Introduction to Progent's Security and Compliance Support Services
Progent's certified computer security and compliance consultants can provide a wide range of services designed to help businesses of all sizes to uncover and eliminate security vulnerabilities, defend against malicious attacks, recover from any damage resulting from a breach of protection, and comply with regulatory requirements for protecting data and reporting incidents. Progent can provide expert help for key security and recovery solutions like AI-driven EDR (End Point Protection and Response), MDR (Managed Detection and Response), complete system restore validation, immutable backup, and off-site backup.
Progent offers a choice of service modes:
- On-demand remote and on-site assistance billed by the minute
- On-going fully managed services invoiced at an affordable fixed monthly fee
- Set-price service bundles for a single security and compliance assessment
- Urgent ransomware recovery. Progent will submit a bid based on an assessment of the extent of the damage.
(If your system has been breached by any version of ransomware, don't panic. Get immediate assistance by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
As-needed Security Support Services
Once you register for Progent's services (registration is free), you can get as-needed remote or onsite support from a Progent security consultant. This classic support model is essentially reactive and geared toward quickly taking care of IT problems that are affecting your productivity or that are beyond the scope of your own support personnel. Common scenarios include debugging a firewall appliance or VPN tunnel, implementing a critical security update for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These security services are invoiced by the minute, which avoids the frustrating situation of receiving large invoices for quick repairs.
Delivery options for Progent's on-demand support include:
- Online Security Support
Most security issues can be handled online through a mix of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can deliver online security support by offering easy access to consultants with the experience and resources to resolve many of the most difficult problems quickly, making your support costs low and reducing lost productivity.
- On-premises Security Support Services
For instances where onsite assistance is necessary, Progent can dispatch a technical professional to major metropolitan areas throughout the United States. Progent can also send a security consultant with top certifications and world-class skills to any site in the country.
Progent's security engineers are premier to provide help for environments powered by Microsoft, Linux, macOS and OS X, Sun, and popular versions of UNIX. Progent's broad range of consulting services encompasses firewall expertise, email security, protected system architecture, and information recovery. Progent's support team has earned the world's top security accreditations including Certified Information Systems Auditor and CISSP. Progent also offers fast access to remote Cisco-certified CCIE network engineers who can deliver advanced support with complex network integration problems.
ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes SentinelOne's next generation behavior analysis technology to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily evade traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to automate the complete malware attack lifecycle including blocking, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery powered by SentinelOne technology.
- ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is a growing suite of in-depth management reporting tools designed to work with the top ticketing and remote network monitoring programs such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and utilizes color coding to surface and contextualize critical issues like inconsistent support follow-through or machines with out-of-date AVs. By identifying ticketing or network health concerns clearly and in near-real time, ProSight Reporting improves network value, reduces management overhead, and saves money. For details, visit ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified control. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP environment that meets your company's specific needs and that helps you prove compliance with legal and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate action. Progent's consultants can also assist your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates your backup processes and allows fast recovery of vital data, applications and VMs that have become lost or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your business-critical information. Read more about ProSight DPS Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the technology of leading information security vendors to deliver centralized management and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.
- ProSight Duo MFA: Two-Factor Authentication
ProSight Duo is a family of managed service plans incorporating top-ranked cybersecurity technology from Duo, a Cisco company, to create two-factor authentication (2FA) solutions. 2FA utilizes an outside-channel endpoint to validate identity, offering a second level of protection rather than just passwords. This counters the most common causes of network security break-ins like social engineering, brute-force password guessing, and burglarized credentials. Duo's push technology can save time and minimize hassle by permitting users anywhere to confirm their identity simply by clicking "Approve" on the authentication box on their own personal endpoint, which could be a phone, a watch, or other compatible endpoint. This single-tap validation eliminates the requirement to find an email or text message and manually copy a temporary security code. Find out more about Progent's ProSight Duo MFA two-factor identity authentication service plans.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure management service that makes it simple and affordable for smaller organizations to map out, monitor, reconfigure and debug their connectivity appliances such as routers, firewalls, and wireless controllers as well as servers, endpoints and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network maps are kept updated, captures and manages the configuration of virtually all devices on your network, tracks performance, and sends alerts when issues are detected. By automating time-consuming management processes, ProSight WAN Watch can knock hours off ordinary chores such as network mapping, reconfiguring your network, locating appliances that need important updates, or resolving performance issues. Learn more about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring service that uses advanced remote monitoring and management techniques to help keep your network operating at peak levels by tracking the health of vital assets that power your information system. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your specified IT personnel and your assigned Progent engineering consultant so all potential problems can be addressed before they can impact productivity Find out more about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time wasted trying to find critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you're making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size organizations to obtain an unbiased assessment of the overall health of their information system. Powered by a selection of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's certified team of information technology experts, ProSight Network Audits show you how well the configuration of your essential network devices conform to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate ROI like a more manageable Active Directory environment. Both versions also come with a year of advanced remote network monitoring and management (RMM). Advantages can include easier management, improved compliance with data security requirements, higher utilization of IT resources, quicker troubleshooting, more dependable backup and recovery, and less downtime. Learn more information about ProSight Network Audits IT infrastructure review.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service based on a brief phone discussion with a Progent backup/recovery consultant. The interview is intended to assess your company's ability to block or recover quickly following an assault by a ransomware variant like Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you directly to collect information concerning your current antivirus tools and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can apply best practices to deploy an efficient AV and backup/recovery environment that meets your company's requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Set-price Security Evaluation and Verification Bundles
Progent has put together a portfolio of flat-rate security assessment bundles that deliver high value by utilizing Progent's enterprise-class system monitoring software plus Progent's consulting experience to create an unbiased and comprehensive assessment of your network security posture.
