Overview of Progent's Security Consulting Services
Progent's industry certified network security experts can provide a wide range of services designed to help businesses of any size to identify and eliminate security vulnerabilities, block attacks, recover from the issues caused by a breach of protection, and meet government requirements for protecting information and reporting security incidents. Progent can provide a choice of service delivery modes:
On-demand Security and Compliance Consulting Services
- On-demand online and on-premises assistance billed by the minute
- Continual fully managed services invoiced at a low fixed monthly fee
- Value-priced service packages for a one-time security assessment
After you sign up for Progent's services (signing up is free), you can get as-needed remote or onsite support from a Progent security expert. This classic support model is essentially reactive and geared toward quickly resolving technical problems that are disrupting your productivity or that are beyond the scope of your in-house support staff. Common scenarios include replacing a firewall appliance or VPN tunnel, installing a vital security update for a Cisco switch or router, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These security services are invoiced by the minute, which eliminates the frustrating situation of getting large invoices for fast repairs.
Delivery options for Progent's on-demand support include:
Progent's security consultants are premier to provide help for environments based on Microsoft Windows, Linux, Apple Mac, Solaris, and major derivatives of UNIX. Progent's broad selection of consulting services addresses firewall technology, email systems, protected network architecture, and information recovery. Progent's technical support team has earned the world's top security credentials including CISM and Certified Information Systems Security Professional (CISSP). Progent also can provide fast access to online Cisco-certified CCIE network engineers who can provide advanced assistance with tough network configuration problems.
- Online Security Support Services
The majority security-related problems can be resolved online through a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide remote security help by offering efficient access to consultants with the experience and resources to resolve some of the most challenging problems quickly, keeping your service expenses affordable and reducing lost productivity.
- On-premises Security Services
For cases where onsite support is necessary, Progent can send a technical professional to major cities throughout the United States. Progent can also dispatch a security specialist with top certifications and advanced skills to any location in the country.
ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis tools to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-based AV tools. ProSight ASM safeguards local and cloud-based resources and offers a single platform to address the complete threat lifecycle including protection, identification, containment, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection services deliver economical multi-layer security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering through leading-edge tools packaged within a single agent managed from a unified control. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP environment that addresses your company's specific requirements and that allows you prove compliance with legal and industry data protection regulations. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent attention. Progent's consultants can also help your company to set up and verify a backup and restore solution such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
- ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates and monitors your backup activities and enables rapid recovery of critical data, applications and VMs that have become unavailable or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can provide advanced support to set up ProSight Data Protection Services to to comply with regulatory standards like HIPAA, FINRA, and PCI and, whenever necessary, can help you to recover your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to deliver web-based management and world-class security for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter serves as a first line of defense and blocks most threats from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to map, monitor, reconfigure and debug their connectivity appliances like switches, firewalls, and load balancers as well as servers, printers, client computers and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch ensures that network diagrams are always updated, captures and manages the configuration of virtually all devices connected to your network, monitors performance, and sends notices when issues are discovered. By automating tedious network management activities, WAN Watch can cut hours off common tasks like network mapping, expanding your network, locating devices that need important updates, or identifying the cause of performance problems. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management techniques to keep your network operating at peak levels by tracking the state of critical assets that drive your business network. When ProSight LAN Watch detects an issue, an alert is transmitted immediately to your specified IT management staff and your Progent engineering consultant so that all potential issues can be resolved before they can impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your IT infrastructure documentation, you can save up to 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and affordable alternative for small and medium-size organizations to obtain an objective assessment of the overall health of their network. Powered by some of the leading remote monitoring and management tools available, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits help you see how well the deployment of your core network assets adhere to leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide instant benefits such as a cleaner Active Directory environment. Both also include a year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with government and industry security standards, higher utilization of network resources, faster troubleshooting, more dependable backup and restore, and higher availability. Learn more about Progent's ProSight Network Audits network infrastructure review.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service built around a brief phone interview with a Progent information assurance expert. The interview is intended to evaluate your company's preparedness to stop or recover quickly after an attack by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to gather information about your existing antivirus tools and backup/recovery platform, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can apply industry best practices to build a cost-effective AV and backup/recovery environment that meets your business requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report.
