Overview of Progent's Security Consulting Services
Progent's certified computer security and compliance experts can provide a broad selection of support services designed to assist organizations of any size to detect and eliminate security weaknesses, block malicious attacks, recover from the issues resulting from a breakdown of protection, and meet regulatory mandates for guarding data and reporting security incidents. Progent offers a selection of service delivery modes:
As-needed Security Support Services
- As-needed remote and on-premises support billed by the minute
- Continual fully managed services billed at an affordable flat monthly fee
- Value-priced service bundles for a single security evaluation
Once you register for Progent's services (signing up is free), you can receive as-needed remote or onsite assistance from one of Progent security and compliance expert. This classic support model is primarily reactive and geared toward rapidly resolving IT issues that are impacting your productivity or that are beyond the scope of your in-house support staff. Typical examples are debugging a firewall appliance or VPN connection, implementing a critical security update for a Cisco switch, setting up secure access to a public cloud, or recovering from a ransomware assault. These security services are invoiced to the nearest minute, which eliminates the annoying situation of receiving large bills for quick fixes.
Delivery options for Progent's as-needed support services include:
Progent's security engineers are premier to provide help for systems powered by Microsoft Windows, Linux, macOS and OS X, Sun, and major derivatives of UNIX. Progent's broad range of services covers firewall expertise, e-mail systems, protected system design, and data restoration. Progent's support team has earned the world's top security accreditations including Certified Information Systems Auditor (CISA) and ISSAP. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can provide advanced assistance with complex network integration problems.
- Remote Security Services
The majority security issues can be resolved online through a combination of phone-based support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver remote security help by offering efficient access to consultants who have the experience and resources to fix many of the most challenging problems quickly, keeping your service costs affordable and minimizing downtime.
- Onsite Security Support
For cases where onsite support is necessary, Progent can send a technical professional to major cities across the U.S. Progent can also send a security specialist with high-level certifications and advanced skills to any site in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology to guard endpoints as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily escape traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to address the entire threat progression including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge technologies incorporated within a single agent managed from a single control. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP deployment that addresses your company's specific needs and that allows you prove compliance with government and industry data security standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent's consultants can also help you to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup processes and allows fast restoration of vital data, apps and virtual machines that have become lost or damaged as a result of hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can provide world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPAA, FIRPA, and PCI and, when necessary, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to deliver centralized management and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper level of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for smaller organizations to diagram, track, reconfigure and troubleshoot their connectivity appliances like routers, firewalls, and access points plus servers, endpoints and other networked devices. Incorporating state-of-the-art RMM technology, WAN Watch ensures that network diagrams are kept current, copies and manages the configuration information of almost all devices on your network, tracks performance, and generates alerts when issues are detected. By automating complex management activities, WAN Watch can cut hours off common chores like network mapping, reconfiguring your network, finding appliances that need critical updates, or identifying the cause of performance issues. Find out more about ProSight WAN Watch network infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to help keep your IT system running efficiently by tracking the state of critical computers that power your business network. When ProSight LAN Watch detects a problem, an alert is sent automatically to your specified IT personnel and your Progent engineering consultant so that any looming issues can be resolved before they can impact your network Learn more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hosting environment without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a fast and affordable way for small and medium-size organizations to obtain an unbiased evaluation of the health of their network. Powered by a selection of the leading remote monitoring and management platforms in the industry, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential infrastructure devices conform to best practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide immediate benefits like a more manageable Active Directory system. Both versions also include one year of advanced remote network monitoring and management (RMM). Benefits can include lower-cost network management, better compliance with data security standards, more efficient utilization of IT resources, faster problem resolution, more dependable backup and restore, and less downtime. See more about Progent's ProSight Network Audits network infrastructure review.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service built around a phone interview with a Progent information assurance consultant. The interview is designed to evaluate your organization's preparedness to block or recover rapidly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to gather information about your current antivirus tools and backup platform, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow best practices to build an efficient security and backup system that meets your company's needs. For details, visit The ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Packages
Progent has put together a variety of fixed-price security and compliance assessment bundles that provide exceptional value by utilizing Progent's enterprise-class network monitoring and analysis tools plus Progent's consulting experience to create an objective and comprehensive evaluation of your network security profile.
Our System Has Been Hacked: What Should We Do?
- Security Assessment Service Bundles for Small Businesses
Progent offers two value-priced security inventory packages designed to enable small organizations to obtain a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive examination of your IT system from outside your firewalled perimeter to identify potential gaps in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan from an authorized computer within your corporate firewall to evaluate your vulnerability to internal threats. The two security inventory services are set up and executed from a secured offsite location. The project is managed by an engineer who has earned advanced security certifications and who creates a document that describes and interprets the data collected by the security scan and suggests practical improvements where required.
- Security Vulnerability Assessment Bundles for Large Businesses
Progent offers three levels of set-price security assessment service packages designed for large organizations who need to meet compliance standards required by government or industry regulators. Progent's security evaluation service bundles offer enterprises a chance to obtain a professional assessment at the viability of their security posture. For every security evaluation package, Progent consultants with top security credentials study and report on captured data and offer recommendations for cost-effective improvements. All the network security audit packages include an extra-cost option for on-premises consultants at any location in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, commonly referred to as PEN testing, is an accepted tool for helping organizations to determine how open their IT systems are to modern attacks. Progent's stealth penetration testing test how well your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security experts using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If you are now experiencing a security emergency and you have no detailed recovery plan, refer to Progent's Online Computer Help to learn how to get immediate assistance. Progent provides remote technical support from skilled network technicians and can escalate problems to certified security experts if necessary. Your company does not need to be a current Progent customer to receive emergency support for a security problem, but you can register as a Progent client ahead of time at no cost and your status as a registered customer can save precious time during an emergency.