- Security Inventory Service Packages for Small Businesses
Progent offers two value-priced security inventory scanning service packages intended to enable small organizations to obtain an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your network from outside your firewalled perimeter to determine potential gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan using an authorized computer inside your company firewall to evaluate your exposure to internal attacks. The two security inventory scans are set up and executed from a secured external site. The scan is managed by a consultant who has earned advanced security certifications and who produces a document that describes and interprets the information collected by the security scan and suggests various improvements where required.
- Security Vulnerability Evaluation Bundles for Enterprises
Progent offers three levels of flat-rate security evaluation service bundles intended for large organizations who want to meet security standards required by state or industry regulators. Progent's security assessment service packages offer larger organizations a chance to obtain a professional look at the strength of their security posture. For each security assessment bundle, Progent consultants with advanced security credentials study and report on collected data and offer recommendations for efficient remediation. Each of the network security audit packages include an added-cost option for on-premises engineers at any location in the United States.
- Consulting Services for Horizon3.ai's NodeZero PEN Testing Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that can deliver continuous, simultaneous, programmable assessment of your network so you can uncover, prioritize, fix, and confirm security vulnerabilities before malicious hackers can exploit them. Progent offers the expertise of a NodeZero Certified Operator who can help you to deploy NodeZero to perform comprehensive penetration tests of your network perimeter and your internal IT infrastructure so you can determine your present security profile. Progent's NodeZero experts can also assist you to harden your existing network security and can assist you to design and implement a unified cybersecurity ecosystem that streamlines management and delivers optimum protection for on-premises, cloud-based, and perimeter IT assets. To find out additional details about Progent's vulnerability analysis solutions based on on NodeZero's pentest products, see Consulting Services for NodeZero's Pentest Products.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly called PEN testing, is a critical technique for allowing businesses to determine how open their IT systems are to modern threats. Progent's stealth penetration testing test how well your corporate security procedures and platforms resist authorized but unannounced intrusion attempts managed by Progent's certified security experts utilizing cutting-edge hacking techniques. Read about Progent's stealth penetration testing services.
Download Progent's Security Services Overview Datasheet
To download a datasheet containing an overview of Progent's services for IT security, click:
Overview of Progent's IT Security Services (PDF - 511 KB).
Our System Has Been Hacked: What Are We Supposed to Do Now?
If your company is now fighting a security emergency and you have not prepared a detailed recovery plan, go to Progent's Online Computer Support to see how to get immediate assistance. Progent offers online help from skilled network technicians and can refer problems to certified security specialists if required. Your company does not have to be a current Progent client to receive emergency support for a security problem, but you can sign up as a Progent customer in advance at no cost and your standing as a registered customer could save valuable time during a crisis.
Usually, smaller businesses do not have a response plan in case of a damaging attack. This is not good, because the cost of a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security specialists can help your business to create a sensible response and incident reporting plan that reduces the network disruption resulting from an attack. The formal post-attack handling procedure promoted by Global Information Assurance Certification is Progent's preferred method for reacting to a major security penetration.
High-value Security Expertise Offered by Progent
Progent's certified engineers can provide world-class consulting in vital facets of computer compliance including:
- Security Vulnerability Evaluation and Compliance Testing
Progent offers experience with information risk auditing utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic network scans to reveal possible security gaps. Progent has broad experience with these tools and can assist you to understand audit results and react appropriately. Progent's security engineers also provide web software validation and can perform thorough evaluation of enterprise-wide security to determine your company's compliance with major worldwide security standards including FISMA, NIST, and ISO. In addition, Progent can assess the strength of your wireless protection including fixed wireless appliances as well as mobile devices. Read more details concerning Progent's Information Risk Audits and Security Compliance Assessment.
- Designing, Building, and Testing Protected Environments
Every organization ought to have a carefully considered security strategy that includes both proactive and responsive elements. The pre-attack strategy is a collection of steps that works to minimize vulnerabilities. The reactive plan specifies procedures to help IT personnel to evaluate the losses resulting from a breach, repair the damage, record the experience, and revive network functions as soon as possible. Progent can advise you how to design protection into your business processes, configure scanning utilities, create and implement a secure network architecture, and recommend procedures and policies to optimize the safety of your computing environment. Progent's security professionals are available to assist you to configure a firewall, design safe online and mobile access to email and files, and install an effective virtual private network. If you are looking for an economical option for outsourcing your security management, Progent's 24x7 Network Support Services feature continual online system monitoring and fast resolution of emergencies.