Flat-rate Security Evaluation and Verification Packages
Progent has put together a number of fixed-price security and compliance assessment bundles that deliver exceptional value by deploying Progent's advanced system monitoring and analysis tools as well as Progent's consulting skills to create an objective and thorough assessment of your network security posture.
We've Been Hacked: What Do We Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory packages designed to allow small businesses to obtain an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your network from outside your firewalled perimeter to identify possible gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan from an authorized computer inside your company firewall to assess your vulnerability to inside attacks. These two security inventory services are set up and executed from a secured external site. The project is managed by a consultant who has earned high-level security certifications and who produces a report that describes and evaluates the data collected by the scan and recommend practical improvements where appropriate.
- Security Vulnerability Evaluation Packages for Enterprises
Progent has developed three levels of flat-rate security assessment service bundles designed for enterprises who need to meet compliance standards required by state or industry regulators. Progent's security assessment service packages offer larger businesses a chance to get an objective assessment at the strength of their security posture. For every security evaluation package, Progent consultants with advanced security credentials study and report on captured data and offer suggestions for efficient improvements. Each of the network security assessment packages include an added-cost option for on-premises engineers at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly called PEN testing, is an accepted tool for allowing organizations to determine how open their network systems are to current-generation attacks. Progent's stealth penetration testing services check how well your existing security procedures and technologies resist authorized but unannounced penetration attempts managed by Progent's certified security specialists using advanced hacking methods. Find out about Progent's stealth penetration testing services.
If your company is currently fighting a network security emergency and you have no formal recovery procedure, go to Progent's Remote Technical Help to learn how to receive fast assistance. Progent offers online technical support from experienced engineers and can escalate trouble tickets to high-level security specialists if necessary. Your organization does not have to be a current Progent customer to get emergency help for a security breach, but you can register as a Progent client in advance at no cost and your status as a current customer can save valuable time in an emergency.
Usually, smaller businesses have no recovery procedure in case of a successful penetration. This is risky, because the cost of a successful security assault can be more catastrophic for a small company than for a big enterprise. Progent's security specialists can help your company to design a practical response and event reporting plan that reduces the IT system downtime resulting from an attack. The step-by-step post-attack handling model outlined by Global Information Assurance Certification is Progent's suggested procedure for handling a major security incident.
High-value Security Expertise Available from Progent
Progent's certified security consultants can provide specialized help in key areas of IT security including:
Progent's Security Accreditations
- Vulnerability Audits and Compliance Testing
Progent offers experience with information risk evaluation software like MS Baseline Security Analyzer and LANguard for conducting a variety of comprehensive network scans to uncover possible security problems. Progent has extensive experience with monitoring utilities and can assist your company to analyze audit results and react efficiently. Progent's certified security engineers also can perform web software validation and can perform thorough assessments of corporate-wide security to determine your organization's compliance with key global security specifications such as FISMA, NIST, and ISO. Also, Progent can assess the effectiveness of your wireless protection including stationary wireless appliances plus mobile devices. Learn the details concerning Progent's Information Risk Evaluation and Security Compliance Assessment.
- Designing, Building, and Testing Secure Networks
Every company should develop a thoroughly thought out security plan that incorporates both proactive and responsive elements. The pre-attack plan is a set of steps that works to minimize vulnerabilities. The post-attack plan specifies activities to assist IT staff to assess the losses caused by a breach, remediate the damage, document the event, and restore network functions as soon as possible. Progent can show you how to design protection into your business operations, configure auditing software, create and implement a safe IT infrastructure, and propose processes and policies to enhance the safety of your computing environment. Progent's security professionals are available to help you to configure a firewall, deploy safe offsite connectivity to e-mail and data, and configure an efficient VPN. If your company is interested in an affordable option for jobbing out your security administration, Progent's 24x7 Monitoring Services include continual online system tracking and quick response to problems.
