Overview of Progent's Security Consulting Services
Progent's industry certified computer security and compliance experts can provide a wide range of support services designed to assist companies of all sizes to uncover and eliminate security weaknesses, block assaults, remediate the damage caused by a breakdown of protection, and comply with government requirements for protecting information and reporting incidents. Progent offers a choice of service modes:
On-demand Security and Compliance Consulting Services
- As-needed online and on-premises assistance invoiced by the minute
- On-going managed services billed at a low fixed monthly fee
- Set-price service packages for a one-time security evaluation
Once you sign up for Progent's services (signing up is free), you can receive on-demand remote or on-premises assistance from a Progent security expert. This traditional service model is primarily reactive and geared toward quickly resolving IT problems that are affecting your productivity or that have stumped your in-house support personnel. Typical scenarios include debugging a firewall appliance or VPN tunnel, installing a vital security update for a Cisco switch, designing secure access to cloud-based resources, or recovering from a ransomware assault. These security services are billed by the minute, which avoids the frustrating case of receiving big bills for quick repairs.
Delivery options for Progent's on-demand support include:
Progent's security engineers are premier to support environments based on Windows, Linux, Mac, Solaris, and popular derivatives of UNIX. Progent's broad range of services encompasses firewall expertise, email and messaging security, secure system design, and data restoration. Progent's support team has been awarded the world's top security credentials including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional. Progent also can provide immediate access to online Cisco-certified CCIE network infrastructure consultants who can deliver world-class assistance with complex network technology issues.
- Online Security Support Services
Most security problems can be resolved online via a mix of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security support by offering easy access to consultants with the experience and resources to resolve some of the most challenging issues quickly, keeping your support costs low and reducing downtime.
- On-premises Security Support
For cases where on-premises support is required, Progent can dispatch a technical expert to major metropolitan areas across the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any location in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight line of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning technology to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-based anti-virus tools. ProSight ASM safeguards local and cloud resources and offers a unified platform to automate the complete threat progression including protection, infiltration detection, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer security for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering through cutting-edge technologies incorporated within a single agent managed from a single console. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP environment that addresses your organization's unique requirements and that allows you prove compliance with legal and industry information protection regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent can also assist you to install and test a backup and restore system like ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.
- ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates your backup activities and enables rapid restoration of vital data, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to provide centralized control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a further level of inspection for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to diagram, monitor, reconfigure and troubleshoot their networking hardware like switches, firewalls, and load balancers plus servers, printers, client computers and other networked devices. Incorporating state-of-the-art RMM technology, ProSight WAN Watch ensures that infrastructure topology diagrams are always current, captures and displays the configuration information of virtually all devices on your network, tracks performance, and sends alerts when potential issues are detected. By automating tedious network management activities, ProSight WAN Watch can cut hours off ordinary chores like network mapping, reconfiguring your network, locating devices that need critical software patches, or isolating performance issues. Find out more about ProSight WAN Watch network infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your network operating efficiently by tracking the state of vital assets that power your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your specified IT management personnel and your Progent engineering consultant so that all potential problems can be resolved before they have a chance to impact productivity Learn more about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard data about your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your network documentation, you can eliminate as much as half of time spent looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Learn more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and affordable alternative for small and medium-size organizations to get an unbiased evaluation of the overall health of their network. Based on a selection of the leading remote monitoring and management tools in the industry, and supervised by Progent's world-class group of information technology experts, ProSight Network Audits show you how well the configuration of your core infrastructure devices adhere to industry leading practices. The Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide instant ROI such as a more manageable Active Directory system. Both versions also come with a year of cutting-edge remote network monitoring and management (RMM). Advantages can include simpler network management, improved compliance with government and industry security standards, higher utilization of IT resources, faster problem resolution, more dependable backup and restore, and less downtime. Learn more about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a brief interview with a Progent information assurance consultant. The fact-finding interview is intended to evaluate your company's preparedness either to block or recover rapidly following an assault by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to gather information concerning your current antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to deploy a cost-effective AV and backup/recovery system that meets your business needs. For more information, refer to Progent's ProSight Ransomware Preparedness Report.