- System Recovery and Failure Analysis
Progent has expertise in restoring systems and servers that have been compromised, are suspect, or have ceased to function as a result of a security penetration. Progent can show you how to determine the losses caused by the assault, return your company to normal functions, and retrieve information lost owing to the breach. Progent's certified engineers can also manage a comprehensive failure analysis by going over activity logs and using a variety of advanced forensics techniques. Progent's background with security consulting reduces your business disruption and permits Progent to suggest efficient strategies to prevent or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your legacy PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.
- Other Firewall and VPN Technologies Provided by Progent
In addition to supporting a broad range of network security solutions from Microsoft and Cisco, Progent offers small companies top-level consulting for technologies from other popular firewall and Virtual Private Network (VPN) vendors by offering services including:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are intended to digest the enormous quantity of information represented by security event logs created by a wide range of sources such as network infrastructure appliances, servers, and applications and monitoring tools. SIEM applications organizes the security event records from these diverse sources and creates consolidated reports of security incidents as required by government regulations and business compliance guidelines. Progent's GIAC-certified computer security experts and Cisco-certified network experts can help businesses to design, install and operate a SIEM system that enables them to see the behavior of security incidents and comply with event reporting regulations. (See Progent's Security information and Event Management solutions.)
- Patch Management Solutions
Software update management entails applying software updates to operating systems and applications, servers and endpoints, peripherals such as printers and scanners, infrastructure appliances like switches and wireless access points, and IoT devices such as alarms and health monitors. Timely and correctly managed patching optimizes cybersecurity, regulatory compliance, availability, and capability. Sporadic software update management can cause security gaps, compatibility issues, slow or erratic performance, unnecessary downtime, or loss of important features. Progent's support services for patch management offer organizations of any size a flexible and affordable solution for evaluating, validating, scheduling, applying, and tracking software and firmware updates to your ever-evolving information system. (See Progent's software update management service plans.)
Progent's Security Accreditations
Progent's security professionals have earned the most respected certifications available in the industry. These certifications require extensive testing and proven work experience to guarantee that recipients have acquired expertise with a substantial body of security knowledge and methodologies and can provide high-level security solutions to computer environments of any size.
- Certified Information Security Manager Security Support Expertise
Certified Information Security Manager (CISM) identifies the basic competencies and international standards of performance that IT security managers are required to achieve. CISM provides business management the confidence that those who have been awarded their accreditation possess the experience and skill to provide efficient security management and engineering services. Progent can offer a CISM-certified support professional to assist your enterprise in key security disciplines such as information security governance, risk management, information security process management, and crisis handling support. Learn the details about Progent's Certified Information Security Manager Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's CISSP consultants are security engineers who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and formal testing. CISSP Certification indicates mastery of an international standard for IT security. ANSI has given the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security administration practices, security design and test systems, access permission methodology, applications development security, operations security, physical security, cryptography, telecommunications, network security, and disaster recovery planning. Get more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
- CISSP-ISSAP Security Architecture Consulting Support
Progent's CISSP-ISSAP Premier security architecture consultants have been awarded ISSAP accreditation after thorough testing and extensive experience. field experience with network security design. ISSAP security experts have acquired comprehensive understanding of access control systems and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security experts can help your company with all aspects of architecture security. Get additional details concerning Progent's ISSAP Certified Secure System Infrastructure Consulting Support.
- Certified Information Systems Auditor Support Expertise
The CISA accreditation is an important achievement that signifies expertise in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test given by the ISACA international professional association. Progent can provide the expertise of a CISA-Premier security engineer able to help businesses in the areas of information systems audit services, IT enforcement, systems and infrastructure planned useful life, IT support, safeguarding information resources, and business continuity preparedness. Find out the details about Progent's CISA Support Services.
- CRISC-certified Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's ability to plan, deploy, and maintain IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity strategy based on industry best practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's risk mitigation services are a good fit the services provided by Progent's CISA-Premier security engineers for objectively evaluating your IT management design and with the services of Progent's CISM-certified experts for implementing security policies. Learn more details about Progent's CRISC Network Risk Management Support.
- Global Information Assurance Certification Professional Expertise
GIAC was established in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to make sure that an accredited security consultant has the knowledge appropriate to provide services in critical areas of system, data, and application security. GIAC certifications are recognized by companies and government organizations around the world including and the United States National Security Agency. Progent offers the assistance of GIAC certified security engineers for all of the security capabilities addressed within GIAC certification topics such as assessing IT infrastructure, security incident handling, traffic analysis, and web services security. Get more information about Progent's GIAC Consulting Services.
Contact Progent for Network Security Expertise
If you're trying to find security engineering help, telephone Progent at 800-993-9400 or see Contact Progent.