- Data Restoration and Security Forensics
Progent provides expertise in restoring networks and computers that have been hacked, are suspect, or have failed as a result of a security attack. Progent can help assess the losses resulting from the breach, restore ordinary functions, and recover information lost as a result of the attack. Progent's security specialists can also perform a thorough failure evaluation by going over event logs and utilizing other advanced forensics techniques. Progent's experience with security consulting reduces your business disruption and allows Progent to recommend efficient measures to prevent or mitigate new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
- Other Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
In addition to offering support for a wide range of security solutions available from Microsoft and Cisco, Progent offers small and mid-size businesses expert consulting for solutions from other major firewall and Virtual Private Network vendors by offering services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to digest the massive quantity of data collected in security event logs created by multiple sources such as network appliances, servers, and applications and monitoring tools. SIEM applications organizes the security event records from these diverse sources and produces summary reports of security incidents as mandated by state regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco CCIE certified network experts can help businesses to design, deploy and manage a SIEM solution that enables them to see the progress of security incidents and comply with security incident reporting requirements. (Visit Progent's SIEM solutions.)
Progent's security specialists have been awarded some of the most prestigious accreditations available in the security industry. These accreditations require exhaustive examinations and demonstrated work background to guarantee that recipients have mastered a significant amount of security information and methodologies and can provide high-level solutions to information environments of any size.
Get in Touch with Progent for Computer Security Expertise
- CISM Security Consulting Services
Certified Information Security Manager defines the basic skills and international standards of service that IT security managers are expected to master. CISM provides business management the confidence that consultants who have earned their certification possess the background and knowledge to offer effective security administration and consulting support. Progent can provide a CISM-certified consultant to help your organization in vital security areas such as data security governance, risk management, data security process control, and incident response management. Get additional information concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.
- CISSP Security Consulting Services
Progent's CISSP experts are security specialists who have earned CISSP status through verified professional work, extensive study, and formal examination. CISSP Certification indicates expertise in an international standard for IT security. ANSI has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security design and test systems, access permission systems, applications development security, business processes security, hardware security, cryptography, communications, network security, and disaster recovery planning. Get the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP certification after rigorous examination and extensive experience. field experience with information security architecture. ISSAP security experts have acquired in-depth understanding of access management mechanisms and methodologies, telecommunications and network protection, cryptography, needs evaluation, business continuity and DRP, and physical security integration. Progent's CISSP-ISSAP-certified security experts can help your company with all aspects of secure network architecture. Read additional details about Progent's ISSAP Accredited Secure IT Infrastructure Consulting Services.
- Certified Information Systems Auditor (CISA) Support Services
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo an exhaustive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-Certified security consultant able to assist companies in the fields of IS audit services, IT administration, systems and architecture planned useful life, information technology support, protecting data assets, and business continuity preparedness. Read more details concerning Progent's Certified Information Systems Auditor (CISA) Consulting Services.
- CRISC Risk Management Specialists
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and maintain IS control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's risk mitigation expertise is a good fit the support available from Progent's CISA-Premier consultants for objectively auditing your IS control design and also with the services of Progent's CISM experts for defining company-wide security policies and procedures. Learn additional information about Progent's CRISC-certified Risk Management Consulting.
- Global Information Assurance Certification Professional Expertise
GIAC was established in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to make sure that a certified professional possesses the knowledge necessary to provide services in key categories of network, data, and application security. GIAC certifications are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of GIAC certified security engineers for all of the security capabilities covered under GIAC accreditation topics including assessing perimeters, incident handling, intrusion detection, and web services security. Learn additional information concerning Progent's Global Information Assurance Certification Consulting Expertise.
If you need security support services, telephone Progent at 800-993-9400 or refer to Contact Progent.