Overview of Progent's Security Support Services
Progent's industry certified network security and compliance experts can provide a broad range of support services intended to assist businesses of any size to identify and eliminate security vulnerabilities, block attacks, recover from any problems caused by a breach of protection, and meet regulatory mandates for protecting data and reporting security incidents. Progent offers a choice of service modes:
As-needed Security Support Services
- As-needed remote and on-site assistance invoiced by the minute
- Continual fully managed services billed at an affordable fixed monthly rate
- Set-price service packages for a single security and compliance assessment
After you sign up for Progent's services (registration is free), you can receive as-needed online or onsite assistance from one of Progent security consultant. This classic service model is essentially reactive and optimized for quickly resolving technical issues that are affecting your productivity or that have stumped your own support personnel. Common examples include debugging a firewall or VPN connection, installing a vital security update for a Cisco switch or router, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These services are billed to the nearest minute, which eliminates the annoying case of receiving large invoices for quick repairs.
Delivery options for Progent's on-demand support services include:
Progent's security consultants are certified to provide help for environments based on Windows, Linux, macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's wide array of services addresses firewall technology, e-mail security, secure network architecture, and data restoration. Progent's support staff has been awarded the industry's top security certifications including GIAC and Certified Information Systems Security Professional (CISSP). Progent also can provide immediate access to remote Cisco-certified CCIE network consultants who can provide advanced support with tough network configuration issues.
- Remote Security Support Services
The majority security problems can be handled online via a mix of phone support and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide online security help by offering easy access to consultants who have the background and resources to resolve many of the most challenging problems quickly, making your support expenses affordable and minimizing downtime.
- Onsite Security Support Services
For cases where onsite assistance is necessary, Progent can dispatch a technical expert to major cities throughout the U.S. Progent can also send a security specialist with high-level certifications and advanced skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily get by traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to address the complete threat lifecycle including filtering, identification, containment, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services offer economical in-depth security for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint control, and web filtering via leading-edge technologies incorporated within a single agent managed from a single console. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with legal and industry data protection standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also help you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of vital data, applications and virtual machines that have become lost or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security vendors to deliver centralized management and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your exposure to inbound threats and saves network bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for small and mid-sized businesses to diagram, track, optimize and debug their networking hardware such as routers and switches, firewalls, and access points as well as servers, client computers and other networked devices. Incorporating cutting-edge RMM technology, WAN Watch ensures that infrastructure topology maps are always updated, copies and displays the configuration of almost all devices on your network, monitors performance, and generates notices when issues are discovered. By automating time-consuming network management processes, WAN Watch can cut hours off ordinary chores like making network diagrams, expanding your network, finding devices that need critical software patches, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to keep your IT system running efficiently by checking the state of critical assets that power your business network. When ProSight LAN Watch uncovers a problem, an alarm is sent automatically to your specified IT management personnel and your Progent consultant so all looming issues can be resolved before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hardware solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect information related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSLs or domains. By updating and organizing your IT documentation, you can save as much as 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Find out more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost alternative for small and medium-size businesses to obtain an unbiased evaluation of the health of their network. Based on some of the leading remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's world-class team of IT experts, ProSight Network Audits help you see how closely the configuration of your essential network devices conform to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and provide immediate benefits like a more manageable Active Directory (AD) system. Both also include a year of cutting-edge remote network monitoring and management. Advantages can include simpler management, improved compliance with government and industry security requirements, higher utilization of IT resources, faster troubleshooting, more reliable backup and restore, and higher availability. Learn more about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service built around a brief discussion with a Progent information assurance consultant. The fact-finding interview is intended to help evaluate your company's ability to block or recover quickly following an assault by a ransomware strain like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to collect information concerning your current AV defense and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can follow industry best practices to create a cost-effective AV and backup system that aligns with your business needs. For more information, visit The ProSight Ransomware Preparedness Report.
Flat-rate Security Assessment and Validation Packages
Progent offers a portfolio of fixed-price security and compliance assessment bundles that deliver high value by deploying Progent's advanced system monitoring software plus Progent's technical skills to produce an objective and thorough evaluation of your network security profile.
Our Network Has Been Hacked: What Can We Do?
- Security Assessment Service Bundles for Small Organizations
Progent offers two value-priced security inventory service packages designed to enable small organizations to get a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT system from beyond your firewalled perimeter to identify potential gaps in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan using an authorized computer inside your company firewall to evaluate your vulnerability to internal assaults. The two security inventory services are set up and run from a secured offsite location. The project is managed by a consultant who has earned high-level security certifications and who produces a report that describes and evaluates the information collected by the security scan and suggests practical enhancements where required.
- Security Vulnerability Evaluation Bundles for Enterprises
Progent has developed three levels of flat-rate security assessment service packages designed for large organizations who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service bundles offer enterprises an opportunity to obtain an objective look at the strength of their security posture. For every security evaluation package, Progent consultants with top security credentials study and report on collected data and provide recommendations for cost-effective remediation. All the network security audit bundles include an extra-cost option for onsite engineers anywhere in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly called PEN testing, is a critical technique for helping businesses to determine how vulnerable their IT environments are to modern attacks. Progent's stealth penetration testing test how well your corporate security policies and technologies resist authorized but unannounced penetration attempts managed by Progent's veteran security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
If your company is now faced with a network security crisis and you have not prepared a detailed recovery plan, refer to Progent's Remote Computer Help to learn how to receive immediate help. Progent offers online help from experienced engineers and can refer problems to certified security specialists if required. Your organization does not have to be a registered Progent client to receive urgent support for a security breakdown, but you can register as a Progent customer ahead of time for free and your standing as a current client can save precious time when there is an emergency.
