Introduction to Progent's Security and Compliance Support Services
Progent's industry certified computer security experts can provide a wide range of support services intended to help companies of all sizes to detect and eliminate security weaknesses, block attacks, remediate any issues caused by a breach of security, and meet regulatory requirements for guarding information and reporting security incidents. Progent offers a selection of service models:
On-demand Security and Compliance Consulting Services
- On-demand online and on-premises assistance billed to the nearest minute
- Continual managed services invoiced at an affordable flat monthly fee
- Value-priced service packages for a single security and compliance evaluation
After you register for Progent's services (registration is free), you can receive as-needed online or on-premises support from one of Progent security consultant. This traditional support model is essentially reactive and optimized for rapidly taking care of technical issues that are impacting your network or that have stumped your in-house support personnel. Typical examples include configuring a firewall appliance or VPN tunnel, implementing a vital security patch for a Cisco switch or router, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These security services are billed to the nearest minute, which eliminates the annoying case of getting big invoices for fast fixes.
Delivery alternatives for Progent's on-demand support include:
Progent's accredited consultants are certified to provide help for systems powered by Microsoft, Linux, macOS and OS X, Sun, and popular versions of UNIX. Progent's broad range of services addresses firewall expertise, email security, secure system architecture, and data recovery. Progent's technical support staff has earned the industry's top security certifications including GIAC and CISSP. Progent also can provide fast access to online Cisco CCIE network infrastructure engineers who can provide world-class support with complex network integration issues.
- Remote Security Support
The majority security-related issues can be handled remotely via a combination of phone support and an connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver online security help by offering efficient access to consultants with the experience and resources to resolve many of the most challenging problems quickly, keeping your service costs low and reducing lost productivity.
- On-premises Security Services
For instances where onsite assistance is necessary, Progent can dispatch a technical expert to major cities across the United States. Progent can also dispatch a security specialist with top certifications and advanced skills to any location in the country.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight suite of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis technology to guard endpoint devices as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which easily get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including protection, infiltration detection, containment, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization consultants can help you to design and implement a ProSight ESP deployment that meets your company's specific requirements and that allows you demonstrate compliance with legal and industry data protection standards. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent's consultants can also help your company to install and verify a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows rapid recovery of vital data, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can assist you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security companies to provide web-based management and comprehensive protection for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage prevention.
- ProSight WAN Watch: Infrastructure Management
Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, monitor, optimize and troubleshoot their connectivity hardware such as routers, firewalls, and wireless controllers as well as servers, client computers and other networked devices. Incorporating cutting-edge RMM technology, WAN Watch makes sure that network maps are always updated, copies and displays the configuration information of virtually all devices on your network, monitors performance, and sends alerts when problems are detected. By automating tedious network management activities, ProSight WAN Watch can cut hours off ordinary chores like making network diagrams, expanding your network, locating devices that require critical software patches, or isolating performance issues. Find out more details about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to keep your IT system running efficiently by tracking the health of critical assets that power your information system. When ProSight LAN Watch detects a problem, an alert is sent automatically to your specified IT personnel and your Progent consultant so any looming issues can be resolved before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hardware solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can save up to half of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a fast and low-cost way for small and mid-size organizations to obtain an objective assessment of the overall health of their IT system. Based on some of the leading remote monitoring and management (RMM) tools available, and supervised by Progent's certified team of information technology experts, ProSight Network Audits help you see how closely the configuration of your essential infrastructure devices adhere to leading practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate ROI like a cleaner Active Directory environment. Both versions also include a year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier network management, improved compliance with government and industry security standards, higher utilization of IT assets, quicker problem resolution, more dependable backup and restore, and less downtime. Read more information about ProSight Network Audits network infrastructure review.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service built around a phone interview with a Progent backup/recovery expert. The interview is designed to help evaluate your company's ability to stop or recover quickly following an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you directly to gather information concerning your existing antivirus tools and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to deploy an efficient security and backup environment that aligns with your business needs. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Verification Packages
Progent offers a selection of set-price security evaluation packages that deliver high value by utilizing Progent's enterprise-class system monitoring tools as well as Progent's technical skills to create an objective and thorough evaluation of your IT environment security profile.
We've Been Hacked: What Should We Do?
- Security Assessment Service Packages for Small Businesses
Progent offers two value-priced security inventory scanning service packages designed to enable small businesses to get an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT system from beyond your firewalled perimeter to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized machine within your firewalled perimeter to evaluate your exposure to internal threats. These two security inventory services are set up and run from a secured offsite location. The project is managed by an engineer who has been awarded advanced security certifications and who produces a report that describes and evaluates the data captured by the security scan and suggests practical enhancements where appropriate.
- Security Vulnerability Evaluation Bundles for Large Organizations
Progent has developed three levels of fixed-price security evaluation service bundles intended for enterprises who need to meet security standards required by government or industry agencies. Progent's security evaluation service bundles offer larger organizations an opportunity to obtain an objective assessment at the strength of their security profile. For each security evaluation bundle, Progent engineers with top security credentials analyze and report on collected data and offer suggestions for efficient improvements. Each of the network security audit packages include an extra-cost option for onsite consultants at any location in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, often referred to as PEN testing, is a vital tool for helping businesses to determine how vulnerable their IT environments are to modern attacks. Progent's stealth penetration testing test how effectively your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security specialists utilizing advanced hacking methods. Find out about Progent's stealth penetration testing services.
If your business is currently fighting a network security crisis and you have no detailed response procedure, visit Progent's Remote Network Support to find out how to get immediate assistance. Progent provides remote technical support from skilled engineers and can refer trouble tickets to certified security experts if necessary. Your business does not need to be a registered Progent client to get emergency support for a security breakdown, but you can register as a Progent customer ahead of time at no cost and your standing as a current customer could save valuable time during a crisis.
