Overview of Progent's Security Consulting Services
Progent's industry certified network security and compliance consultants offer a broad range of support services intended to assist companies of all sizes to uncover and correct security vulnerabilities, block assaults, recover from any damage caused by a breach of protection, and comply with government requirements for guarding information and reporting security incidents. Progent offers a selection of service delivery modes:

  • On-demand remote and on-site support invoiced to the nearest minute
  • On-going managed services invoiced at a low flat monthly rate
  • Value-priced service bundles for a one-time security and compliance evaluation
As-needed Security Support Services
Once you sign up for Progent's services (registration is free), you can get as-needed online or onsite support from a Progent security and compliance consultant. This traditional support model is primarily reactive and geared toward quickly taking care of technical problems that are affecting your network or that are beyond the scope of your own support staff. Common scenarios are configuring a firewall or VPN connection, installing a vital security patch for a Cisco switch or router, setting up secure access to a public cloud, or restoring data after a ransomware assault. These security services are invoiced by the minute, which avoids the annoying situation of getting large bills for fast repairs.

Delivery alternatives for Progent's on-demand support services include:

  • Remote Security Services
    The majority security issues can be handled online via a combination of phone support and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver remote security support by offering easy access to consultants who have the experience and resources to fix some of the most challenging problems quickly, making your support expenses affordable and minimizing lost productivity.
  • On-premises Security Support
    For cases where on-premises support is required, Progent can dispatch a technical professional to major metropolitan areas throughout the U.S. Progent can also dispatch a security consultant with top certifications and advanced skills to any location in the country.
Progent's security consultants are premier to support systems based on Windows, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's broad range of consulting services addresses firewall technology, email and messaging security, protected system architecture, and data restoration. Progent's technical support team has been awarded the industry's most advanced security credentials including Global Information Assurance Certification and ISSAP. Progent also can provide fast access to remote Cisco-certified CCIE network infrastructure consultants who can deliver advanced support with tough network integration problems.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior machine learning technology to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to address the entire threat progression including blocking, identification, containment, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device management, and web filtering through cutting-edge tools incorporated within one agent managed from a single control. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that meets your company's specific needs and that allows you demonstrate compliance with government and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent's consultants can also assist you to install and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.

  • ProSight DPS: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and allows rapid restoration of critical data, applications and VMs that have become unavailable or corrupted as a result of hardware failures, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver advanced expertise to configure ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your critical information. Find out more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the technology of top data security vendors to provide web-based control and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's on-premises gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map out, track, enhance and debug their connectivity hardware like switches, firewalls, and load balancers plus servers, endpoints and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology maps are always updated, captures and manages the configuration of almost all devices connected to your network, monitors performance, and generates notices when potential issues are detected. By automating time-consuming network management processes, WAN Watch can knock hours off common chores such as network mapping, reconfiguring your network, locating devices that need critical software patches, or resolving performance issues. Learn more about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management technology to keep your IT system operating efficiently by checking the health of vital assets that drive your business network. When ProSight LAN Watch uncovers an issue, an alert is transmitted immediately to your designated IT personnel and your Progent consultant so that any potential problems can be addressed before they have a chance to disrupt productivity Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hardware solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect data related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or domains. By updating and organizing your network documentation, you can eliminate up to 50% of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable alternative for small and mid-size organizations to obtain an unbiased assessment of the overall health of their network. Based on a selection of the leading remote monitoring and management (RMM) platforms available, and supervised by Progent's certified team of IT professionals, ProSight Network Audits help you see how well the configuration of your core network assets conform to leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI such as a more manageable Active Directory (AD) environment. Both versions also include one year of state-of-the-art remote network monitoring and management. Advantages can include lower-cost management, better compliance with information security requirements, higher utilization of IT assets, quicker problem resolution, more dependable backup and restore, and higher availability. See more information about Progent's ProSight Network Audits IT infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is an affordable service based on a brief phone interview with a Progent information assurance consultant. The fact-finding interview is intended to help evaluate your organization's preparedness either to block or recover quickly after an attack by a ransomware strain like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to collect information about your existing antivirus tools and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can apply best practices to create an efficient security and backup/recovery environment that aligns with your company's needs. For details, see The ProSight Ransomware Preparedness Report Service.