Flat-rate Security Assessment and Verification Bundles
Progent has put together a variety of flat-rate security and compliance evaluation packages that deliver high value by utilizing Progent's enterprise-class system monitoring software as well as Progent's technical experience to produce an unbiased and comprehensive evaluation of your IT environment security posture.
Our System Has Been Hacked: What Can We Do Now?
- Security Assessment Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory packages designed to enable small organizations to get a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your IT system from beyond your firewalled perimeter to determine potential gaps in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan from an authorized machine within your corporate firewall to assess your exposure to inside threats. These two security inventory scans are set up and executed from a secured offsite location. The project is administered by an engineer who has been awarded advanced security certifications and who produces a document that details and evaluates the data captured by the scan and suggests various improvements where required.
- Security Vulnerability Assessment Packages for Large Organizations
Progent offers three levels of fixed-price security evaluation service packages designed for enterprises who need to meet compliance standards required by state or industry agencies. Progent's security evaluation service bundles offer enterprises an opportunity to get a professional look at the viability of their security posture. For each security evaluation bundle, Progent consultants with advanced security credentials study and report on captured data and offer recommendations for cost-effective remediation. All the network security assessment bundles include an added-cost option for onsite engineers anywhere in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly referred to as PEN testing, is an accepted technique for allowing businesses to determine how vulnerable their network systems are to modern attacks. Progent's stealth penetration testing services check how well your corporate security procedures and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's veteran security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
If you are now faced with a security emergency and you have no formal recovery plan, visit Progent's Remote Computer Help to see how to get immediate assistance. Progent provides online assistance from experienced network technicians and can escalate problems to high-level security experts if required. Your organization does not have to be a registered Progent client to receive urgent support for a security breakdown, but you can sign up as a Progent customer in advance for free and your standing as a current customer could save valuable time in case of an emergency.
Usually, smaller companies do not have a response procedure in case of a successful penetration. This is risky, since the damage from a serious security attack can be more catastrophic for a small company than for a large enterprise. Progent's security engineers can help your you to design a sensible response and event reporting plan that reduces the IT system disruption following an attack. The formal post-attack response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for handling a serious security penetration.
Advanced Security Expertise Available from Progent
Progent's security engineers offer advanced support in key facets of network protection including:
Progent's Security Certifications
- Vulnerability Evaluation and Security Compliance Testing
Progent provides expertise with information risk evaluation software such as Microsoft Baseline Security Analyzer or LANguard for conducting a set of comprehensive system tests to reveal potential security holes. Progent has extensive skills with scanning utilities and can help you to analyze assessment results and respond efficiently. Progent's certified security engineers also can perform web software testing and can perform thorough assessments of corporate-wide security to validate your company's compliance with major industry security standards such as FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the strength of your wireless protection including fixed wireless appliances as well as portable handsets. Read more details about Progent's Vulnerability Audits and Compliance Assessment.
- Designing, Building, and Validating Protected Networks
Every business ought to have a carefully considered security plan that includes both proactive and responsive activity. The proactive strategy is a collection of precautions that helps to minimize security holes. The reactive plan defines activities to help security staff to assess the damage resulting from an attack, remediate the damage, document the event, and restore network functions as quickly as feasible. Progent can advise you how to incorporate protection into your business operations, set up auditing software, define and implement a safe IT architecture, and propose procedures and policies that will maximize the protection of your information system. Progent's security professionals are ready to assist you to set up a firewall, design protected offsite access to email and files, and configure an effective virtual private network. If you are interested in an affordable way for outsourcing your network security administration, Progent's 24x7 Network Support Options feature continual online system monitoring and quick resolution of emergencies.
