Overview of Progent's Security and Compliance Support Services
Progent's certified computer security and compliance experts offer a broad selection of services designed to assist organizations of all sizes to uncover and eliminate security vulnerabilities, defend against attacks, recover from any problems caused by a breakdown of security, and meet regulatory mandates for guarding information and reporting incidents. Progent can provide a choice of service models:
As-needed Security and Compliance Support Services
- On-demand online and on-premises support invoiced by the minute
- Continual managed services invoiced at an affordable flat monthly rate
- Value-priced service packages for a single security evaluation
Once you register for Progent's services (signing up is free), you can get as-needed online or onsite assistance from one of Progent security and compliance consultant. This traditional support model is essentially reactive and geared toward quickly taking care of technical problems that are impacting your network or that have stymied your in-house support personnel. Typical examples are replacing a firewall appliance or VPN connection, implementing a vital security patch for a Cisco switch, designing secure access to a public cloud, or recovering from a ransomware assault. These services are billed to the nearest minute, which eliminates the annoying case of receiving large invoices for quick repairs.
Delivery options for Progent's on-demand support services include:
Progent's accredited consultants are certified to provide help for systems based on Windows, Linux, macOS and OS X, Sun Solaris, and popular derivatives of UNIX. Progent's wide range of consulting services addresses firewall configuration, e-mail systems, secure system architecture, and information restoration. Progent's support team has been awarded the world's most advanced security credentials including CISA and Information System Security Architecture Professional (ISSAP). Progent also offers immediate access to remote Cisco-certified CCIE network engineers who can provide world-class assistance with tough network technology issues.
- Online Security Services
Most security issues can be handled online through a combination of phone help and a remote connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide online security help by offering easy access to consultants who have the background and resources to fix many of the most difficult problems quickly, making your service costs low and minimizing downtime.
- Onsite Security Support
For cases where onsite support is necessary, Progent can send a technical professional to major cities across the U.S. Progent can also dispatch a security consultant with top certifications and advanced skills to any site in the U.S.
ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior machine learning tools to guard endpoints as well as physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to address the entire malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device control, and web filtering through leading-edge tools incorporated within one agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that addresses your company's specific needs and that allows you demonstrate compliance with legal and industry data security regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent attention. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup processes and enables fast recovery of critical files, applications and VMs that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight DPS to to comply with regulatory requirements such as HIPAA, FIRPA, and PCI and, when needed, can help you to restore your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security companies to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized businesses to diagram, monitor, optimize and debug their networking hardware such as switches, firewalls, and access points plus servers, endpoints and other networked devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network maps are kept updated, captures and manages the configuration information of almost all devices connected to your network, monitors performance, and sends notices when issues are discovered. By automating time-consuming management processes, WAN Watch can knock hours off common tasks like network mapping, reconfiguring your network, locating devices that need important software patches, or identifying the cause of performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) techniques to help keep your network running efficiently by checking the health of critical computers that power your business network. When ProSight LAN Watch uncovers a problem, an alert is transmitted immediately to your designated IT management personnel and your assigned Progent engineering consultant so any potential problems can be resolved before they can disrupt your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported immediately to a different hosting environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save as much as 50% of time spent searching for vital information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size organizations to obtain an objective evaluation of the overall health of their information system. Based on some of the leading remote monitoring and management (RMM) platforms available, and supervised by Progent's certified group of IT professionals, ProSight Network Audits help you see how well the configuration of your essential infrastructure devices conform to best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate ROI such as a cleaner Active Directory (AD) environment. Both also come with a year of state-of-the-art remote network monitoring and management. Benefits can include simpler management, better compliance with government and industry security regulations, more efficient utilization of IT resources, faster problem resolution, more reliable backup and recovery, and less downtime. Learn more about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service based on a phone interview with a Progent information assurance consultant. The interview is intended to assess your company's preparedness either to stop or recover rapidly following an assault by a ransomware strain like Ryuk, WannaCry, NotPetya, or Hermes. Progent will work with you personally to gather information about your current AV defense and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to deploy an efficient AV and backup/recovery system that aligns with your company's requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report.