Fixed-price Security Assessment and Verification Packages
Progent has put together a selection of flat-rate security and compliance evaluation bundles that deliver exceptional value by deploying Progent's advanced network monitoring tools plus Progent's consulting skills to create an unbiased and thorough evaluation of your IT environment security profile.

  • Security Inventory Service Bundles for Small Businesses
    Progent offers two value-priced security inventory service packages designed to enable small businesses to get an objective security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive examination of your IT system from beyond your corporate firewall to identify potential gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized machine within your corporate firewall to evaluate your vulnerability to inside threats. These two security inventory scanning services are set up and run from a secured external site. The scan is administered by an engineer who has earned high-level security certifications and who creates a report that details and interprets the data collected by the security scan and suggests practical enhancements where appropriate.
  • Security Vulnerability Assessment Packages for Enterprises
    Progent offers three levels of set-price security assessment service packages intended for enterprises who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service packages offer larger organizations an opportunity to obtain an objective look at the strength of their security posture. For each security assessment package, Progent engineers with top security credentials analyze and report on captured data and offer recommendations for cost-effective improvements. All the network security assessment bundles include an extra-cost option for on-premises engineers at any location in the U.S.
  • Stealth Penetration Testing
    Stealth penetration testing, often called PEN testing, is a vital tool for helping businesses to find out how vulnerable their network environments are to modern attacks. Progent's stealth penetration testing services test how well your existing security policies and technologies resist authorized but unannounced penetration attempts launched by Progent's certified security experts using cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Can We Do?
Network Security ConsultantsIf your business is now experiencing a network security crisis and you do not have a detailed recovery plan, refer to Progent's Remote Computer Support to find out how to get immediate help. Progent offers online help from skilled network technicians and can escalate problems to high-level security experts if required. Your company does not need to be a registered Progent client to get urgent support for a security breach, but you can register as a Progent client in advance for free and your standing as a registered client could save valuable time in an emergency.

Typically, smaller businesses do not have a response procedure in case of a damaging penetration. This is risky, since the cost of a serious security assault can be even more catastrophic for a small business than for a big corporation. Progent's security specialists can help your business to create an efficient response and event reporting procedure that reduces the IT system disruption resulting from an attack. The formal incident handling model outlined by GIAC (Global Information Assurance Certification) is Progent's suggested method for responding to a serious security penetration.

High-value Security Services Available from Progent
Progent's security consultants can provide expertise in vital facets of network security including:

