Overview of Progent's Security and Compliance Support Services
Progent's certified computer security consultants offer a broad selection of support services designed to assist organizations of any size to uncover and eliminate security weaknesses, block attacks, remediate any problems caused by a breakdown of protection, and meet regulatory requirements for guarding information and reporting incidents. Progent can provide a selection of service models:

  • As-needed remote and on-site support invoiced to the nearest minute
  • On-going managed services billed at a low flat monthly fee
  • Set-price service bundles for a single security and compliance assessment
As-needed Security Consulting Services
After you sign up for Progent's services (registration is free), you can get as-needed online or on-premises assistance from a Progent security consultant. This classic support model is primarily reactive and optimized for quickly resolving IT problems that are affecting your productivity or that have stymied your in-house support staff. Common scenarios include debugging a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch, setting up secure access to cloud-based resources, or restoring data after a ransomware attack. These security services are billed by the minute, which eliminates the frustrating situation of getting big invoices for quick repairs.

Delivery alternatives for Progent's on-demand support services include:

  • Remote Security Services
    The majority security issues can be resolved remotely via a combination of phone support and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants with the experience and technical resources to resolve many of the most challenging problems quickly, keeping your support expenses low and reducing lost productivity.
  • On-premises Security Support
    For instances where onsite assistance is necessary, Progent can send a technical expert to major cities throughout the United States. Progent can also send a security specialist with high-level certifications and world-class skills to any site in the country.
Progent's security engineers are premier to provide help for environments powered by Windows, Linux, macOS and OS X, Sun, and popular versions of UNIX. Progent's broad selection of consulting services covers firewall configuration, email systems, secure system architecture, and information recovery. Progent's technical support staff has earned the world's most advanced security certifications including CISM and CISSP. Progent also offers immediate access to online Cisco-certified CCIE network consultants who can provide advanced support with tough network configuration issues.

ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight suite of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to guard endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the entire threat progression including blocking, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    ProSight Enhanced Security Protection managed services offer affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a single console. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP environment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent action. Progent's consultants can also help you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid recovery of critical files, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to set up ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Find out more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top information security companies to provide web-based management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss protection.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for smaller organizations to map, track, enhance and debug their networking appliances like switches, firewalls, and wireless controllers plus servers, printers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network maps are kept current, captures and displays the configuration of almost all devices on your network, monitors performance, and sends alerts when issues are discovered. By automating time-consuming network management activities, WAN Watch can cut hours off ordinary chores like network mapping, expanding your network, locating devices that require important updates, or resolving performance problems. Find out more about ProSight WAN Watch infrastructure management consulting.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your IT system operating at peak levels by tracking the health of vital computers that drive your business network. When ProSight LAN Watch detects a problem, an alert is sent automatically to your designated IT management staff and your assigned Progent consultant so all looming issues can be resolved before they have a chance to impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs or domains. By cleaning up and managing your network documentation, you can eliminate up to 50% of time spent searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and low-cost way for small and mid-size organizations to get an unbiased evaluation of the health of their information system. Based on a selection of the top remote monitoring and management platforms in the industry, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits show you how well the deployment of your essential infrastructure devices adhere to best practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide instant ROI like a more manageable Active Directory system. Both versions also include a year of advanced remote network monitoring and management (RMM). Advantages can include simpler network management, improved compliance with data security standards, more efficient utilization of IT resources, quicker troubleshooting, more dependable backup and restore, and higher availability. See more about ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a phone interview with a Progent backup/recovery expert. The interview is designed to assess your company's ability to block or recover rapidly after an attack by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to gather information about your existing antivirus tools and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can follow best practices to create a cost-effective AV and backup system that meets your business needs. For additional information, refer to The ProSight Ransomware Preparedness Report.

Set-price Security Assessment and Verification Packages
Progent offers a number of flat-rate security assessment packages that provide exceptional value by deploying Progent's advanced system monitoring software plus Progent's technical skills to create an unbiased and comprehensive evaluation of your network security profile.

  • Security Assessment Service Packages for Small Businesses
    Progent offers two ultra-affordable security inventory packages designed to allow small businesses to obtain a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your network from outside your corporate firewall to determine possible gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security consultant executes a network scan from an authorized machine within your firewalled perimeter to assess your exposure to inside attacks. These two security inventory services are set up and executed from a secured offsite location. The scan is administered by a consultant who has been awarded advanced security certifications and who creates a report that details and evaluates the information collected by the scan and suggests practical improvements where required.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent offers three levels of set-price security assessment service packages designed for large organizations who want to meet compliance standards required by state or industry regulators. Progent's security assessment service bundles offer enterprises an opportunity to get an objective look at the strength of their security profile. For each security assessment bundle, Progent consultants with advanced security credentials analyze and report on collected data and provide recommendations for efficient improvements. Each of the network security assessment bundles include an extra-cost option for on-premises consultants at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is an accepted technique for allowing organizations to find out how open their IT environments are to current-generation attacks. Progent's stealth penetration testing services test how well your corporate security procedures and technologies stand up to authorized but unannounced penetration attempts managed by Progent's veteran security experts utilizing advanced hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Should We Do?
Network Security ConsultantsIf you are now experiencing a network security emergency and you have not prepared a formal response plan, go to Progent's Remote Computer Help to see how to receive fast help. Progent provides remote assistance from skilled network technicians and can escalate trouble tickets to certified security experts if necessary. Your company does not need to be a current Progent customer to get emergency support for a security breach, but you can sign up as a Progent customer in advance at no cost and your status as a current customer can save valuable time during a crisis.

