Overview of Progent's Security and Compliance Support Services
Progent's industry certified computer security and compliance experts can provide a broad range of services designed to assist businesses of any size to uncover and correct security weaknesses, defend against malicious attacks, remediate the issues caused by a breach of security, and comply with regulatory requirements for guarding data and reporting security incidents. Progent offers a choice of service modes:

  • On-demand online and on-premises support billed by the minute
  • On-going fully managed services billed at an affordable fixed monthly rate
  • Value-priced service bundles for a single security and compliance assessment
As-needed Security and Compliance Consulting Services
Once you sign up for Progent's services (registration is free), you can receive on-demand online or onsite assistance from a Progent security expert. This classic support model is essentially reactive and optimized for quickly taking care of technical problems that are impacting your network or that have stumped your in-house support personnel. Common examples are debugging a firewall or VPN connection, installing a vital security patch for a Cisco switch, setting up secure access to cloud-based resources, or restoring data after a ransomware attack. These security services are invoiced by the minute, which avoids the frustrating case of receiving large invoices for fast fixes.

Delivery options for Progent's as-needed support include:

  • Remote Security Services
    Most security issues can be handled remotely through a combination of phone support and a remote connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can deliver remote security help by offering efficient access to consultants who have the experience and technical resources to fix some of the most challenging problems quickly, keeping your service costs low and reducing downtime.
  • Onsite Security Support Services
    For instances where on-premises assistance is required, Progent can send a technical expert to major cities throughout the United States. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any site in the U.S.
Progent's security engineers are premier to provide help for systems based on Windows, Linux, Mac, Solaris, and major derivatives of UNIX. Progent's wide array of services covers firewall technology, email security, secure network architecture, and data restoration. Progent's support staff has been awarded the world's most advanced security credentials including CISA and Information System Security Architecture Professional (ISSAP). Progent also can provide immediate access to online Cisco CCIE network infrastructure consultants who can deliver world-class support with tough network configuration issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis technology to defend endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to manage the entire threat lifecycle including filtering, identification, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
    Progent's ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint management, and web filtering via leading-edge tools packaged within one agent managed from a unified control. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent action. Progent can also help your company to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

  • ProSight Data Protection Services: Managed Cloud Backup
    ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical data, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can help you to recover your business-critical data. Read more about ProSight DPS Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to deliver centralized management and world-class protection for all your inbound and outbound email. The hybrid structure of Email Guard combines cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of inspection for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and affordable for smaller businesses to map out, track, reconfigure and troubleshoot their connectivity appliances like routers, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that infrastructure topology maps are kept updated, copies and manages the configuration information of virtually all devices on your network, monitors performance, and generates alerts when potential issues are detected. By automating complex network management processes, ProSight WAN Watch can knock hours off common tasks such as making network diagrams, reconfiguring your network, locating devices that need critical updates, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to keep your IT system running at peak levels by checking the health of critical assets that power your information system. When ProSight LAN Watch uncovers an issue, an alarm is sent automatically to your specified IT personnel and your Progent consultant so any looming problems can be addressed before they can impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be ported easily to a different hardware environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can eliminate up to 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and mid-size organizations to get an unbiased assessment of the health of their network. Based on a selection of the leading remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's certified team of information technology experts, ProSight Network Audits show you how closely the configuration of your core infrastructure devices conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate benefits like a cleaner Active Directory system. Both versions also include a year of cutting-edge remote network monitoring and management (RMM). Advantages can include lower-cost management, better compliance with data security requirements, more efficient utilization of IT resources, quicker problem resolution, more dependable backup and restore, and less downtime. See more about ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service built around a brief phone interview with a Progent information assurance expert. The fact-finding interview is intended to evaluate your company's preparedness either to stop or recover rapidly following an attack by a ransomware variant such as Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you personally to gather information concerning your existing AV defense and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow best practices to build an efficient AV and backup/recovery system that aligns with your business requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report Service.

Flat-rate Security Evaluation and Verification Bundles
Progent offers a variety of flat-rate security evaluation bundles that deliver exceptional value by deploying Progent's enterprise-class network monitoring and analysis software as well as Progent's technical skills to create an objective and comprehensive evaluation of your network security profile.

  • Security Assessment Service Bundles for Small Organizations
    Progent offers two value-priced security inventory scanning packages intended to allow small organizations to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your network from beyond your firewalled perimeter to determine possible gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a security expert runs a network scan using an authorized machine inside your firewalled perimeter to evaluate your exposure to internal threats. These two security inventory services are configured and run from a secured offsite location. The scan is managed by an engineer who has been awarded advanced security certifications and who produces a document that describes and evaluates the information collected by the scan and recommend various improvements where required.
  • Security Vulnerability Evaluation Bundles for Large Organizations
    Progent has developed three levels of flat-rate security evaluation service packages designed for enterprises who need to meet security standards required by state or industry agencies. Progent's security evaluation service bundles offer larger businesses an opportunity to obtain an objective look at the viability of their security posture. For every security assessment bundle, Progent engineers with advanced security credentials study and report on collected data and provide recommendations for efficient improvements. Each of the network security assessment bundles include an extra-cost option for onsite engineers at any location in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is a critical technique for helping organizations to determine how vulnerable their network environments are to current-generation attacks. Progent's stealth penetration testing services check how well your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's certified security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Are We Supposed to Do?
Network Security ConsultantsIf your business is currently faced with a network security emergency and you have not prepared a formal response plan, go to Progent's Remote Network Help to find out how to receive immediate assistance. Progent offers remote help from skilled network technicians and can refer problems to high-level security experts if required. Your company does not need to be a registered Progent client to get emergency help for a security breakdown, but you can register as a Progent client in advance at no cost and your status as a registered client can save precious time in a crisis.

