Overview of Progent's Security and Compliance Support Services
Progent's industry certified computer security experts offer a wide selection of services designed to assist companies of any size to identify and correct security vulnerabilities, block attacks, recover from the damage caused by a breakdown of protection, and meet regulatory requirements for guarding information and reporting incidents. Progent offers a selection of service delivery modes:
As-needed Security Consulting Services
- As-needed remote and on-site assistance invoiced by the minute
- Continual fully managed services billed at a low fixed monthly fee
- Value-priced service bundles for a one-time security and compliance evaluation
Once you sign up for Progent's services (registration is free), you can receive on-demand remote or onsite support from one of Progent security expert. This classic service model is essentially reactive and optimized for rapidly taking care of technical problems that are impacting your productivity or that have stumped your in-house support personnel. Typical scenarios are replacing a firewall or VPN connection, implementing a critical security patch for a Cisco switch or router, designing secure access to cloud-based resources, or restoring data after a ransomware attack. These security services are invoiced by the minute, which avoids the frustrating case of receiving large bills for quick fixes.
Delivery alternatives for Progent's on-demand support services include:
Progent's accredited security consultants are premier to provide help for systems powered by Windows, Linux, macOS and OS X, Sun, and popular derivatives of UNIX. Progent's wide range of consulting services encompasses firewall configuration, e-mail systems, protected system architecture, and data restoration. Progent's technical support team has been awarded the industry's most advanced security accreditations including Certified Information Security Manager (CISM) and Information System Security Architecture Professional (ISSAP). Progent also offers fast access to remote Cisco CCIE network infrastructure engineers who can deliver world-class assistance with tough network integration problems.
- Online Security Services
Most security-related issues can be handled remotely via a combination of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide online security help by offering easy access to consultants who have the background and resources to fix many of the most challenging problems quickly, making your support expenses affordable and reducing lost productivity.
- On-premises Security Services
For cases where onsite support is necessary, Progent can dispatch a technical professional to major cities throughout the United States. Progent can also send a security specialist with top certifications and advanced skills to any site in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior machine learning technology to guard endpoints as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to address the complete threat progression including filtering, identification, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows VSS and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent managed from a single control. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that meets your company's unique requirements and that helps you prove compliance with legal and industry data protection standards. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent attention. Progent's consultants can also assist you to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of vital files, apps and VMs that have become unavailable or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPAA, FIRPA, and PCI and, when necessary, can assist you to recover your critical data. Find out more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to provide web-based management and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to map, monitor, reconfigure and debug their networking appliances like switches, firewalls, and wireless controllers plus servers, printers, endpoints and other networked devices. Using cutting-edge RMM technology, ProSight WAN Watch ensures that infrastructure topology maps are always updated, copies and manages the configuration of almost all devices on your network, monitors performance, and sends alerts when potential issues are discovered. By automating tedious management activities, ProSight WAN Watch can knock hours off common tasks such as network mapping, expanding your network, finding appliances that require critical software patches, or identifying the cause of performance issues. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to keep your network operating at peak levels by checking the health of vital assets that power your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted immediately to your designated IT personnel and your assigned Progent engineering consultant so all potential problems can be addressed before they can disrupt your network Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Since the environment is virtualized, it can be moved immediately to a different hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate up to half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size businesses to get an unbiased assessment of the health of their network. Based on a selection of the leading remote monitoring and management platforms available, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how well the deployment of your essential network devices conform to best practices. The Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver instant benefits such as a cleaner Active Directory (AD) environment. Both also include a year of advanced remote network monitoring and management (RMM). Advantages can include simpler management, better compliance with data security regulations, more efficient utilization of IT assets, quicker problem resolution, more dependable backup and recovery, and higher availability. Learn more information about Progent's ProSight Network Audits network infrastructure review.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a brief interview with a Progent backup/recovery consultant. The fact-finding interview is designed to help evaluate your company's ability either to stop or recover rapidly following an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you personally to collect information concerning your existing AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow best practices to create an efficient AV and backup environment that aligns with your business requirements. For details, see Progent's ProSight Ransomware Preparedness Report.