Usually, smaller businesses have not documented a recovery plan in the event of a damaging attack. This is risky, because the cost of a serious security attack can be even more devastating for a small business than for a large enterprise. Progent's security consultants can help your company to design an effective response and event reporting plan that reduces the network disruption following a security breach. The step-by-step incident response procedure promoted by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for responding to a major security attack.
Advanced Security Services Available from Progent
Progent's seasoned consultants can provide advanced support in key areas of IT protection such as:
Progent's Security Certifications
- Information Risk Evaluation and Security Compliance Testing
Progent offers experience with information risk evaluation tools such as Microsoft Baseline Security Analyzer and LANguard for conducting a set of comprehensive system scans to reveal possible security gaps. Progent has broad experience with scanning tools and can assist you to analyze audit results and react efficiently. Progent's security engineers also offer web software testing and can perform thorough assessments of enterprise-wide security to verify your company's compliance with important global security specifications such as HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless protection including fixed wireless appliances as well as portable devices. Get additional information about Progent's Vulnerability Audits and Compliance Assessment.
- Planning, Building, and Testing Secure Networks
Every company ought to have a carefully thought out security strategy that incorporates both preventive and reactive elements. The proactive strategy is a set of precautions that works to minimize vulnerabilities. The post-attack strategy defines activities to assist IT staff to assess the damage caused by an attack, remediate the damage, record the event, and revive network functions as soon as possible. Progent can advise you how to incorporate security into your company processes, configure scanning utilities, create and execute a safe IT architecture, and recommend procedures and policies to enhance the safety of your information system. Progent's security experts are ready to help you to configure a firewall, design protected offsite connectivity to e-mail and files, and configure an efficient virtual private network (VPN). If your company is interested in an affordable way for outsourcing your security administration, Progent's Round-the-clock Monitoring Options feature non-stop remote server monitoring and quick response to problems.
- Data Recovery and Failure Analysis
Progent offers expertise in recovering networks and servers that have been hacked, are suspect, or have ceased to function as a result of a security attack. Progent can help assess the damage caused by the attack, restore normal business operations, and retrieve information lost as a result of the attack. Progent's certified engineers can also perform a comprehensive failure evaluation by going over event logs and using a variety of proven forensics tools. Progent's background with security issues reduces your downtime and permits Progent to propose efficient ways to prevent or contain new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
- Other Firewall and Virtual Private Network Technologies Provided by Progent
As well as supporting a broad array of protection solutions from Microsoft and Cisco, Progent offers small and mid-size organizations top-level engineering services for products from other important firewall and Virtual Private Network suppliers by offering services such as:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) applications and services are designed to digest the enormous amounts of data collected in security event records created by a wide range of sources such as network infrastructure appliances, servers, and application software and monitoring tools. SIEM applications analyzes the security logs from these various sources and creates summary reports of security events as mandated by government regulations and industry compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco CCIE certified network infrastructure consultants can help organizations to design, install and manage a SIEM system that enables them to see the progress of attacks and comply with event reporting regulations. (See Progent's Security information and Event Management solutions.)
Progent's security consultants have been awarded the most respected certifications available in the industry. All of these certifications require exhaustive testing and proven field background to guarantee that recipients have acquired expertise with a significant amount of security knowledge and methodologies and can provide high-level security solutions to information environments of any size.
Get in Touch with Progent for Computer Security Consulting Services
- CISM Security Support Services
Certified Information Security Manager defines the core competencies and worldwide standards of service that computer security professionals are expected to master. CISM provides business management the assurance that those who have earned their certification have the background and knowledge to offer efficient security management and consulting services. Progent can offer a CISM support professional to help your organization in vital security disciplines including information security governance, vulnerability management, data protection program management, and incident handling support. Read more details concerning Progent's CISM Security Consulting Expertise.
- CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP certification through demonstrated professional work, rigorous study, and formal examination. CISSP Certification recognizes expertise in a worldwide standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include security management practices, security architecture and test systems, connection control systems, applications development security, business processes security, physical security, cryptography, telecommunications, network security, and disaster recovery planning. Read more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
- CISSP-ISSAP} Security Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified security architecture consultants have earned ISSAP status following thorough examination and significant hands-on work with network security architecture. ISSAP security experts have comprehensive knowledge of access control systems and techniques, phone system and network infrastructure protection, cryptography, needs evaluation, business continuity and DRP, and physical security integration. Progent's CISSP-ISSAP-premier security experts can help your business with all aspects of secure network architecture. Read more information about Progent's ISSAP Certified Protected IT Architecture Consulting Services.
- Certified Information Systems Auditor Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an exhaustive examination given by the ISACA professional association. Progent offers the expertise of a CISA-Certified security audit engineer able to help companies in the fields of IS audit process, IT enforcement, systems and infrastructure planned useful life, IT service delivery, protecting data resources, and business continuity preparedness. Get more information concerning Progent's Certified Information Systems Auditor Support Assistance.
- CRISC-certified Risk Management Specialists
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's skills to plan, deploy, and maintain IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and carry out a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's risk mitigation services are a good fit the services provided by Progent's CISA-Certified security engineers for impartially evaluating your IS control mechanisms and also with the services of Progent's CISM experts for defining security policies. Get more details concerning Progent's CRISC Network Risk Management Support.
- GIAC Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to ensure that an accredited security consultant possesses the knowledge needed to deliver services in vital areas of network, data, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent can provide the expertise of certified professionals for any of the security capabilities addressed within GIAC accreditation topics including assessing security systems, incident response, intrusion detection, and web services security. Read additional details about Progent's Global Information Assurance Certification Consulting Expertise.
If you need network security consulting expertise, phone Progent at 800-993-9400 or refer to Contact Progent.