  • Vulnerability Audits and Security Compliance Assessment
    Progent offers experience with security auditing tools like Microsoft Baseline Security Analyzer or LANguard for conducting a variety of comprehensive system scans to reveal possible security problems. Progent has broad experience with these tools and can help you to analyze assessment reports and respond efficiently. Progent's certified security consultants also offer web application testing and can perform thorough assessments of corporate-wide security to confirm your company's compliance with major global security standards such as HIPAA, NIST, and ISO. In addition, Progent can assess the effectiveness of your wireless security covering fixed wireless appliances as well as mobile handsets. Read the details about Progent's Vulnerability Audits and Security Compliance Assessment.
  • Designing, Implementing, and Validating Secure Environments
    Any organization ought to develop a thoroughly considered security strategy that incorporates both proactive and reactive activity. The proactive plan is a set of precautions that works to minimize security holes. The post-attack strategy specifies activities to help IT staff to inventory the losses resulting from a breach, repair the damage, record the event, and restore network activity as soon as feasible. Progent can show you how to build protection into your business processes, install scanning utilities, create and implement a secure IT infrastructure, and propose procedures and policies that will optimize the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, deploy safe remote access to email and data, and configure an effective VPN. If your company is looking for an affordable option for jobbing out your security administration, Progent's Round-the-clock Monitoring Packages feature non-stop online system tracking and quick response to problems.
  • System Recovery and Security Forensics
    Progent offers skill in restoring systems and computers that have been hacked, are in question, or have ceased to function because of a security attack. Progent can help determine the damage resulting from the assault, restore normal functions, and retrieve information compromised owing to the assault. Progent's certified specialists can also oversee a thorough forensic evaluation by going over event logs and utilizing a variety of advanced forensics techniques. Progent's experience with security problems reduces your off-air time and allows Progent to recommend efficient strategies to avoid or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
    Cisco CCIE Security EngineersThe current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
  • Other Firewall and Virtual Private Network (VPN) Technologies
    In addition to being expert in a wide array of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size businesses top-level support for security products from other major firewall and VPN vendors including:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are designed to make sense the massive amounts of information represented by security event records generated by multiple sources including network infrastructure appliances, servers, and applications and monitoring tools. SIEM software organizes the security event records from these diverse sources and creates consolidated reports of security incidents as required by state regulations and industry compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network consultants can help businesses to design, install and operate a SIEM solution that helps them to understand the progress of security incidents and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security specialists have been awarded some of the most respected certifications available in the security industry. All of these accreditations demand exhaustive examinations and proven field experience to guarantee that recipients have acquired expertise with a significant body of security information and techniques and can offer high-level security solutions to information networks of any size.
  • Certified Information Security Manager Security Support Services
    CISM defines the core skills and international standards of service that IT security professionals are required to master. CISM offers executive management the confidence that those who have been awarded their accreditation possess the background and knowledge to provide efficient security management and consulting support. Progent can offer a CISM expert to help your organization in critical security disciplines including data protection governance, risk management, data security process control, and incident response support. Get more information concerning Progent's CISM Security Consulting Expertise.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have earned CISSP status as a result of verified experience, rigorous study, and formal examination. CISSP qualification indicates mastery of an international standard for IT security. ANSI has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security administration procedures, security design and models, access control methodology, software development security, business processes security, physical security, encryption, telecommunications, network security, and business continuity planning. Get more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • CISSP-ISSAP} Security Architecture Consulting Services
    Progent's CISSP-ISSAP Certified security architecture experts have earned ISSAP accreditation as a result of rigorous examination and substantial experience. field experience with information security design. ISSAP consultants possess in-depth understanding of access management mechanisms and techniques, phone system and network security, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security. Progent's CISSP-ISSAP-premier security consultants can help your business with all phases of architecture security. Learn more details concerning Progent's ISSAP Accredited Protected Network Infrastructure Consulting Support.

  • CISA Professional Expertise
    The Certified Information Systems Auditor accreditation is a prestigious achievement that indicates mastery in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates undergo an extensive examination administered by the ISACA international professional group. Progent can provide the services of a CISA-Certified security consultant able to assist companies in the fields of information systems audit process, IT enforcement, systems and infrastructure lifecycle, information technology support, safeguarding data assets, and business continuity preparedness. Learn additional information about Progent's Certified Information Systems Auditor (CISA) Professional Assistance.

  • CRISC-certified IT Risk Management Experts
    The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's ability to design, implement, and maintain IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a business continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's risk management expertise is a good fit the support provided by Progent's CISA-Certified security engineers for objectively auditing your IS control design and also with the expertise of Progent's CISM consultants for defining security policies and procedures. Get more details concerning Progent's CRISC IT Risk Management Support.

  • GIAC Support Services
    GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security professionals. GIAC's mission is to verify that an accredited professional possesses the skills needed to provide support in key categories of network, data, and software security. GIAC certifications are recognized by companies and government organizations throughout the world including and the United States National Security Agency. Progent can provide the support of GIAC certified consultants for all of the security capabilities covered under GIAC certification programs including auditing perimeters, incident handling, traffic analysis, and web-based application security. Read more information concerning Progent's GIAC Consulting Assistance.
Contact Progent for Network Security Support
If you need network security expertise, telephone Progent at 800-993-9400 or see Contact Progent.