Fixed-price Security Assessment and Verification Packages
Progent offers a number of flat-rate security assessment packages that deliver exceptional value by utilizing Progent's advanced system monitoring and analysis tools plus Progent's consulting experience to produce an objective and thorough evaluation of your network security posture.
Our Network Has Been Hacked: What Are We Supposed to Do?
- Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning service packages designed to enable small businesses to get a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your network from outside your corporate firewall to determine potential gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a certified security expert runs a system scan from an authorized machine inside your firewalled perimeter to evaluate your vulnerability to inside assaults. These two security inventory scans are configured and executed from a secured external site. The scan is administered by a consultant who has earned high-level security certifications and who produces a report that details and evaluates the data captured by the security scan and suggests various improvements where required.
- Security Vulnerability Evaluation Bundles for Large Organizations
Progent has developed three levels of fixed-price security assessment service bundles intended for large organizations who want to meet security standards required by state or industry regulators. Progent's security assessment service packages offer larger organizations a chance to get an objective assessment at the viability of their security posture. For each security assessment package, Progent consultants with top security credentials analyze and report on captured data and offer suggestions for cost-effective improvements. All the network security audit packages include an extra-cost option for onsite consultants at any location in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly called PEN testing, is a vital technique for helping organizations to determine how open their IT systems are to current-generation threats. Progent's stealth penetration testing test how effectively your corporate security policies and technologies resist authorized but unannounced intrusion attempts managed by Progent's certified security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
If your business is currently experiencing a network security crisis and you have not prepared a formal response procedure, refer to Progent's Online Technical Support to find out how to get immediate assistance. Progent provides remote assistance from skilled network technicians and can refer trouble tickets to high-level security experts if required. Your company does not have to be a registered Progent client to receive urgent support for a security problem, but you can sign up as a Progent client ahead of time for free and your standing as a current customer can save valuable time in an emergency.
Usually, smaller organizations do not have a recovery procedure in the event of a damaging security breach. This is risky, since the damage from a successful security assault can be more devastating for a small company than for a big corporation. Progent's security engineers can help your business to design a practical recovery and incident reporting plan that minimizes the network disruption following a security breach. The step-by-step incident response model outlined by Global Information Assurance Certification is Progent's suggested method for handling a major security incident.
Advanced Security Expertise Available from Progent
Progent's certified engineers can provide advanced support in vital facets of computer compliance such as:
Progent's Security Accreditations
- Information Risk Audits and Security Compliance Testing
Progent provides experience with security auditing tools like MS Baseline Security Analyzer or LANguard from GFI for performing a set of automatic network scans to identify possible security holes. Progent has broad experience with monitoring tools and can help your company to analyze assessment results and respond efficiently. Progent's certified security consultants also offer web software testing and can conduct thorough evaluation of corporate-wide security to verify your organization's compliance with important worldwide security specifications including FISMA, NIST, and ISO. Also, Progent can assess the strength of your wireless security covering fixed wireless appliances plus mobile handsets. Learn additional information about Progent's Security Vulnerability Audits and Compliance Assessment.
- Planning, Implementing, and Validating Secure Networks
Every company should have a thoroughly considered security plan that incorporates both proactive and responsive elements. The pre-attack plan is a collection of precautions that works to minimize security holes. The post-attack plan specifies activities to help security personnel to assess the losses resulting from a breach, repair the damage, record the event, and revive network functions as quickly as possible. Progent can advise you how to incorporate security into your business operations, configure auditing software, define and build a secure computer infrastructure, and recommend procedures and policies to enhance the safety of your network. Progent's security professionals are available to assist you to set up a firewall, deploy protected online and mobile access to email and data, and configure an effective virtual private network (VPN). If you are interested in an affordable option for jobbing out your network security management, Progent's Round-the-clock Network Support Packages feature non-stop remote network tracking and immediate resolution of emergencies.
