Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified network security professionals can provide a broad selection of services designed to help organizations of all sizes to detect and eliminate security weaknesses, block assaults, remediate the problems caused by a breakdown of protection, and comply with regulatory mandates for guarding information and reporting incidents. Progent offers a choice of service models:

  • On-demand online and on-premises assistance invoiced by the minute
  • On-going managed services invoiced at a low flat monthly rate
  • Set-price service packages for a single security evaluation
On-demand Security and Compliance Support Services
Once you register for Progent's services (signing up is free), you can receive as-needed online or on-premises assistance from one of Progent security consultant. This traditional service model is primarily reactive and optimized for quickly taking care of technical issues that are impacting your network or that have stymied your own support staff. Typical examples are replacing a firewall or VPN connection, installing a vital security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or recovering from a ransomware assault. These services are billed to the nearest minute, which eliminates the frustrating situation of getting big invoices for fast repairs.

Delivery alternatives for Progent's on-demand support include:

  • Online Security Support Services
    The majority security-related issues can be resolved remotely through a mix of phone-based support and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide remote security help by offering efficient access to consultants who have the background and technical resources to resolve many of the most difficult issues quickly, keeping your support expenses low and minimizing lost productivity.
  • On-premises Security Services
    For cases where on-premises support is required, Progent can dispatch a technical expert to major cities throughout the U.S. Progent can also send a security specialist with top certifications and advanced skills to any location in the country.
Progent's security engineers are certified to provide help for environments powered by Windows, Linux, macOS and OS X, Sun Solaris, and popular versions of UNIX. Progent's wide selection of services covers firewall configuration, email security, protected system architecture, and data restoration. Progent's technical support staff has earned the world's most advanced security credentials including CISA and Certified Information Systems Security Professional. Progent also offers immediate access to remote Cisco CCIE network engineers who can deliver world-class support with tough network configuration problems.

ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily get by traditional signature-based AV tools. ProSight ASM protects on-premises and cloud-based resources and offers a single platform to automate the complete threat lifecycle including filtering, infiltration detection, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge tools incorporated within a single agent accessible from a single control. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that meets your company's specific requirements and that allows you prove compliance with government and industry data security regulations. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of critical files, applications and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Backup and Recovery.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security companies to deliver centralized management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most unwanted email from reaching your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for small and mid-sized organizations to map, track, reconfigure and troubleshoot their networking appliances like routers and switches, firewalls, and access points as well as servers, printers, client computers and other networked devices. Using cutting-edge RMM technology, WAN Watch ensures that infrastructure topology maps are kept updated, copies and manages the configuration of virtually all devices connected to your network, tracks performance, and generates alerts when potential issues are detected. By automating complex network management activities, WAN Watch can cut hours off common tasks like making network diagrams, reconfiguring your network, finding devices that require critical updates, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management techniques to help keep your IT system running at peak levels by checking the health of critical assets that drive your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted immediately to your specified IT management staff and your assigned Progent consultant so that any looming issues can be addressed before they can impact productivity Find out more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data related to your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can save up to half of time thrown away searching for vital information about your network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and medium-size organizations to obtain an unbiased evaluation of the overall health of their information system. Powered by some of the top remote monitoring and management tools available, and overseen by Progent's certified team of IT experts, ProSight Network Audits show you how well the configuration of your essential network assets adhere to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate ROI such as a cleaner Active Directory (AD) system. Both also come with a year of state-of-the-art remote network monitoring and management. Advantages can include easier management, better compliance with government and industry security regulations, more efficient utilization of network assets, faster troubleshooting, more reliable backup and restore, and less downtime. See more about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief phone interview with a Progent information assurance consultant. The interview is designed to help evaluate your organization's preparedness either to block or recover rapidly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to gather information about your existing antivirus tools and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can apply best practices to deploy a cost-effective security and backup system that meets your business requirements. For more information, see The ProSight Ransomware Preparedness Report Service.

Set-price Security Evaluation and Verification Bundles
Progent offers a portfolio of flat-rate security and compliance assessment bundles that deliver high value by utilizing Progent's advanced system monitoring and analysis tools plus Progent's consulting experience to create an objective and comprehensive evaluation of your IT environment security posture.

  • Security Assessment Service Packages for Small Businesses
    Progent offers two value-priced security inventory scanning service packages designed to allow small businesses to get a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your network from outside your corporate firewall to identify possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan from an authorized computer inside your firewalled perimeter to evaluate your vulnerability to internal threats. These two security inventory services are set up and executed from a secured external site. The project is managed by an engineer who has been awarded high-level security certifications and who creates a document that describes and interprets the information collected by the security scan and suggests various enhancements where appropriate.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent has developed three levels of set-price security assessment service packages intended for large organizations who need to meet security standards required by government or industry regulators. Progent's security assessment service bundles offer enterprises a chance to get a professional assessment at the strength of their security profile. For each security evaluation bundle, Progent engineers with advanced security credentials study and report on collected data and offer suggestions for efficient improvements. Each of the network security assessment bundles include an extra-cost option for on-premises consultants at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is a critical tool for helping businesses to find out how vulnerable their network environments are to modern attacks. Progent's stealth penetration testing test how effectively your existing security policies and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's veteran security specialists using cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf your business is now faced with a network security emergency and you have no detailed response plan, refer to Progent's Remote Network Support to see how to get immediate help. Progent provides remote technical support from experienced network technicians and can escalate problems to certified security experts if required. Your business does not need to be a registered Progent customer to get urgent help for a security problem, but you can sign up as a Progent customer in advance at no cost and your standing as a registered client could save precious time in a crisis.