Typically, smaller organizations do not have a response procedure in the event of a damaging security breach. This is risky, because the cost of a successful security attack can be more catastrophic for a small business than for a big corporation. Progent's security consultants can assist your business to create an efficient recovery and event reporting plan that minimizes the IT system downtime following a security breach. The step-by-step incident handling procedure promoted by GIAC is Progent's suggested procedure for reacting to a serious security incident.

Advanced Security Services Offered by Progent
Progent's veteran engineers can provide expertise in key areas of IT compliance including:

  • Information Risk Evaluation and Security Compliance Testing
    Progent offers expertise with information risk auditing tools like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic network scans to uncover potential security holes. Progent has extensive skills with scanning tools and can assist you to understand assessment reports and react appropriately. Progent's security consultants also offer web application validation and can conduct expert assessments of corporate-wide security to determine your company's compliance with major global security specifications such as FISMA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless security covering stationary wireless equipment as well as mobile devices. Read the details about Progent's Vulnerability Evaluation and Security Compliance Assessment.
  • Planning, Building, and Testing Secure Environments
    Any organization should develop a thoroughly considered security strategy that includes both preventive and reactive steps. The proactive strategy is a set of precautions that works to reduce security holes. The post-attack plan specifies procedures to assist security staff to evaluate the losses resulting from an attack, remediate the damage, record the event, and revive network activity as soon as possible. Progent can show you how to build security into your business processes, install auditing software, create and execute a secure network infrastructure, and propose processes and policies to maximize the protection of your network. Progent's security professionals are ready to help you to set up a firewall, design safe offsite connectivity to e-mail and files, and install an effective virtual private network. If you are looking for an affordable way for outsourcing your network security management, Progent's 24x7 Monitoring Options include continual online server tracking and immediate response to emergencies.
  • System Restoration and Security Forensics
    Progent offers skill in restoring networks and devices that have been hacked, are in question, or have failed because of a security penetration. Progent can show you how to determine the damage caused by the breach, return your company to normal functions, and retrieve information lost owing to the event. Progent's security specialists can also oversee a thorough forensic evaluation by examining event logs and utilizing other proven forensics techniques. Progent's experience with security problems minimizes your business disruption and allows Progent to propose efficient measures to avoid or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
    Cisco Certified CCIE Security ExpertsThe current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Following Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
  • Other Firewall and Virtual Private Network Solutions
    As well as being expert in a wide array of network security technologies from Microsoft and Cisco, Progent offers small organizations expert engineering services for solutions from other major firewall and Virtual Private Network suppliers such as:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are intended to digest the enormous quantity of data represented by security incident logs generated by multiple sources such as network infrastructure appliances, servers, and applications and tools. SIEM applications analyzes the security event records from these diverse sources and creates summary reports of security events as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco-certified network experts can assist businesses to design, install and operate a SIEM system that helps them to see the progress of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security professionals have earned the most respected certifications offered in the industry. These certifications require extensive examinations and demonstrated field experience to guarantee that candidates have acquired expertise with a significant amount of security knowledge and methodologies and can provide high-level security solutions to information networks of any size.
  • CISM Security Support Services
    Certified Information Security Manager (CISM) identifies the fundamental competencies and worldwide benchmarks of performance that computer security professionals are expected to achieve. It provides executive management the confidence that those who have been awarded their accreditation possess the experience and knowledge to provide efficient security management and consulting support. Progent can offer a CISM consultant to help your organization in critical security areas including data security governance, risk management, data protection program control, and crisis handling management. Get more information about Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Support Services
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP accreditation as a result of demonstrated experience, rigorous study, and formal testing. CISSP Certification indicates expertise in an international standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security administration procedures, security design and test systems, connection control methodology, applications development security, operations security, physical security, cryptography, communications, Internet security, and business continuity planning. Find out more details concerning Progent's CISSP Support Services.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
    Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP accreditation as a result of thorough testing and extensive hands-on work with network security design. ISSAP consultants have acquired in-depth knowledge of access control systems and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-certified security experts can help your business with all phases of architecture security. Get more details concerning Progent's ISSAP Accredited Protected IT Architecture Consulting Assistance.

  • Certified Information Systems Auditor (CISA) Support Expertise
    The CISA accreditation is a recognized qualification that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an exhaustive test given by the ISACA professional association. Progent can provide the expertise of a CISA-Premier security audit professional able to help businesses in the areas of IS audit services, IT enforcement, network assets and architecture lifecycle, information technology service delivery, safeguarding data assets, and disaster recovery preparedness. Find out the details concerning Progent's Certified Information Systems Auditor (CISA) Professional Services.

  • CRISC Risk Management Consultants
    The CRISC program was established by ISACA in 2010 to verify a consultant's ability to design, deploy, and maintain information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to assist you to create and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's network risk management services are complementary to the support provided by Progent's CISA-Certified security engineers for impartially evaluating your IS management design and also with the expertise of Progent's CISM support professionals for defining security policies. Get the details about Progent's CRISC Risk Management Expertise.

  • Global Information Assurance Certification Professional Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to make sure that a certified professional has the skills needed to provide services in vital categories of system, information, and application security. GIAC certifications are recognized by businesses and government organizations throughout the world including and the United States NSA. Progent can provide the help of certified consultants for any of the network security services addressed within GIAC certification programs such as auditing IT infrastructure, security incident response, intrusion detection, and web application security. Read the details about Progent's GIAC Professional Assistance.
Depend on Progent for Computer Security Consulting Services
If you're looking for security support services, telephone Progent at 800-993-9400 or visit Contact Progent.