Overview of Progent's Security and Compliance Support Services
Progent's certified network security and compliance experts can provide a broad range of services designed to assist organizations of any size to identify and eliminate security vulnerabilities, block assaults, recover from the issues resulting from a breach of security, and comply with regulatory requirements for protecting data and reporting incidents. Progent can provide a selection of service modes:

  • On-demand remote and on-premises support invoiced by the minute
  • Continual managed services invoiced at an affordable flat monthly fee
  • Set-price service packages for a single security and compliance assessment
On-demand Security Consulting Services
After you register for Progent's services (signing up is free), you can receive as-needed remote or onsite support from a Progent security and compliance expert. This classic service model is primarily reactive and optimized for rapidly resolving IT issues that are affecting your productivity or that have stumped your own support personnel. Common scenarios include debugging a firewall or VPN tunnel, implementing a critical security update for a Cisco switch, designing secure access to cloud-based resources, or recovering from a ransomware attack. These security services are billed to the nearest minute, which eliminates the annoying situation of receiving big bills for fast fixes.

Delivery alternatives for Progent's on-demand support services include:

  • Remote Security Support
    Most security problems can be resolved remotely through a combination of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide remote security help by offering efficient access to consultants with the background and resources to resolve many of the most challenging problems quickly, making your service expenses low and minimizing downtime.
  • On-premises Security Services
    For instances where on-premises support is necessary, Progent can send a technical professional to major metropolitan areas throughout the U.S. Progent can also dispatch a security specialist with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited security engineers are certified to provide help for environments powered by Microsoft, Linux, macOS and OS X, Sun Solaris, and popular versions of UNIX. Progent's wide selection of services covers firewall expertise, e-mail security, protected system architecture, and information restoration. Progent's support team has earned the industry's top security certifications including GIAC (Global Information Assurance Certification) and ISSAP. Progent also offers fast access to remote Cisco CCIE network engineers who can provide world-class assistance with complex network configuration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology to guard endpoint devices and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely get by legacy signature-based AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a single platform to manage the entire threat progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge technologies packaged within one agent accessible from a single console. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's unique requirements and that allows you prove compliance with legal and industry data security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical data, applications and virtual machines that have become unavailable or corrupted due to component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your critical information. Find out more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to deliver centralized control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for smaller organizations to diagram, track, enhance and troubleshoot their networking appliances like routers, firewalls, and access points as well as servers, endpoints and other networked devices. Using state-of-the-art RMM technology, ProSight WAN Watch makes sure that network diagrams are always updated, captures and manages the configuration information of virtually all devices on your network, monitors performance, and generates notices when potential issues are detected. By automating complex management and troubleshooting activities, ProSight WAN Watch can knock hours off common tasks like network mapping, reconfiguring your network, locating appliances that require critical software patches, or resolving performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management techniques to help keep your IT system running at peak levels by tracking the state of vital assets that drive your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your specified IT personnel and your Progent consultant so any looming issues can be resolved before they can disrupt productivity Learn more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved immediately to a different hardware environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information related to your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can eliminate up to 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost way for small and medium-size organizations to get an objective assessment of the health of their network. Powered by some of the leading remote monitoring and management tools available, and supervised by Progent's certified team of IT professionals, ProSight Network Audits show you how closely the deployment of your core network assets adhere to best practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI like a more manageable Active Directory (AD) environment. Both also include one year of cutting-edge remote network monitoring and management. Benefits can include easier network management, improved compliance with data security standards, higher utilization of IT assets, faster troubleshooting, more reliable backup and restore, and higher availability. Learn more about Progent's ProSight Network Audits IT infrastructure assessment.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service centered on a brief phone discussion with a Progent information assurance consultant. The interview is intended to evaluate your organization's preparedness to block or recover rapidly following an assault by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to gather information concerning your existing security profile and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply industry best practices to build an efficient AV and backup environment that aligns with your company's needs. For additional information, see Progent's ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Validation Bundles
Progent has put together a selection of fixed-price security and compliance evaluation bundles that deliver high value by deploying Progent's advanced system monitoring and analysis tools as well as Progent's consulting skills to create an unbiased and comprehensive assessment of your network security posture.

  • Security Inventory Service Packages for Small Organizations
    Progent offers two value-priced security inventory packages designed to allow small organizations to get a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from beyond your corporate firewall to identify potential gaps in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from an authorized machine inside your corporate firewall to assess your exposure to internal threats. The two security inventory scanning services are configured and run from a secured offsite location. The scan is administered by an engineer who has been awarded advanced security certifications and who creates a document that describes and evaluates the data captured by the scan and suggests practical improvements where required.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent has developed three levels of set-price security evaluation service packages designed for large organizations who need to meet security standards required by state or industry agencies. Progent's security evaluation service packages offer larger organizations an opportunity to get a professional look at the viability of their security posture. For each security evaluation package, Progent engineers with top security credentials analyze and report on collected data and provide recommendations for efficient remediation. All the network security audit packages include an extra-cost option for onsite engineers anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly known as PEN testing, is a vital technique for helping businesses to determine how vulnerable their IT environments are to current-generation attacks. Progent's stealth penetration testing services check how effectively your corporate security policies and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's experienced security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Can We Do?
Network Security ConsultantsIf your business is currently faced with a security crisis and you have not prepared a formal recovery plan, go to Progent's Online Network Support to find out how to get immediate assistance. Progent provides remote technical support from skilled network technicians and can escalate problems to certified security experts if necessary. Your business does not need to be a registered Progent client to receive urgent support for a security breakdown, but you can register as a Progent customer ahead of time for free and your status as a current customer can save precious time in a crisis.

