Overview of Progent's Security and Compliance Support Services
Progent's industry certified network security consultants can provide a broad selection of services intended to assist organizations of all sizes to identify and correct security weaknesses, defend against assaults, recover from any damage caused by a breach of protection, and comply with regulatory requirements for guarding information and reporting incidents. Progent can provide a choice of service modes:
On-demand Security and Compliance Support Services
- On-demand online and on-premises assistance billed to the nearest minute
- Continual managed services invoiced at an affordable flat monthly rate
- Set-price service bundles for a single security and compliance assessment
Once you register for Progent's services (registration is free), you can get as-needed online or onsite support from one of Progent security and compliance consultant. This traditional service model is essentially reactive and geared toward rapidly taking care of IT issues that are impacting your productivity or that have stumped your own support staff. Common scenarios include replacing a firewall appliance or VPN tunnel, installing a vital security update for a Cisco switch or router, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These security services are billed by the minute, which eliminates the frustrating case of getting large bills for fast fixes.
Delivery options for Progent's on-demand support services include:
Progent's accredited security consultants are certified to provide help for systems powered by Microsoft, Linux, Apple Mac, Sun, and popular versions of UNIX. Progent's broad array of consulting services addresses firewall configuration, e-mail security, protected system design, and data restoration. Progent's technical support staff has earned the industry's top security certifications including Certified Information Security Manager and CISSP. Progent also offers fast access to online Cisco CCIE network infrastructure consultants who can deliver world-class support with complex network configuration problems.
- Online Security Support Services
Most security-related problems can be handled remotely via a mix of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver online security help by offering efficient access to consultants with the background and resources to resolve many of the most challenging issues quickly, making your support costs low and minimizing downtime.
- On-premises Security Support Services
For instances where on-premises support is required, Progent can dispatch a technical expert to major metropolitan areas across the U.S. Progent can also dispatch a security specialist with top certifications and advanced skills to any site in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior analysis tools to guard endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus products. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the complete threat progression including filtering, identification, mitigation, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies incorporated within a single agent managed from a single control. Progent's data protection and virtualization experts can help you to plan and implement a ProSight ESP environment that meets your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry information protection regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent's consultants can also help your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
- ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of critical files, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can deliver world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security companies to provide web-based management and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local security gateway can also assist Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for smaller organizations to map, track, reconfigure and debug their connectivity appliances like switches, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology maps are kept updated, copies and displays the configuration information of almost all devices connected to your network, tracks performance, and sends alerts when potential issues are discovered. By automating time-consuming management activities, ProSight WAN Watch can cut hours off common tasks such as network mapping, reconfiguring your network, finding appliances that need important software patches, or identifying the cause of performance problems. Find out more details about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring service that uses advanced remote monitoring and management (RMM) technology to help keep your IT system operating at peak levels by tracking the health of critical assets that drive your information system. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your specified IT management personnel and your Progent consultant so any looming problems can be addressed before they can disrupt your network Learn more details about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host set up and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard data related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSLs ,domains or warranties. By updating and managing your network documentation, you can save up to half of time wasted looking for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and medium-size organizations to obtain an unbiased evaluation of the health of their IT system. Powered by a selection of the top remote monitoring and management (RMM) platforms available, and overseen by Progent's certified group of information technology experts, ProSight Network Audits show you how closely the deployment of your essential network devices adhere to best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate benefits like a cleaner Active Directory (AD) system. Both also include one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include lower-cost network management, improved compliance with government and industry security requirements, more efficient utilization of IT assets, quicker problem resolution, more dependable backup and restore, and higher availability. See more information about ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a brief interview with a Progent backup/recovery expert. The interview is intended to help evaluate your company's ability either to stop or recover rapidly after an attack by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you directly to collect information concerning your existing AV defense and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to build a cost-effective AV and backup environment that aligns with your business requirements. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Verification Bundles
Progent offers a variety of fixed-price security and compliance evaluation bundles that deliver exceptional value by utilizing Progent's advanced network monitoring software plus Progent's consulting skills to produce an unbiased and comprehensive assessment of your network security posture.
We've Been Hacked: What Do We Do Now?
- Security Inventory Service Bundles for Small Organizations
Progent offers two ultra-affordable security inventory service packages designed to enable small businesses to get a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your IT system from outside your firewalled perimeter to identify possible gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a security expert runs a system scan using an authorized machine within your company firewall to evaluate your exposure to inside threats. These two security inventory services are set up and executed from a secured external site. The scan is administered by a consultant who has earned high-level security certifications and who produces a report that details and interprets the information collected by the security scan and suggests practical improvements where required.
- Security Vulnerability Assessment Packages for Large Businesses
Progent has developed three levels of flat-rate security assessment service packages designed for enterprises who want to meet security standards required by state or industry regulators. Progent's security assessment service bundles offer larger businesses an opportunity to obtain an objective look at the strength of their security posture. For every security assessment package, Progent engineers with advanced security credentials study and report on collected data and provide suggestions for cost-effective improvements. All the network security audit packages include an added-cost option for on-premises engineers anywhere in the United States.
- Stealth Penetration Testing
Stealth penetration testing, commonly known as PEN testing, is an accepted technique for helping businesses to find out how open their IT systems are to modern attacks. Progent's stealth penetration testing test how well your existing security procedures and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's certified security specialists utilizing advanced hacking techniques. Find out about Progent's stealth penetration testing services.
If you are currently faced with a security crisis and you have no formal response procedure, refer to Progent's Remote Computer Help to see how to get immediate help. Progent provides online assistance from skilled engineers and can refer trouble tickets to certified security specialists if required. Your organization does not need to be a registered Progent customer to get urgent support for a security breach, but you can register as a Progent client in advance at no cost and your standing as a registered client can save precious time in a crisis.
