Overview of Progent's Security Support Services
Progent's industry certified computer security consultants offer a broad range of support services intended to assist businesses of any size to uncover and correct security weaknesses, block attacks, recover from the problems caused by a breakdown of protection, and comply with government requirements for protecting data and reporting incidents. Progent offers a selection of service delivery models:
As-needed Security and Compliance Consulting Services
- On-demand remote and on-premises assistance billed to the nearest minute
- Continual managed services invoiced at an affordable fixed monthly rate
- Set-price service bundles for a single security and compliance assessment
After you register for Progent's services (signing up is free), you can receive as-needed online or on-premises assistance from one of Progent security and compliance expert. This classic service model is essentially reactive and optimized for quickly resolving IT issues that are affecting your network or that have stymied your in-house support personnel. Typical scenarios are replacing a firewall or VPN connection, implementing a critical security patch for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These services are invoiced to the nearest minute, which avoids the annoying situation of receiving large bills for fast repairs.
Delivery alternatives for Progent's as-needed support services include:
Progent's accredited security consultants are certified to provide help for systems based on Microsoft, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's wide range of consulting services covers firewall technology, e-mail security, secure network architecture, and data restoration. Progent's support staff has earned the industry's top security accreditations including Certified Information Systems Auditor (CISA) and Information System Security Architecture Professional. Progent also can provide immediate access to online Cisco CCIE network consultants who can provide advanced assistance with complex network configuration issues.
- Online Security Services
Most security-related issues can be handled online via a combination of phone help and a remote connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide remote security support by offering easy access to consultants who have the experience and technical resources to fix many of the most challenging issues quickly, making your support costs low and minimizing downtime.
- Onsite Security Support Services
For instances where onsite assistance is required, Progent can send a technical expert to major metropolitan areas throughout the U.S. Progent can also dispatch a security consultant with top certifications and advanced skills to any site in the U.S.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning tools to guard endpoint devices and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely escape legacy signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to manage the complete malware attack progression including filtering, infiltration detection, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering via leading-edge tools packaged within one agent managed from a single console. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also assist you to set up and test a backup and restore system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of vital files, applications and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR specialists can deliver world-class support to set up ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical data. Read more about ProSight DPS Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security companies to deliver web-based management and comprehensive security for your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for smaller businesses to map out, monitor, enhance and debug their networking appliances like routers and switches, firewalls, and access points as well as servers, printers, client computers and other devices. Incorporating state-of-the-art RMM technology, WAN Watch makes sure that infrastructure topology maps are always current, captures and manages the configuration of virtually all devices on your network, tracks performance, and sends notices when problems are detected. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can cut hours off common chores such as network mapping, reconfiguring your network, locating appliances that need important updates, or identifying the cause of performance issues. Find out more about ProSight WAN Watch network infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to help keep your IT system running at peak levels by checking the state of critical assets that drive your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted immediately to your designated IT personnel and your assigned Progent consultant so that any potential issues can be addressed before they have a chance to impact productivity Learn more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported easily to a different hardware solution without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard data about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time thrown away searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and affordable way for small and medium-size organizations to obtain an unbiased evaluation of the overall health of their network. Powered by some of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits help you see how closely the deployment of your core network assets conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate benefits like a more manageable Active Directory environment. Both also come with one year of state-of-the-art remote network monitoring and management. Benefits can include easier management, better compliance with government and industry security standards, higher utilization of network resources, faster problem resolution, more dependable backup and recovery, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service centered on a brief interview with a Progent information assurance expert. The interview is intended to help evaluate your organization's preparedness either to stop or recover rapidly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will work with you directly to collect information about your existing security profile and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply best practices to create a cost-effective security and backup/recovery system that meets your business requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Set-price Security Assessment and Validation Packages
Progent has put together a variety of flat-rate security evaluation packages that deliver high value by utilizing Progent's enterprise-class network monitoring and analysis tools plus Progent's consulting experience to create an unbiased and thorough assessment of your IT environment security profile.
We've Been Hacked: What Can We Do Now?
- Security Assessment Service Packages for Small Businesses
Progent offers two value-priced security inventory packages intended to enable small organizations to get an objective security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your network from beyond your firewalled perimeter to determine potential risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan using an authorized machine within your firewalled perimeter to evaluate your vulnerability to inside attacks. These two security inventory scans are configured and run from a secured external site. The project is managed by an engineer who has earned advanced security certifications and who creates a document that describes and interprets the information captured by the security scan and suggests practical improvements where appropriate.
- Security Vulnerability Assessment Bundles for Large Organizations
Progent has developed three levels of flat-rate security evaluation service bundles designed for large organizations who want to meet security standards required by state or industry regulators. Progent's security evaluation service packages offer larger businesses a chance to obtain a professional assessment at the viability of their security posture. For every security evaluation bundle, Progent engineers with top security credentials analyze and report on collected data and offer recommendations for cost-effective remediation. All the network security assessment bundles include an extra-cost option for on-premises consultants anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, commonly known as PEN testing, is an accepted tool for helping organizations to determine how open their network systems are to modern attacks. Progent's stealth penetration testing test how well your corporate security procedures and technologies stand up to authorized but unannounced penetration attempts managed by Progent's experienced security experts utilizing advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If you are now faced with a network security crisis and you do not have a formal response plan, visit Progent's Online Network Help to see how to receive immediate assistance. Progent provides online technical support from skilled network technicians and can escalate trouble tickets to high-level security specialists if required. Your business does not need to be a registered Progent customer to get urgent help for a security breach, but you can register as a Progent client in advance for free and your status as a registered client can save valuable time in case of an emergency.