- System Restoration and Failure Analysis
Progent provides expertise in recovering systems and devices that have been hacked, are quarantined, or have stopped working because of a security attack. Progent can show you how to evaluate the damage caused by the breach, restore normal functions, and recover information compromised owing to the event. Progent's security specialists can also oversee a thorough forensic analysis by examining event logs and utilizing other advanced assessment techniques. Progent's experience with security issues reduces your business disruption and allows Progent to recommend efficient measures to avoid or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. After Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.
- Other Firewall and VPN Consulting Services Offered by Progent
In addition to supporting a wide array of network security technologies from Microsoft and Cisco, Progent offers small companies top-level support for solutions from other popular firewall and VPN suppliers by providing services such as:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are intended to interpret the enormous quantity of data represented by security incident records generated by multiple sources including network infrastructure appliances, operating systems, and applications and monitoring tools. SIEM software organizes the security event records from these diverse sources and produces consolidated reports of security incidents as mandated by government regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network experts can assist businesses to design, deploy and manage a SIEM system that enables them to see the behavior of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's security engineers have earned some of the most prestigious certifications offered in the security industry. These certifications demand exhaustive examinations and proven field experience to guarantee that recipients have mastered a significant body of security information and techniques and can offer high-level consulting to information networks of any complexity.
Depend on Progent for Network Security Consulting Services
- Certified Information Security Manager Security Consulting Expertise
Certified Information Security Manager (CISM) defines the fundamental skills and worldwide benchmarks of service that IT security professionals are required to master. CISM offers business management the assurance that consultants who have earned their accreditation have the experience and skill to offer efficient security administration and consulting services. Progent can provide a CISM consultant to help your enterprise in key security areas including data security governance, vulnerability assessment, data security process control, and crisis response management. Read additional details concerning Progent's Certified Information Security Manager Security Consulting Services.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP consultants are security engineers who have been awarded CISSP certification as a result of demonstrated experience, rigorous study, and exhaustive examination. CISSP Certification recognizes expertise in a worldwide standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Fields of expertise included under CISSP include security management procedures, security design and models, connection permission methodology, software development security, business processes security, hardware security, encryption, communications, Internet security, and disaster recovery planning. Find out more details about Progent's CISSP Consulting Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Premier cybersecurity architecture experts have earned ISSAP status after thorough examination and significant experience. field experience with information security design. ISSAP consultants have in-depth knowledge of access management systems and techniques, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security integration. Progent's CISSP-ISSAP-premier security consultants can help your company with all aspects of secure network architecture. Learn the details about Progent's ISSAP Accredited Secure Network Architecture Consulting Support.
- Certified Information Systems Auditor Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test administered by the ISACA professional association. Progent offers the services of a CISA-Certified security audit engineer trained to help businesses in the fields of information systems audit services, IT enforcement, network assets and infrastructure lifecycle, information technology service delivery, protecting data resources, and disaster recovery preparedness. Learn the details about Progent's CISA Support Services.
- CRISC Network Risk Management Specialists
The CRISC program was initiated by ISACA to validate a consultant's skills to design, deploy, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a workplace continuity plan based on leading practices promoted by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's risk mitigation expertise is a good fit the support provided by Progent's CISA-Premier consultants for objectively evaluating your IS control design and with the services of Progent's CISM experts for defining company-wide security policies and procedures. Find out the details about Progent's CRISC Network Risk Management Services.
- GIAC (Global Information Assurance Certification) Support Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to make sure that an accredited professional has the knowledge necessary to provide services in vital categories of system, data, and application program security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency. Progent can provide the support of certified consultants for all of the security capabilities addressed within GIAC certification programs such as assessing IT infrastructure, incident handling, intrusion detection, and web services security. Read additional information concerning Progent's GIAC Professional Expertise.
If you need network security engineering help, phone Progent at 800-993-9400 or refer to Contact Progent.