Overview of Progent's Security Consulting Services
Progent's certified network security experts can provide a broad range of support services designed to assist companies of all sizes to identify and correct security vulnerabilities, defend against malicious attacks, recover from any issues resulting from a breach of protection, and meet government requirements for guarding data and reporting incidents. Progent can deliver expert help for critical security and recovery technologies including AI-based EDR (End Point Protection and Response), Managed Detection and Response, complete system restore validation, immutable backup, and off-premises backup.
Progent can provide a selection of service delivery models:
- As-needed remote and on-site assistance invoiced by the minute
- On-going managed services invoiced at a low flat monthly fee
- Value-priced service packages for a single security evaluation
- Emergency ransomware response. Progent will propose a bid after an assessment of the damage.
(If your network has been victimized by any strain of ransomware, do not panic. Get fast help by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
On-demand Security Consulting Services
After you sign up for Progent's services (signing up is free), you can get as-needed remote or onsite assistance from one of Progent security consultant. This traditional service model is essentially reactive and optimized for quickly resolving IT problems that are impacting your network or that have stymied your own support staff. Typical scenarios are debugging a firewall appliance or VPN connection, installing a vital security patch for a Cisco switch, setting up secure access to cloud-based resources, or restoring data after a ransomware attack. These services are invoiced by the minute, which avoids the annoying situation of getting large bills for quick repairs.
Delivery options for Progent's on-demand support services include:
- Online Security Support
Most security-related issues can be resolved online via a combination of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver online security help by offering efficient access to consultants who have the background and technical resources to fix some of the most challenging problems quickly, keeping your service costs low and minimizing downtime.
- Onsite Security Support
For cases where onsite support is necessary, Progent can send a technical professional to major metropolitan areas throughout the U.S. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited security engineers are premier to provide help for environments based on Windows, Linux, Apple Mac, Solaris, and popular versions of UNIX. Progent's wide range of consulting services covers firewall technology, e-mail security, secure network architecture, and information recovery. Progent's technical support staff has been awarded the industry's most advanced security credentials including Global Information Assurance Certification and Certified Information Systems Security Professional. Progent also offers immediate access to online Cisco CCIE network infrastructure consultants who can deliver world-class support with complex network integration problems.
ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight suite of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates SentinelOne's cutting edge behavior-based machine learning tools to guard endpoints and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a single platform to manage the entire threat progression including filtering, detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense based on SentinelOne technology.
- ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is an expanding family of real-time reporting utilities designed to work with the leading ticketing and network monitoring platforms including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and features color coding to highlight and contextualize key issues such as spotty support follow-through or machines with missing patches. By identifying ticketing or network health concerns concisely and in near-real time, ProSight Reporting improves productivity, reduces management hassle, and saves money. For details, see ProSight Reporting for ticketing and network monitoring applications.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alarms, device management, and web filtering via cutting-edge tools incorporated within one agent accessible from a single control. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that helps you demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate attention. Progent's consultants can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical files, applications and VMs that have become lost or corrupted due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide world-class support to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPAA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to deliver centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.
- ProSight Duo MFA: Two-Factor Authentication
ProSight Duo MFA is a suite of managed services utilizing top-ranked cybersecurity technology from Duo, a Cisco company, to build two-factor authentication environments. Two-factor authentication utilizes an out-of-band endpoint to validate user identity, providing a second layer of protection rather than merely passwords. This protects against the most common causes of cybersecurity breaches like phishing, brute-force password attacks, and burglarized credentials. Duo's push capability can save time and minimize frustration by permitting users anywhere to verify their identity as easily as tapping "Approve" on the authentication prompt on their own unique device, which can be a smartphone, a smart watch, or other compatible out-of-band device. This one-click process avoids the requirement to find an email or text message and manually transcribe a security passcode. Find out more about Progent's ProSight Duo MFA multi-factor identity authentication services.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller organizations to map, monitor, reconfigure and troubleshoot their networking hardware like switches, firewalls, and access points plus servers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch makes sure that infrastructure topology maps are always updated, copies and manages the configuration information of almost all devices connected to your network, tracks performance, and generates alerts when potential issues are detected. By automating tedious management and troubleshooting processes, ProSight WAN Watch can cut hours off ordinary chores like network mapping, expanding your network, locating devices that need important updates, or identifying the cause of performance bottlenecks. Learn more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to keep your IT system running efficiently by tracking the health of vital assets that drive your information system. When ProSight LAN Watch detects a problem, an alert is sent immediately to your specified IT management personnel and your Progent consultant so any potential issues can be resolved before they have a chance to disrupt your network Learn more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and protect information related to your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By updating and organizing your IT documentation, you can save up to 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you're making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable way for small and mid-size businesses to get an unbiased evaluation of the health of their IT system. Powered by a selection of the top remote monitoring and management (RMM) platforms available, and overseen by Progent's world-class team of information technology professionals, ProSight Network Audits help you see how well the configuration of your essential network assets conform to industry best practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory (AD) environment. Both versions also come with one year of state-of-the-art remote network monitoring and management (RMM). Benefits can include easier management, better compliance with government and industry security standards, higher utilization of network assets, quicker troubleshooting, more dependable backup and recovery, and increased uptime. Learn more about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service based on a phone interview with a Progent information assurance expert. The interview is intended to evaluate your company's preparedness either to stop or recover quickly following an assault by a ransomware variant like Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you directly to collect information concerning your current cybersecurity profile and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can apply best practices to create an efficient security and backup/recovery environment that aligns with your company's needs. For details, refer to The ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Validation Bundles
Progent has put together a selection of flat-rate security and compliance evaluation packages that provide high value by utilizing Progent's advanced network monitoring and analysis software plus Progent's consulting experience to produce an unbiased and thorough assessment of your IT environment security profile.