Usually, smaller businesses have no response plan in case of a damaging penetration. This is not good, because the cost of a serious security assault can be more devastating for a small company than for a big corporation. Progent's security consultants can help your business to create an efficient recovery and event reporting procedure that reduces the network disruption resulting from a security breach. The step-by-step incident handling model promoted by GIAC (Global Information Assurance Certification) is Progent's suggested method for handling a major security incident.
High-value Security Services Available from Progent
Progent's certified engineers can provide world-class consulting in key facets of IT protection including:
Progent's Security Certifications
- Information Risk Audits and Compliance Assessment
Progent provides experience with information risk evaluation software such as MS Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic system scans to reveal potential security holes. Progent has extensive skills with monitoring tools and can assist your company to understand audit reports and react appropriately. Progent's security engineers also can perform web application validation and can perform expert assessments of enterprise-wide security to determine your company's compliance with major industry security standards such as HIPAA, PCI, and ISO. Also, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless appliances as well as mobile devices. Learn the details about Progent's Information Risk Audits and Compliance Testing.
- Designing, Building, and Testing Secure Networks
Every business should develop a carefully considered security plan that includes both proactive and responsive steps. The proactive plan is a collection of steps that helps to reduce security holes. The reactive strategy specifies procedures to assist IT staff to inventory the losses caused by a breach, repair the damage, record the event, and revive network activity as soon as possible. Progent can advise you how to incorporate security into your company operations, configure scanning utilities, define and build a secure IT infrastructure, and propose procedures and policies that will enhance the safety of your information system. Progent's security professionals are ready to help you to configure a firewall, design protected remote connectivity to e-mail and files, and configure an effective virtual private network (VPN). If you are interested in an economical option for jobbing out your security management, Progent's Round-the-clock Monitoring Options include automated remote network tracking and fast response to problems.
- Data Recovery and Security Forensics
Progent provides skill in recovering networks and computers that have been hacked, are suspect, or have ceased to function as a result of a security attack. Progent can help determine the losses caused by the assault, return your company to ordinary functions, and retrieve information compromised as a result of the attack. Progent's security engineers can also perform a comprehensive forensic evaluation by examining activity logs and using a variety of proven forensics tools. Progent's background with security problems minimizes your off-air time and permits Progent to propose effective strategies to avoid or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
- Other Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
In addition to offering support for a wide range of security technologies available from Microsoft and Cisco, Progent can provide small organizations top-level consulting for technologies from other important firewall and Virtual Private Network vendors by offering services such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are designed to digest the enormous amounts of data collected in security event logs generated by multiple sources such as network infrastructure appliances, servers, and application software and tools. SIEM software organizes the security event records from these diverse sources and produces summary reports of security incidents as mandated by government regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure experts can help businesses to plan, install and manage a SIEM system that helps them to understand the behavior of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's security professionals have been awarded the most respected accreditations offered in the security industry. These certifications demand exhaustive examinations and proven field experience to guarantee that candidates have mastered a significant amount of security knowledge and techniques and can offer advanced consulting to information environments of any complexity.
Depend on Progent for Network Security Support
- Certified Information Security Manager Security Support Services
Certified Information Security Manager defines the core skills and international standards of service that information technology security professionals are required to master. CISM offers business management the assurance that consultants who have been awarded their accreditation possess the background and knowledge to offer effective security administration and consulting services. Progent can provide a CISM-certified consultant to help your organization in key security areas including information security governance, risk management, information security program management, and incident handling management. Learn additional details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
- CISSP Security Support Services
Progent's CISSP experts are security engineers who have been awarded CISSP accreditation as a result of demonstrated experience, rigorous study, and exhaustive examination. CISSP qualification recognizes mastery of a worldwide standard for information security. ANSI has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include security management procedures, security design and test systems, connection control methodology, software development security, operations security, hardware security, encryption, telecommunications, network security, and business continuity planning. Learn more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
- CISSP-ISSAP} Security Architecture Consulting Support Services
Progent's CISSP-ISSAP Certified security architecture experts have been awarded ISSAP status after thorough testing and extensive hands-on work with network security design. ISSAP security experts have acquired comprehensive understanding of access control systems and techniques, telecommunications and network infrastructure protection, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-premier security consultants can assist your business with all phases of architecture security. Read the details concerning Progent's ISSAP Accredited Protected IT Infrastructure Consulting Assistance.
- Certified Information Systems Auditor (CISA) Consulting Expertise
The Certified Information Systems Auditor credential is a prestigious qualification that represents expertise in IS security auditing. Certified by ANSI, the CISA accreditation has candidates pass an extensive examination administered by the ISACA international professional association. Progent can provide the services of a CISA-Certified security audit engineer trained to help businesses in the areas of information systems audit services, IT enforcement, network assets and infrastructure lifecycle, IT support, safeguarding information assets, and business continuity preparedness. Get more details about Progent's Certified Information Systems Auditor Consulting Services.
- CRISC-certified Network Risk Mitigation Consultants
The CRISC certification program was initiated by ISACA to validate a consultant's skills to plan, deploy, and maintain IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and execute a workplace continuity plan based on industry best practices identified by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's risk mitigation services are complementary to the support available from Progent's CISA-Premier consultants for impartially assessing your IS management mechanisms and with the expertise of Progent's CISM-certified consultants for defining company-wide security policies. Learn additional information concerning Progent's CRISC Network Risk Management Consulting.
- GIAC (Global Information Assurance Certification) Support Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security engineers. GIAC's goal is to verify that a certified professional possesses the skills necessary to provide support in key categories of network, information, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent offers the support of GIAC certified security engineers for all of the network security services covered within GIAC accreditation programs such as auditing security systems, incident handling, traffic analysis, and web services security. Read more information concerning Progent's GIAC Consulting Services.
If you need network security consulting expertise, phone Progent at 800-993-9400 or visit Contact Progent.