Typically, smaller organizations do not have a recovery procedure in case of a damaging penetration. This is risky, since the cost of a successful security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security specialists can help your company to create an effective response and incident reporting plan that minimizes the network downtime resulting from a security breach. The formal post-attack handling model promoted by GIAC is Progent's recommended procedure for reacting to a serious security penetration.

High-value Security Expertise Available from Progent
Progent's security engineers offer specialized help in vital areas of network protection such as:

  • Security Vulnerability Audits and Security Compliance Testing
    Progent offers experience with security auditing utilities like MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive system scans to identify possible security gaps. Progent has extensive skills with monitoring tools and can assist you to analyze assessment reports and react appropriately. Progent's certified security engineers also offer web software validation and can perform expert assessments of enterprise-wide security to determine your company's compliance with important global security standards such as HIPAA, PCI, and ISO. Also, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances plus portable devices. Find out more details concerning Progent's Vulnerability Evaluation and Compliance Testing.
  • Designing, Building, and Validating Secure Environments
    Every organization ought to have a thoroughly considered security plan that incorporates both preventive and responsive activity. The pre-attack strategy is a set of steps that works to minimize vulnerabilities. The post-attack plan specifies activities to help security staff to evaluate the damage caused by an attack, remediate the damage, record the experience, and revive network activity as soon as possible. Progent can show you how to design security into your business operations, install scanning software, create and implement a safe network infrastructure, and recommend processes and policies to maximize the protection of your computing environment. Progent's security experts are available to assist you to configure a firewall, design safe offsite connectivity to e-mail and files, and install an efficient VPN. If your company is interested in an economical option for jobbing out your network security administration, Progent's Round-the-clock Network Support Services include automated remote server monitoring and quick response to problems.
  • Data Restoration and Security Forensics
    Progent provides skill in restoring systems and devices that have been hacked, are quarantined, or have stopped working as a result of a security attack. Progent can help determine the damage resulting from the assault, restore ordinary business operations, and retrieve data compromised as a result of the assault. Progent's security engineers can also perform a thorough failure evaluation by examining event logs and utilizing a variety of advanced assessment techniques. Progent's background with security problems minimizes your downtime and permits Progent to suggest efficient measures to avoid or mitigate future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco CCIE Security ExpertsThe current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.
  • Other Firewall and Virtual Private Network Solutions Provided by Progent
    In addition to supporting a broad array of protection technologies available from Microsoft and Cisco, Progent can provide small and mid-size businesses expert engineering services for security products from other popular firewall and Virtual Private Network suppliers by delivering services such as:
  • SIEM Solutions
    Security information and event management (SIEM) applications and services are designed to make sense the enormous amounts of information collected in security event records generated by a wide range of sources such as network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM software analyzes the security event records from these diverse sources and creates summary reports of security incidents as mandated by state regulations and industry compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure consultants can help businesses to plan, install and manage a SIEM solution that enables them to see the progress of security incidents and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Credentials
Progent's security professionals have earned the most prestigious accreditations offered in the industry. All of these accreditations demand exhaustive examinations and proven field background to guarantee that recipients have acquired expertise with a substantial amount of security information and methodologies and can offer high-level consulting to information networks of any size.
  • Certified Information Security Manager (CISM) Security Consulting Expertise
    CISM defines the basic skills and international benchmarks of performance that computer security managers are expected to master. It provides business management the confidence that those who have earned their accreditation have the background and skill to provide effective security administration and engineering support. Progent can offer a CISM-certified expert to help your enterprise in critical security disciplines including information security governance, vulnerability management, information security program management, and incident response management. Learn more details concerning Progent's CISM Security Consulting Services.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security engineers who have earned CISSP status as a result of verified experience, extensive study, and formal examination. CISSP Certification recognizes mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration procedures, security architecture and test systems, access permission methodology, software development security, operations security, physical security, cryptography, telecommunications, network security, and business continuity planning. Find out the details about Progent's CISSP Consulting Assistance.

  • CISSP-ISSAP} Security Architecture Consulting Support Services
    Progent's CISSP-ISSAP Certified cybersecurity architecture experts have been awarded ISSAP accreditation after thorough testing and substantial hands-on work with information security design. ISSAP consultants have acquired in-depth understanding of access management systems and techniques, phone system and network protection, cryptography, requirements analysis, BCP and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security specialists can assist your company with all phases of architecture security. Learn the details concerning Progent's ISSAP Accredited Secure IT Architecture Consulting Support.

  • CISA Consulting Expertise
    The Certified Information Systems Auditor accreditation is a globally recognized qualification that signifies mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an exhaustive examination given by the ISACA international professional group. Progent can provide the expertise of a CISA-Premier security audit consultant able to assist businesses in the areas of IS audit process, IT administration, systems and architecture planned useful life, IT support, protecting data resources, and disaster recovery preparedness. Find out additional details concerning Progent's Certified Information Systems Auditor (CISA) Support Assistance.

  • CRISC-certified Risk Management Experts
    The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's ability to plan, deploy, and support IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's risk management services are complementary to the support available from Progent's CISA-Certified security engineers for impartially auditing your IS management design and also with the services of Progent's CISM consultants for defining company-wide security policies and procedures. Learn the details about Progent's CRISC-certified IT Risk Management Services.

  • GIAC Support Expertise
    Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security experts. GIAC's mission is to verify that an accredited security consultant has the skills needed to deliver support in vital areas of system, information, and software security. GIAC accreditations are recognized by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent can provide the expertise of certified professionals for any of the security capabilities covered under GIAC accreditation programs including assessing IT infrastructure, security incident handling, traffic analysis, and web application security. Read more details about Progent's GIAC (Global Information Assurance Certification) Support Assistance.
Depend on Progent for Computer Security Consulting Services
If you want security consulting expertise, telephone Progent at 800-993-9400 or go to Contact Progent.