- Security Assessment Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages intended to allow small businesses to get an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your network from beyond your corporate firewall to identify potential gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan using an authorized machine within your company firewall to assess your vulnerability to inside attacks. These two security inventory services are configured and executed from a secured offsite location. The scan is managed by a consultant who has earned high-level security certifications and who creates a report that describes and interprets the data captured by the scan and recommend practical improvements where appropriate.
- Security Vulnerability Assessment Bundles for Enterprises
Progent has developed three levels of flat-rate security evaluation service packages intended for enterprises who need to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer enterprises a chance to obtain an objective assessment at the viability of their security profile. For every security evaluation bundle, Progent consultants with advanced security credentials analyze and report on collected data and provide suggestions for cost-effective improvements. All the network security audit bundles include an extra-cost option for onsite consultants at any location in the U.S.
- Expertise with Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that supports repeated, simultaneous, automated assessment of your internal and perimeter network to help you expose, prioritize, remediate, and confirm cybersecurity vulnerabilities before malicious hackers can exploit them. Progent can provide the skills of a NodeZero Certified Operator who can assist you to use NodeZero to perform comprehensive pentests of your network perimeter and your internal network in order to evaluate your present security profile. Progent can also help you to strengthen your existing network security and can assist you to plan and deploy a cohesive cybersecurity strategy that simplifies management and delivers optimum cyber defense for on-prem, cloud-based, and perimeter IT resources. To learn more information about Progent's threat analysis services based on on NodeZero's pentest products, see Consulting Services for NodeZero's Pentest Platform.
- Stealth Penetration Testing
Stealth penetration testing, commonly called PEN testing, is a vital technique for allowing organizations to find out how open their network systems are to current-generation threats. Progent's stealth penetration testing services test how well your existing security policies and technologies resist authorized but unannounced penetration attempts launched by Progent's certified security experts utilizing cutting-edge hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
Download Progent's Security Services Overview Datasheet
To download a datasheet containing an overview of Progent's portfolio of services for network security, click:
Overview of Progent's IT Security Services (PDF - 511 KB).
We've Been Hacked: What Do We Do Now?
If your business is currently faced with a security emergency and you have not prepared a detailed response procedure, go to Progent's Remote Network Help to learn how to get immediate assistance. Progent offers remote help from skilled network technicians and can escalate trouble tickets to certified security specialists if necessary. Your company does not have to be a registered Progent client to receive emergency support for a security breakdown, but you can sign up as a Progent customer in advance for free and your status as a current customer can save valuable time in case of an emergency.
Typically, smaller companies have no response procedure in case of a successful attack. This is not good, because the damage from a serious security assault can be even more catastrophic for a small company than for a big enterprise. Progent's security engineers can assist your company to design a sensible recovery and incident reporting plan that reduces the IT system disruption following a security breach. The formal incident handling procedure outlined by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for handling a major security attack.
High-value Security Services Offered by Progent
Progent's certified consultants offer advanced support in key facets of IT security including:
- Security Vulnerability Evaluation and Security Compliance Testing
Progent provides experience with security auditing utilities like Microsoft Baseline Security Analyzer or LANguard for conducting a variety of comprehensive system tests to reveal potential security gaps. Progent has extensive skills with these tools and can help you to analyze assessment results and react appropriately. Progent's certified security consultants also provide web application testing and can perform expert evaluation of corporate-wide security to confirm your company's compliance with major worldwide security specifications such as HIPAA, PCI, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances plus portable devices. Read additional details about Progent's Security Vulnerability Audits and Compliance Assessment.
- Designing, Implementing, and Validating Secure Environments
Any business should have a carefully thought out security strategy that includes both proactive and reactive steps. The proactive plan is a collection of steps that helps to reduce security holes. The post-attack plan specifies procedures to assist security personnel to inventory the damage caused by an attack, remediate the damage, document the experience, and revive network activity as quickly as possible. Progent can show you how to incorporate security into your business operations, set up scanning utilities, create and implement a secure network infrastructure, and propose procedures and policies that will enhance the protection of your computing environment. Progent's security experts are ready to help you to set up a firewall, design secure remote access to e-mail and files, and install an efficient virtual private network (VPN). If you are looking for an affordable way for jobbing out your security management, Progent's Round-the-clock Monitoring Options include automated remote network monitoring and quick response to problems.