- Data Restoration and Failure Analysis
Progent provides skill in recovering networks and computers that have been hacked, are suspect, or have ceased to function as a result of a security attack. Progent can help evaluate the damage caused by the breach, restore ordinary functions, and recover information lost as a result of the attack. Progent's certified specialists can also perform a comprehensive failure evaluation by going over activity logs and using a variety of advanced assessment tools. Progent's experience with security issues minimizes your downtime and allows Progent to suggest efficient measures to prevent or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.
- Additional Firewall and Virtual Private Network (VPN) Solutions Provided by Progent
In addition to offering support for a wide range of network security solutions available from Microsoft and Cisco, Progent can provide small and mid-size organizations top-tier support for security products from other major firewall and Virtual Private Network suppliers by offering services including:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are intended to digest the massive amounts of data represented by security incident logs generated by multiple sources such as network appliances, operating systems, and application software and monitoring tools. SIEM software analyzes the security logs from these diverse sources and creates consolidated reports of security incidents as mandated by government regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network consultants can assist businesses to design, install and operate a SIEM solution that helps them to see the progress of security incidents and comply with event reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's security consultants have been awarded some of the most prestigious certifications offered in the industry. All of these certifications require exhaustive examinations and demonstrated field experience to ensure that candidates have mastered a substantial body of security information and methodologies and can offer advanced consulting to computer environments of any complexity.
Get in Touch with Progent for Computer Security Help
- Certified Information Security Manager (CISM) Security Support Services
CISM defines the fundamental skills and international standards of service that computer security managers are expected to master. CISM offers business management the confidence that those who have earned their CISM have the experience and knowledge to provide efficient security management and engineering services. Progent can provide a CISM-certified consultant to assist your organization in key security areas such as data security governance, risk management, data security process control, and incident response management. Read more details about Progent's Certified Information Security Manager Security Consulting Expertise.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification through verified experience, rigorous study, and exhaustive testing. CISSP qualification indicates mastery of a worldwide standard for information security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of expertise covered under CISSP include security administration practices, security architecture and test systems, connection control systems, software development security, operations security, hardware security, encryption, telecommunications, Internet security, and disaster recovery planning. Find out more details concerning Progent's CISSP Support Assistance.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Certified cybersecurity architecture experts have been awarded ISSAP certification as a result of thorough examination and extensive hands-on work with network security design. ISSAP consultants have in-depth understanding of access management systems and techniques, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security experts can assist your business with all aspects of secure network architecture. Find out additional details about Progent's ISSAP Accredited Protected Network Infrastructure Consulting Services.
- Certified Information Systems Auditor (CISA) Professional Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that represents expertise in information system security auditing. Certified by the American National Standards Institute, the CISA credential has consultants pass an extensive examination given by the ISACA international professional association. Progent can provide the expertise of a CISA-Certified security audit professional trained to assist companies in the fields of information systems audit process, information technology administration, systems and architecture planned useful life, information technology support, safeguarding information resources, and business continuity preparedness. Find out additional information about Progent's Certified Information Systems Auditor Professional Assistance.
- CRISC IT Risk Mitigation Consultants
The CRISC program was established by ISACA to validate an IT professional's ability to design, deploy, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk management services are a good fit the support available from Progent's CISA-Certified consultants for impartially evaluating your IT management mechanisms and also with the services of Progent's CISM-certified support professionals for defining company-wide security policies and procedures. Read additional information concerning Progent's CRISC Risk Management Consulting.
- GIAC (Global Information Assurance Certification) Consulting Expertise
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to make sure that an accredited security consultant possesses the knowledge necessary to provide services in key categories of system, information, and application software security. GIAC certifications are recognized by companies and institutions around the world including and the U.S. National Security Agency. Progent offers the help of GIAC certified consultants for all of the security capabilities addressed under GIAC accreditation programs such as auditing IT infrastructure, incident handling, traffic analysis, and web application security. Learn additional information about Progent's Global Information Assurance Certification Consulting Assistance.
If you're trying to find network security support services, phone Progent at 800-993-9400 or refer to Contact Progent.