Usually, smaller companies have not documented a recovery plan in case of a successful penetration. This is not good, since the cost of a successful security assault can be even more catastrophic for a small company than for a large corporation. Progent's security consultants can assist your you to create a practical recovery and event reporting procedure that minimizes the IT system disruption following a security breach. The formal post-attack response procedure promoted by Global Information Assurance Certification is Progent's preferred method for reacting to a major security incident.
High-value Security Expertise Available from Progent
Progent's seasoned consultants offer expertise in vital areas of network compliance such as:
Progent's Security Credentials
- Information Risk Evaluation and Security Compliance Testing
Progent offers experience with security auditing software such as Microsoft Baseline Security Analyzer or LANguard for performing a variety of automatic system tests to reveal possible security gaps. Progent has extensive experience with these tools and can assist your company to analyze assessment reports and react efficiently. Progent's certified security engineers also provide web software validation and can perform thorough evaluation of corporate-wide security to determine your company's compliance with major global security specifications such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including fixed wireless equipment as well as mobile handsets. Find out additional information about Progent's Information Risk Audits and Security Compliance Testing.
- Planning, Building, and Testing Secure Environments
Any organization should develop a carefully thought out security strategy that incorporates both preventive and reactive steps. The pre-attack plan is a collection of precautions that works to reduce security holes. The post-attack strategy defines procedures to assist security personnel to inventory the damage resulting from a breach, repair the damage, document the event, and restore business functions as soon as possible. Progent can advise you how to design security into your company processes, install scanning software, create and execute a secure network architecture, and recommend procedures and policies to maximize the protection of your information system. Progent's security professionals are available to assist you to set up a firewall, design secure offsite connectivity to e-mail and data, and install an efficient virtual private network (VPN). If you are interested in an affordable option for outsourcing your security management, Progent's 24x7 Monitoring Services feature automated online system monitoring and quick resolution of emergencies.
- System Recovery and Security Forensics
Progent has expertise in recovering systems and devices that have been hacked, are suspect, or have ceased to function as a result of a security attack. Progent can show you how to evaluate the losses caused by the attack, return your company to normal functions, and recover data lost as a result of the breach. Progent's security engineers can also perform a comprehensive failure analysis by going over activity logs and utilizing other advanced forensics tools. Progent's experience with security problems reduces your downtime and permits Progent to propose effective strategies to prevent or contain future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
- Other Firewall and Virtual Private Network (VPN) Solutions Provided by Progent
In addition to supporting a wide array of protection technologies available from Microsoft and Cisco, Progent offers small organizations top-tier consulting for solutions from other major firewall and Virtual Private Network vendors by delivering services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to digest the massive quantity of information collected in security event logs generated by multiple sources such as network appliances, operating systems, and applications and tools. SIEM applications analyzes the security logs from these various sources and produces summary reports of security events as required by state regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure consultants can assist businesses to plan, deploy and manage a SIEM system that enables them to see the progress of attacks and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's security specialists have been awarded some of the most prestigious certifications offered in the security industry. All of these certifications demand exhaustive examinations and proven field background to ensure that recipients have acquired expertise with a significant body of security information and techniques and can offer advanced consulting to information networks of any complexity.
Contact Progent for Network Security Consulting Services
- CISM Security Support Services
Certified Information Security Manager identifies the basic skills and international standards of performance that computer security professionals are required to achieve. It offers business management the confidence that consultants who have earned their accreditation have the background and knowledge to provide efficient security management and consulting services. Progent can offer a CISM expert to assist your organization in critical security disciplines including data security governance, risk assessment, information security process control, and crisis response support. Read additional information concerning Progent's CISM Security Consulting Assistance.
- CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP status through demonstrated professional work, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in an international standard for IT security. ANSI has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include security administration procedures, security design and models, access control methodology, applications development security, operations security, physical security, cryptography, telecommunications, network security, and disaster recovery planning. Learn more details about Progent's CISSP Support Assistance.
- CISSP-ISSAP} Security Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier cybersecurity architecture experts have earned ISSAP status following rigorous examination and substantial experience. field experience with information security architecture. ISSAP security experts have acquired in-depth understanding of access control systems and techniques, phone system and network protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-premier security specialists can assist your company with all aspects of architecture security. Get more information concerning Progent's ISSAP Accredited Secure Network Infrastructure Consulting Assistance.
- CISA Support Services
The CISA accreditation is a globally recognized achievement that represents expertise in network security audit and control. Certified by ANSI, the CISA accreditation has candidates undergo an extensive examination given by the ISACA international professional association. Progent offers the services of a CISA-Certified security audit engineer trained to help businesses in the areas of information systems audit process, information technology governance, systems and infrastructure planned useful life, IT service delivery, safeguarding data assets, and business continuity preparedness. Learn the details about Progent's Certified Information Systems Auditor (CISA) Professional Expertise.
- CRISC Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's skills to plan, implement, and support IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity plan based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's network risk management expertise is a good fit the services available from Progent's CISA-Premier security engineers for objectively auditing your IT control design and with the services of Progent's CISM-certified consultants for designing security policies and procedures. Learn additional details concerning Progent's CRISC Risk Management Support.
- Global Information Assurance Certification Professional Services
GIAC was founded in 1999 to validate the knowledge of computer security experts. GIAC's mission is to verify that an accredited professional possesses the skills necessary to deliver services in key areas of system, data, and application software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States National Security Agency. Progent can provide the support of certified consultants for any of the network security services covered within GIAC accreditation programs such as auditing perimeters, security incident handling, traffic analysis, and web-based services security. Find out more information concerning Progent's GIAC Support Expertise.
If you're looking for network security engineering help, phone Progent at 800-993-9400 or refer to Contact Progent.