- System Restoration and Failure Analysis
Progent offers expertise in recovering networks and devices that have been compromised, are suspect, or have ceased to function as a result of a security attack. Progent can show you how to assess the losses resulting from the assault, restore ordinary functions, and retrieve data lost owing to the breach. Progent's certified specialists can also perform a comprehensive failure analysis by going over activity logs and using a variety of proven assessment tools. Progent's experience with security problems reduces your business disruption and permits Progent to propose effective strategies to avoid or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your existing PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
- Additional Firewall and Virtual Private Network Solutions Provided by Progent
As well as offering support for a wide range of protection solutions available from Microsoft and Cisco, Progent can provide small and mid-size organizations top-tier engineering services for solutions from other important firewall and Virtual Private Network vendors by providing services such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to digest the enormous amounts of data collected in security incident records created by multiple sources such as network appliances, operating systems, and applications and monitoring tools. SIEM applications analyzes the security logs from these diverse sources and produces summary reports of security events as mandated by government regulations and industry compliance guidelines. Progent's GIAC-certified network security consultants and Cisco CCIE certified network infrastructure consultants can help organizations to design, deploy and operate a SIEM solution that helps them to understand the progress of attacks and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
- Patch Management Solutions
Patch management includes applying software or firmware updates to operating systems and applications, physical and virtual servers and endpoints, peripherals like printers and scanners, network infrastructure appliances such as routers and wireless APs, and IoT devices such as sensors and health monitors. Timely and correctly managed updating maximizes cybersecurity, compliance, uptime, and capability. Haphazard patch management can cause security vulnerabilities, compatibility issues, sluggish or erratic performance, needless offline stretches, or loss of important functions. Progent's managed services for patch management offer businesses of any size a flexible and affordable option for assessing, testing, scheduling, applying, and documenting software and firmware updates to your ever-evolving IT system. (Visit Progent's patch management solutions.)
Progent's Security Credentials
Progent's security specialists have earned some of the most respected accreditations available in the industry. These accreditations demand extensive testing and demonstrated work background to ensure that recipients have mastered a substantial body of security information and methodologies and can offer advanced consulting to computer networks of any complexity.
- CISM Security Consulting Services
Certified Information Security Manager defines the basic skills and international benchmarks of performance that information technology security managers are expected to master. CISM provides business management the assurance that those who have been awarded their certification possess the background and skill to offer effective security administration and engineering support. Progent can provide a CISM-certified expert to help your organization in key security areas including information protection governance, risk management, data security program management, and incident handling management. Learn more information about Progent's Certified Information Security Manager Security Consulting Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP consultants are security specialists who have earned CISSP certification as a result of demonstrated experience, extensive study, and formal examination. CISSP qualification recognizes mastery of a worldwide standard for IT security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security architecture and test systems, connection control systems, applications development security, operations security, physical security, cryptography, telecommunications, Internet security, and disaster recovery planning. Get the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
- CISSP-ISSAP Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Premier cybersecurity architecture experts have been awarded ISSAP status after thorough examination and substantial experience. field experience with network security architecture. ISSAP consultants have in-depth understanding of access management mechanisms and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security consultants can help your business with all aspects of secure network architecture. Read additional details concerning Progent's ISSAP Certified Secure System Infrastructure Consulting Assistance.
- Certified Information Systems Auditor (CISA) Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that represents expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an exhaustive examination given by the ISACA professional association. Progent can provide the services of a CISA-Certified security consultant able to assist companies in the fields of information systems audit services, information technology governance, network assets and architecture lifecycle, IT service delivery, protecting information assets, and business continuity preparedness. Read additional information concerning Progent's CISA Support Services.
- CRISC Risk Mitigation Specialists
The CRISC program was established by ISACA to validate an IT professional's ability to plan, deploy, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's network risk management expertise is complementary to the support provided by Progent's CISA-Premier security engineers for impartially evaluating your IT control design and with the expertise of Progent's CISM-certified consultants for designing security policies. Find out more information about Progent's CRISC-certified Network Risk Management Services.
- Global Information Assurance Certification Professional Services
GIAC was founded in 1999 to certify the knowledge of computer security experts. GIAC's goal is to assure that an accredited security consultant has the skills appropriate to deliver services in vital categories of system, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent can provide the help of certified security engineers for all of the security disciplines addressed within GIAC certification programs such as assessing perimeters, incident handling, traffic analysis, and web-based services security. Learn more details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Expertise.
Depend on Progent for Network Security Expertise
If you need computer security expertise, call Progent at 800-993-9400 or go to Contact Progent.