Usually, smaller organizations have no response plan in case of a damaging attack. This is not good, since the damage from a serious security assault can be more devastating for a small company than for a big enterprise. Progent's security specialists can assist your business to design an effective response and event reporting procedure that minimizes the network disruption following a security breach. The step-by-step incident handling model outlined by Global Information Assurance Certification is Progent's preferred method for responding to a serious security incident.

Advanced Security Services Offered by Progent
Progent's veteran engineers offer world-class consulting in key facets of network security such as:

  • Vulnerability Audits and Compliance Assessment
    Progent provides expertise with information risk auditing utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of automatic system scans to uncover potential security holes. Progent has broad experience with these and similar utilities and can help your company to analyze audit results and react efficiently. Progent's security engineers also provide web application testing and can conduct expert evaluation of enterprise-wide security to confirm your company's compliance with major industry security standards such as HIPAA, NIST, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless security including stationary wireless appliances as well as portable devices. Find out more details about Progent's Security Vulnerability Evaluation and Security Compliance Testing.
  • Designing, Building, and Testing Secure Environments
    Every company should develop a carefully considered security strategy that includes both preventive and reactive steps. The proactive plan is a set of precautions that works to minimize vulnerabilities. The reactive strategy defines activities to assist security personnel to evaluate the losses resulting from an attack, remediate the damage, record the event, and revive network activity as quickly as feasible. Progent can show you how to build protection into your company processes, set up scanning utilities, create and execute a secure computer infrastructure, and propose processes and policies that will enhance the protection of your information system. Progent's security professionals are ready to help you to configure a firewall, design secure remote connectivity to email and data, and configure an effective virtual private network. If you are looking for an affordable way for outsourcing your security administration, Progent's Round-the-clock Monitoring Options include non-stop online network monitoring and quick resolution of emergencies.
  • Data Restoration and Failure Analysis
    Progent has skill in restoring systems and servers that have been compromised, are quarantined, or have ceased to function following a security attack. Progent can show you how to determine the damage caused by the breach, restore ordinary business operations, and retrieve information compromised as a result of the attack. Progent's certified specialists can also perform a comprehensive forensic analysis by going over event logs and utilizing a variety of proven assessment tools. Progent's background with security problems reduces your business disruption and permits Progent to recommend efficient ways to prevent or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
    Cisco CCIE Security ExpertsThe current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
  • Additional Firewall and VPN Technologies
    In addition to being expert in a broad range of protection technologies available from Microsoft and Cisco, Progent can provide small and mid-size businesses expert consulting for solutions from other popular firewall and Virtual Private Network suppliers including:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are intended to make sense the enormous amounts of data represented by security incident records created by a wide range of sources such as network appliances, operating systems, and application software and tools. SIEM applications organizes the security event records from these diverse sources and creates summary reports of security incidents as required by state regulations and business compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network infrastructure consultants can help organizations to design, install and operate a SIEM system that helps them to see the progress of security incidents and comply with event reporting regulations. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Accreditations
Progent's security engineers have earned the most respected certifications offered in the industry. All of these certifications demand extensive examinations and demonstrated field experience to ensure that recipients have acquired expertise with a significant body of security information and techniques and can provide high-level solutions to information environments of any complexity.
  • CISM Security Consulting Expertise
    Certified Information Security Manager identifies the fundamental skills and international benchmarks of service that computer security professionals are expected to achieve. CISM offers business management the assurance that consultants who have earned their CISM have the background and knowledge to offer effective security management and consulting services. Progent can offer a CISM support professional to help your organization in key security disciplines including data protection governance, vulnerability management, data protection process control, and incident handling management. Get additional details about Progent's Certified Information Security Manager Security Consulting Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security specialists who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and formal testing. CISSP Certification indicates expertise in a worldwide standard for information security. ANSI has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security management procedures, security architecture and test systems, access permission methodology, software development security, business processes security, hardware security, encryption, telecommunications, network security, and business continuity planning. Get the details about Progent's CISSP Support Assistance.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support
    Progent's CISSP-ISSAP Premier security architecture consultants have earned ISSAP accreditation as a result of rigorous testing and significant hands-on work with information security design. ISSAP consultants have acquired comprehensive knowledge of access management systems and methodologies, phone system and network infrastructure protection, cryptography, needs evaluation, BCP and DRP, and physical security. Progent's CISSP-ISSAP-premier security experts can help your business with all aspects of architecture security. Read more information concerning Progent's ISSAP Accredited Secure System Architecture Consulting Support.

  • Certified Information Systems Auditor (CISA) Consulting Expertise
    The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential has consultants undergo a comprehensive test administered by the ISACA professional association. Progent offers the services of a CISA-Certified security consultant trained to help companies in the fields of information systems audit process, information technology administration, systems and infrastructure planned useful life, information technology support, protecting data assets, and business continuity planning. Get additional information concerning Progent's CISA Consulting Assistance.

  • CRISC Risk Mitigation Specialists
    The CRISC program was initiated by ISACA to validate a consultant's skills to plan, deploy, and maintain IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to assist you to create and execute a business continuity strategy that follows leading practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's network risk management expertise is complementary to the services provided by Progent's CISA-Premier consultants for impartially evaluating your IT control design and also with the services of Progent's CISM experts for implementing company-wide security policies. Get the details about Progent's CRISC-certified Risk Management Consulting.

  • GIAC Professional Services
    GIAC was founded in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to assure that a certified security consultant possesses the knowledge necessary to provide support in critical categories of network, information, and program security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States NSA. Progent can provide the help of GIAC certified professionals for all of the network security services covered under GIAC certification programs such as auditing perimeters, incident response, intrusion detection, and web application security. Find out the details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Assistance.
Get in Touch with Progent for Computer Security Help
If you're looking for computer security help, telephone Progent at 800-993-9400 or visit Contact Progent.