources, and business continuity preparedness. Find out more details about Progent's Certified Information Systems Auditor (CISA) Consulting Expertise.

  • CRISC Network Risk Mitigation Experts
    The CRISC certification program was established by ISACA to validate an IT professional's skills to design, implement, and maintain IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's network risk mitigation expertise is a good fit the support available from Progent's CISA-Certified security engineers for objectively evaluating your IS control mechanisms and also with the expertise of Progent's CISM-certified consultants for implementing company-wide security policies. Get more information concerning Progent's CRISC-certified Risk Management Expertise.

  • GIAC (Global Information Assurance Certification) Consulting Expertise
    Global Information Assurance Certification was established in 1999 to validate the skill of network security experts. GIAC's goal is to make sure that a certified security consultant has the knowledge appropriate to deliver services in key categories of network, data, and software security. GIAC certifications are recognized by companies and government organizations around the world including and the United States NSA. Progent can provide the support of GIAC certified security engineers for all of the security services addressed under GIAC certification programs such as auditing perimeters, incident response, intrusion detection, and web-based application security. Learn additional information concerning Progent's GIAC (Global Information Assurance Certification) Consulting Assistance.
Contact Progent for Computer Security Help
If you want security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.