Usually, smaller organizations do not have a recovery plan in case of a successful attack. This is not good, since the cost of a successful security assault can be more devastating for a small business than for a big enterprise. Progent's security engineers can help your you to create a practical recovery and event reporting plan that minimizes the network disruption resulting from a security breach. The step-by-step post-attack response model outlined by Global Information Assurance Certification is Progent's preferred procedure for handling a major security attack.
High-value Security Services Available from Progent
Progent's security engineers offer world-class consulting in key areas of computer security including:
Progent's Security Credentials
- Vulnerability Evaluation and Security Compliance Assessment
Progent offers expertise with security auditing utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of comprehensive network scans to reveal possible security holes. Progent has broad experience with scanning tools and can assist your company to analyze audit reports and respond efficiently. Progent's security engineers also offer web software validation and can conduct thorough evaluation of corporate-wide security to verify your company's compliance with key global security specifications including HIPAA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless security covering stationary wireless equipment plus portable handsets. Find out the details concerning Progent's Security Vulnerability Audits and Compliance Testing.
- Designing, Building, and Validating Protected Environments
Every business should develop a carefully thought out security plan that includes both proactive and reactive activity. The proactive strategy is a collection of precautions that helps to minimize vulnerabilities. The reactive strategy defines procedures to assist security staff to inventory the losses caused by a breach, remediate the damage, document the experience, and revive business functions as soon as feasible. Progent can show you how to build security into your company operations, configure auditing software, define and build a safe IT architecture, and propose processes and policies that will optimize the safety of your computing environment. Progent's security experts are available to help you to set up a firewall, deploy protected online and mobile access to email and files, and configure an effective VPN. If your company is looking for an affordable option for jobbing out your network security administration, Progent's Round-the-clock Network Support Packages include non-stop online server monitoring and immediate response to emergencies.
- Data Recovery and Security Forensics
Progent has skill in restoring networks and servers that have been hacked, are suspect, or have failed as a result of a security penetration. Progent can show you how to determine the losses resulting from the attack, return your company to normal business operations, and recover data lost as a result of the attack. Progent's security specialists can also perform a comprehensive failure analysis by examining activity logs and using a variety of proven forensics tools. Progent's background with security issues minimizes your business disruption and permits Progent to suggest efficient measures to prevent or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to maintain your legacy PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.
- Other Firewall and Virtual Private Network Solutions Provided by Progent
In addition to supporting a wide range of network security technologies from Microsoft and Cisco, Progent can provide small and mid-size companies top-level consulting for products from other major firewall and Virtual Private Network suppliers by providing services such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to digest the massive quantity of data represented by security incident records created by multiple sources including network infrastructure appliances, servers, and applications and tools. SIEM applications organizes the security event records from these diverse sources and creates consolidated reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network consultants can assist businesses to design, install and operate a SIEM system that helps them to see the progress of attacks and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's security professionals have been awarded the most respected certifications available in the security industry. All of these certifications demand exhaustive testing and demonstrated field background to guarantee that candidates have acquired expertise with a substantial body of security information and methodologies and can provide high-level consulting to information environments of any complexity.
Get in Touch with Progent for Network Security Consulting Services
- Certified Information Security Manager Security Support Expertise
Certified Information Security Manager (CISM) identifies the core skills and international benchmarks of performance that IT security managers are expected to achieve. It provides business management the assurance that consultants who have earned their certification have the background and skill to offer effective security management and consulting services. Progent can provide a CISM-certified support professional to help your enterprise in critical security disciplines including information security governance, risk management, data security process control, and crisis response management. Learn the details concerning Progent's Certified Information Security Manager Security Consulting Assistance.
- CISSP Security Consulting Expertise
Progent's CISSP consultants are security specialists who have earned CISSP accreditation as a result of verified experience, extensive study, and formal testing. CISSP qualification recognizes expertise in a worldwide standard for information security. American National Standards Institute has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security management procedures, security design and models, access permission methodology, software development security, business processes security, physical security, cryptography, communications, Internet security, and disaster recovery planning. Learn the details concerning Progent's CISSP Support Services.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have earned ISSAP accreditation following thorough examination and substantial hands-on work with network security architecture. ISSAP consultants have in-depth understanding of access control systems and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security experts can help your company with all aspects of architecture security. Get the details concerning Progent's ISSAP Certified Protected Network Architecture Consulting Support.
- CISA Consulting Expertise
The Certified Information Systems Auditor accreditation is an important achievement that signifies mastery in information system security auditing. Accredited by ANSI, the CISA credential has candidates pass a comprehensive examination administered by the ISACA professional group. Progent offers the services of a CISA-Certified security audit consultant trained to help companies in the areas of IS audit services, IT enforcement, systems and infrastructure lifecycle, IT service delivery, protecting information resources, and business continuity preparedness. Learn additional information concerning Progent's Certified Information Systems Auditor Professional Expertise.
- CRISC Network Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and carry out a business continuity plan based on industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's network risk mitigation services are a good fit the services available from Progent's CISA-Certified security engineers for objectively evaluating your IT control design and with the services of Progent's CISM experts for defining security policies. Get more details concerning Progent's CRISC-certified Risk Management Support.
- Global Information Assurance Certification Consulting Services
GIAC was founded in 1999 to certify the skill of information technology security professionals. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge appropriate to provide services in important categories of system, information, and program security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent can provide the expertise of certified professionals for any of the security services addressed within GIAC accreditation programs including assessing networks, security incident handling, intrusion detection, and web services security. Learn additional information concerning Progent's GIAC Support Services.
If you need security consulting expertise, phone Progent at 800-993-9400 or see Contact Progent.