Flat-rate Security Evaluation and Validation Bundles
Progent offers a selection of set-price security and compliance evaluation bundles that provide exceptional value by utilizing Progent's advanced network monitoring and analysis software as well as Progent's technical skills to produce an objective and thorough assessment of your IT environment security profile.
Our Network Has Been Hacked: What Do We Do?
- Security Assessment Service Bundles for Small Businesses
Progent offers two value-priced security inventory scanning service packages intended to enable small organizations to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your IT system from beyond your corporate firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant executes a system scan from an authorized machine within your firewalled perimeter to evaluate your exposure to inside attacks. The two security inventory scanning services are set up and executed from a secured external site. The project is administered by an engineer who has earned high-level security certifications and who creates a document that details and evaluates the data collected by the security scan and recommend various improvements where required.
- Security Vulnerability Evaluation Bundles for Enterprises
Progent has developed three levels of set-price security assessment service bundles intended for large organizations who want to meet compliance standards required by government or industry agencies. Progent's security evaluation service packages offer larger organizations a chance to obtain a professional look at the strength of their security profile. For every security assessment package, Progent consultants with advanced security credentials study and report on captured data and provide recommendations for efficient improvements. Each of the network security audit bundles include an extra-cost option for on-premises consultants anywhere in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often referred to as PEN testing, is a critical technique for allowing organizations to determine how vulnerable their network systems are to modern attacks. Progent's stealth penetration testing check how well your existing security policies and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's certified security specialists using advanced hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
If your business is now experiencing a security emergency and you have no formal response plan, visit Progent's Remote Computer Support to see how to receive immediate assistance. Progent provides remote assistance from skilled engineers and can refer problems to certified security specialists if required. Your organization does not have to be a current Progent customer to receive emergency help for a security breakdown, but you can register as a Progent client in advance at no cost and your standing as a registered customer can save valuable time when there is a crisis.
Typically, smaller organizations have not documented a response plan in case of a successful attack. This is not good, since the damage from a successful security assault can be even more devastating for a small company than for a large enterprise. Progent's security specialists can help your you to create a sensible recovery and incident reporting procedure that minimizes the IT system downtime resulting from a security breach. The step-by-step post-attack handling model outlined by Global Information Assurance Certification is Progent's preferred procedure for responding to a major security penetration.
High-value Security Expertise Available from Progent
Progent's veteran consultants offer expertise in vital facets of network compliance including:
Progent's Security Accreditations
- Vulnerability Audits and Compliance Testing
Progent provides experience with security auditing utilities like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of comprehensive system scans to identify potential security gaps. Progent has broad skills with scanning utilities and can assist you to understand assessment reports and react efficiently. Progent's security consultants also provide web application testing and can perform expert assessments of corporate-wide security to validate your company's compliance with important industry security standards including HIPAA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless security including fixed wireless appliances as well as mobile handsets. Read the details concerning Progent's Information Risk Audits and Compliance Assessment.
- Designing, Building, and Testing Protected Networks
Every company should have a carefully thought out security strategy that includes both preventive and responsive activity. The pre-attack plan is a collection of steps that works to reduce security holes. The post-attack plan defines activities to help security personnel to assess the damage resulting from a breach, remediate the damage, document the event, and revive network activity as quickly as feasible. Progent can advise you how to build protection into your company processes, install scanning utilities, define and build a safe IT architecture, and propose processes and policies to optimize the safety of your computing environment. Progent's security professionals are ready to assist you to set up a firewall, design safe offsite access to email and data, and configure an efficient VPN. If your company is looking for an economical option for jobbing out your network security administration, Progent's Round-the-clock Monitoring Packages feature continual online server monitoring and quick resolution of problems.