Typically, smaller organizations have no recovery plan in the event of a damaging penetration. This is not good, since the cost of a serious security attack can be even more catastrophic for a small company than for a large corporation. Progent's security specialists can assist your you to design a sensible recovery and incident reporting plan that minimizes the IT system disruption resulting from an attack. The formal post-attack handling procedure outlined by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for reacting to a major security attack.

Advanced Security Expertise Offered by Progent
Progent's security engineers can provide consulting support in key areas of IT security such as:

  • Vulnerability Evaluation and Compliance Assessment
    Progent provides experience with security auditing software such as MS Baseline Security Analyzer and LANguard for conducting a variety of automatic network tests to reveal possible security holes. Progent has extensive skills with monitoring utilities and can help you to understand audit results and respond efficiently. Progent's security engineers also provide web application validation and can conduct thorough evaluation of corporate-wide security to determine your organization's compliance with key global security standards including FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless equipment plus portable handsets. Learn more details concerning Progent's Information Risk Evaluation and Compliance Testing.
  • Designing, Building, and Validating Secure Environments
    Every organization ought to have a thoroughly considered security plan that includes both preventive and responsive elements. The proactive plan is a collection of precautions that helps to minimize security holes. The reactive plan specifies procedures to help security personnel to assess the damage caused by an attack, repair the damage, record the event, and revive network functions as soon as possible. Progent can advise you how to build security into your company operations, install auditing utilities, create and build a secure computer infrastructure, and propose procedures and policies to enhance the protection of your network. Progent's security professionals are ready to help you to configure a firewall, deploy safe online and mobile access to email and files, and configure an effective virtual private network (VPN). If your company is looking for an affordable way for outsourcing your security management, Progent's 24x7 Monitoring Packages feature automated online network monitoring and fast resolution of problems.
  • Data Restoration and Security Forensics
    Progent has skill in recovering systems and servers that have been compromised, are quarantined, or have ceased to function as a result of a security penetration. Progent can show you how to evaluate the losses caused by the attack, restore ordinary business operations, and retrieve information compromised as a result of the breach. Progent's certified engineers can also manage a comprehensive forensic evaluation by examining activity logs and utilizing other proven forensics techniques. Progent's background with security problems minimizes your business disruption and allows Progent to recommend effective measures to prevent or contain new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
    Cisco CCIE Security ConsultantsThe new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA Firewalls with Firepower Services integration and debugging services.
  • Other Firewall and Virtual Private Network (VPN) Solutions
    As well as being expert in a wide array of network security solutions from Microsoft and Cisco, Progent offers small and mid-size organizations expert support for solutions from other popular firewall and Virtual Private Network vendors such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of information collected in security incident logs generated by multiple sources such as network infrastructure appliances, servers, and application software and monitoring tools. SIEM applications organizes the security event records from these diverse sources and creates consolidated reports of security events as required by state regulations and industry compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure consultants can assist businesses to design, deploy and operate a SIEM system that enables them to understand the progress of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's Security Credentials
Progent's security specialists have been awarded the most respected accreditations offered in the security industry. All of these accreditations require extensive testing and demonstrated field background to ensure that recipients have acquired expertise with a substantial body of security information and methodologies and can offer high-level security solutions to information networks of any size.
  • CISM Security Support Expertise
    Certified Information Security Manager (CISM) defines the core skills and worldwide standards of performance that information security managers are expected to achieve. CISM provides business management the confidence that those who have earned their accreditation possess the background and knowledge to provide effective security management and engineering support. Progent can offer a CISM-certified expert to help your organization in key security areas including data protection governance, risk management, information protection process control, and crisis response support. Get additional details concerning Progent's CISM Security Consulting Services.

  • Certified Information Systems Security Professionals (CISSP) Security Consulting Services
    Progent's CISSP consultants are security engineers who have been awarded CISSP status as a result of verified professional work, extensive study, and formal testing. CISSP Certification indicates mastery of an international standard for information security. American National Standards Institute has given the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management procedures, security architecture and models, access permission systems, applications development security, business processes security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Get more information about Progent's CISSP Support Assistance.

  • CISSP-ISSAP} Security Architecture Consulting Services
    Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP accreditation after thorough testing and extensive hands-on work with network security architecture. ISSAP security experts have comprehensive knowledge of access management mechanisms and techniques, phone system and network protection, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security. Progent's CISSP-ISSAP-premier security specialists can assist your company with all aspects of secure network architecture. Get the details concerning Progent's ISSAP Accredited Protected System Infrastructure Consulting Support.

  • Certified Information Systems Auditor Support Services
    The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that represents mastery in network security auditing. Accredited by ANSI, the CISA credential has consultants pass an exhaustive examination given by the ISACA international professional group. Progent can provide the expertise of a CISA-Premier security consultant able to assist companies in the areas of IS audit process, information technology enforcement, network assets and architecture lifecycle, IT support, safeguarding data resources, and disaster recovery planning. Find out additional details concerning Progent's Certified Information Systems Auditor Consulting Assistance.

  • CRISC Risk Mitigation Consultants
    The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help you to create and carry out a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's risk management services are complementary to the services available from Progent's CISA-Premier security engineers for impartially assessing your IS management mechanisms and with the expertise of Progent's CISM-certified experts for designing security policies and procedures. Learn more details concerning Progent's CRISC-certified IT Risk Management Services.

  • GIAC Support Expertise
    Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to verify that a certified security consultant possesses the skills needed to provide support in important areas of network, data, and program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States NSA. Progent can provide the expertise of certified security engineers for any of the network security capabilities covered under GIAC certification topics such as auditing networks, security incident handling, intrusion detection, and web application security. Find out more details about Progent's Global Information Assurance Certification Professional Expertise.
Contact Progent for Computer Security Help
If you want network security engineering help, call Progent at 800-993-9400 or visit Contact Progent.