Usually, smaller companies have no response procedure in case of a damaging security breach. This is not good, since the cost of a successful security assault can be even more devastating for a small company than for a large enterprise. Progent's security consultants can assist your you to design an effective recovery and event reporting procedure that minimizes the network downtime resulting from a security breach. The formal incident handling model outlined by GIAC (Global Information Assurance Certification) is Progent's preferred procedure for responding to a serious security penetration.
High-value Security Expertise Offered by Progent
Progent's veteran consultants offer advanced support in vital facets of network protection including:
Progent's Security Credentials
- Information Risk Evaluation and Compliance Assessment
Progent offers experience with security auditing tools such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic system tests to identify possible security gaps. Progent has broad experience with these tools and can help you to understand assessment results and react efficiently. Progent's security engineers also offer web application testing and can perform expert assessments of enterprise-wide security to verify your organization's compliance with important industry security standards such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including fixed wireless equipment as well as portable handsets. Find out the details about Progent's Security Vulnerability Audits and Compliance Testing.
- Planning, Building, and Validating Secure Environments
Every business should develop a carefully considered security strategy that includes both proactive and responsive activity. The proactive plan is a set of steps that works to reduce vulnerabilities. The reactive strategy specifies activities to assist security personnel to inventory the losses resulting from a breach, repair the damage, record the event, and restore business activity as soon as possible. Progent can show you how to build protection into your company operations, set up scanning utilities, create and build a safe IT infrastructure, and recommend procedures and policies to optimize the safety of your computing environment. Progent's security professionals are available to help you to set up a firewall, deploy protected offsite connectivity to email and files, and install an efficient VPN. If you are interested in an economical option for outsourcing your network security administration, Progent's Round-the-clock Monitoring Options include non-stop online server tracking and quick response to problems.
- System Recovery and Failure Analysis
Progent has skill in recovering systems and computers that have been compromised, are suspect, or have failed because of a security breakdown. Progent can show you how to assess the damage resulting from the attack, restore ordinary business operations, and recover data compromised owing to the event. Progent's certified specialists can also manage a comprehensive forensic analysis by examining event logs and utilizing other advanced forensics techniques. Progent's background with security consulting minimizes your downtime and allows Progent to propose efficient measures to avoid or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower integration and debugging support.
- Additional Firewall and Virtual Private Network Technologies
As well as being expert in a wide range of protection technologies from Microsoft and Cisco, Progent offers small and mid-size businesses expert consulting for solutions from other popular firewall and Virtual Private Network (VPN) vendors such as:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are designed to make sense the massive quantity of information represented by security event logs generated by multiple sources including network appliances, operating systems, and applications and tools. SIEM applications organizes the security event records from these diverse sources and produces summary reports of security incidents as required by government regulations and business compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network experts can help businesses to design, deploy and manage a SIEM system that enables them to understand the behavior of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's security consultants have earned the most prestigious accreditations available in the industry. These certifications demand extensive testing and demonstrated work experience to ensure that candidates have mastered a substantial body of security knowledge and methodologies and can offer high-level security solutions to information environments of any complexity.
Get in Touch with Progent for Network Security Help
- CISM Security Support Expertise
CISM defines the fundamental competencies and international standards of service that information security professionals are expected to achieve. It provides business management the confidence that those who have earned their accreditation possess the background and knowledge to offer efficient security administration and consulting support. Progent can offer a CISM-certified consultant to assist your enterprise in critical security areas such as data security governance, vulnerability assessment, information security process management, and incident response management. Find out additional information about Progent's Certified Information Security Manager Security Consulting Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's CISSP consultants are security specialists who have been awarded CISSP status as a result of demonstrated professional work, extensive study, and formal testing. CISSP qualification recognizes expertise in an international standard for information security. American National Standards Institute has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management practices, security design and test systems, connection permission methodology, applications development security, business processes security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Get the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support
Progent's CISSP-ISSAP Premier security architecture experts have earned ISSAP accreditation as a result of rigorous examination and substantial experience. field experience with information security architecture. ISSAP consultants possess in-depth knowledge of access control mechanisms and techniques, phone system and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security experts can assist your business with all phases of architecture security. Find out additional information concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Assistance.
- Certified Information Systems Auditor (CISA) Consulting Services
The Certified Information Systems Auditor (CISA) credential is an important qualification that signifies mastery in IS security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass an extensive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-Premier security engineer trained to assist companies in the areas of IS audit services, IT governance, systems and infrastructure lifecycle, IT support, protecting information assets, and disaster recovery preparedness. Get the details concerning Progent's Certified Information Systems Auditor Support Expertise.
- CRISC-certified Risk Management Experts
The CRISC program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and carry out a workplace continuity plan that follows leading practices identified by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's risk mitigation services are complementary to the support provided by Progent's CISA-Certified security engineers for objectively auditing your IT management design and with the expertise of Progent's CISM-certified consultants for defining company-wide security policies and procedures. Learn additional information concerning Progent's CRISC-certified IT Risk Management Support.
- Global Information Assurance Certification Support Services
GIAC was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to verify that a certified professional has the skills needed to provide services in critical areas of network, data, and application software security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. NSA. Progent can provide the support of GIAC certified professionals for all of the network security disciplines covered under GIAC certification programs such as auditing security systems, security incident response, traffic analysis, and web-based application security. Find out the details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Expertise.
If you want computer security expertise, phone Progent at 800-993-9400 or refer to Contact Progent.