- System Restoration and Security Forensics
Progent offers skill in restoring systems and computers that have been compromised, are suspect, or have ceased to function because of a security attack. Progent can help determine the damage caused by the assault, return your company to normal functions, and retrieve data compromised as a result of the assault. Progent's certified engineers can also perform a comprehensive failure evaluation by going over event logs and utilizing a variety of advanced forensics tools. Progent's background with security consulting reduces your off-air time and permits Progent to suggest efficient strategies to avoid or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your legacy PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
- Other Firewall and VPN Consulting Services Provided by Progent
In addition to offering support for a wide array of network security solutions available from Microsoft and Cisco, Progent offers small businesses top-tier engineering services for technologies from other important firewall and Virtual Private Network (VPN) vendors by delivering services such as:
- SIEM Solutions
Security information and event management (SIEM) applications and services are intended to make sense the massive quantity of data represented by security incident logs generated by a wide range of sources including network infrastructure appliances, operating systems, and application software and tools. SIEM software analyzes the security logs from these various sources and produces consolidated reports of security incidents as required by state regulations and industry compliance guidelines. Progent's GIAC-certified network security consultants and Cisco-certified network experts can assist businesses to design, deploy and operate a SIEM solution that enables them to see the progress of security incidents and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's security professionals have earned the most prestigious accreditations available in the industry. All of these accreditations require extensive examinations and demonstrated field experience to ensure that recipients have acquired expertise with a significant amount of security information and methodologies and can provide advanced solutions to computer networks of any complexity.
Get in Touch with Progent for Network Security Support
- Certified Information Security Manager Security Consulting Services
Certified Information Security Manager (CISM) identifies the fundamental competencies and international benchmarks of performance that information technology security managers are expected to master. CISM offers business management the confidence that consultants who have been awarded their certification possess the experience and knowledge to offer effective security administration and engineering services. Progent can provide a CISM-certified consultant to assist your enterprise in vital security disciplines such as information security governance, vulnerability management, information protection process management, and incident handling management. Get additional details about Progent's Certified Information Security Manager (CISM) Security Support Assistance.
- CISSP Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification through verified professional work, rigorous study, and formal testing. CISSP Certification recognizes expertise in an international standard for IT security. ANSI has given the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security architecture and test systems, connection permission systems, software development security, business processes security, hardware security, cryptography, communications, network security, and business continuity planning. Learn additional details about Progent's CISSP Consulting Expertise.
- CISSP-ISSAP} Security Architecture Consulting Services
Progent's CISSP-ISSAP Certified security architecture experts have earned ISSAP status as a result of thorough testing and substantial hands-on work with information security architecture. ISSAP security experts have comprehensive understanding of access control systems and methodologies, phone system and network security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-premier security experts can help your company with all phases of secure network architecture. Get additional details concerning Progent's ISSAP Certified Protected Network Infrastructure Consulting Support.
- Certified Information Systems Auditor (CISA) Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that indicates mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA professional group. Progent can provide the services of a CISA-Premier security professional able to help businesses in the fields of IS audit process, IT administration, systems and architecture planned useful life, information technology service delivery, safeguarding information resources, and business continuity preparedness. Learn the details about Progent's Certified Information Systems Auditor (CISA) Consulting Assistance.
- CRISC IT Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's risk management services are a good fit the services available from Progent's CISA-Certified consultants for objectively auditing your IT management design and with the services of Progent's CISM-certified experts for defining company-wide security policies and procedures. Learn the details about Progent's CRISC IT Risk Management Services.
- GIAC Support Expertise
GIAC was established in 1999 to certify the knowledge of computer security professionals. GIAC's goal is to verify that a certified professional possesses the skills needed to provide support in key categories of network, data, and application software security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent can provide the assistance of certified consultants for all of the security capabilities addressed under GIAC accreditation topics including assessing networks, incident handling, traffic analysis, and web-based application security. Read additional information about Progent's GIAC Professional Assistance.
If you're looking for network security consulting, telephone Progent at 800-993-9400 or refer to Contact Progent.