Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified network security consultants offer a broad selection of support services designed to assist organizations of any size to identify and eliminate security vulnerabilities, block malicious attacks, recover from the problems caused by a breach of security, and comply with government requirements for guarding information and reporting incidents. Progent can provide a choice of service delivery modes:
As-needed Security Support Services
- As-needed online and on-premises assistance billed to the nearest minute
- Continual fully managed services billed at a low flat monthly rate
- Value-priced service packages for a one-time security and compliance assessment
After you register for Progent's services (registration is free), you can get as-needed remote or on-premises assistance from one of Progent security consultant. This classic service model is essentially reactive and geared toward quickly resolving IT problems that are affecting your network or that have stumped your in-house support staff. Common examples are debugging a firewall appliance or VPN connection, installing a critical security update for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These security services are billed by the minute, which avoids the frustrating case of receiving large invoices for fast repairs.
Delivery options for Progent's on-demand support include:
Progent's accredited security engineers are premier to provide help for environments powered by Microsoft Windows, Linux, macOS and OS X, Solaris, and major derivatives of UNIX. Progent's wide range of consulting services encompasses firewall technology, email security, secure system architecture, and information restoration. Progent's technical support team has earned the industry's most advanced security credentials including GIAC (Global Information Assurance Certification) and ISSAP. Progent also offers fast access to online Cisco CCIE network infrastructure engineers who can provide advanced support with tough network configuration issues.
- Remote Security Services
Most security problems can be handled remotely via a mix of phone-based support and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can provide online security support by offering efficient access to consultants who have the background and resources to fix some of the most difficult problems quickly, keeping your support expenses affordable and reducing downtime.
- Onsite Security Support Services
For instances where onsite support is required, Progent can dispatch a technical expert to major cities across the United States. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any site in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior analysis technology to guard endpoints and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely get by legacy signature-matching AV tools. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to automate the entire malware attack progression including filtering, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge technologies packaged within a single agent accessible from a single console. Progent's security and virtualization experts can help you to design and implement a ProSight ESP deployment that meets your company's specific requirements and that allows you achieve and demonstrate compliance with government and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent action. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
- ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables rapid recovery of vital files, apps and virtual machines that have become unavailable or damaged due to component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical information. Find out more about ProSight DPS Managed Cloud Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security companies to provide centralized control and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map out, track, enhance and troubleshoot their connectivity hardware such as switches, firewalls, and load balancers as well as servers, client computers and other networked devices. Using state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch ensures that network diagrams are kept updated, copies and displays the configuration information of almost all devices connected to your network, monitors performance, and generates notices when problems are discovered. By automating tedious network management processes, ProSight WAN Watch can knock hours off common chores like making network diagrams, reconfiguring your network, finding appliances that require critical updates, or identifying the cause of performance bottlenecks. Find out more about ProSight WAN Watch infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your IT system running at peak levels by checking the health of vital computers that power your information system. When ProSight LAN Watch uncovers an issue, an alarm is transmitted automatically to your designated IT management staff and your assigned Progent engineering consultant so that any potential problems can be addressed before they can impact productivity Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to a different hardware solution without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard data about your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSLs or domains. By updating and organizing your IT documentation, you can save as much as 50% of time spent searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and affordable way for small and medium-size organizations to get an objective evaluation of the health of their network. Powered by some of the leading remote monitoring and management tools available, and overseen by Progent's certified team of IT professionals, ProSight Network Audits help you see how well the deployment of your essential network devices adhere to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver instant benefits like a more manageable Active Directory environment. Both also come with one year of advanced remote network monitoring and management. Advantages can include lower-cost network management, improved compliance with data security requirements, higher utilization of IT assets, faster problem resolution, more dependable backup and recovery, and higher availability. Read more about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a phone interview with a Progent information assurance consultant. The fact-finding interview is designed to help evaluate your organization's preparedness to stop or recover quickly following an assault by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to gather information about your existing antivirus tools and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to deploy an efficient AV and backup/recovery environment that meets your company's requirements. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.
Flat-rate Security Evaluation and Verification Packages
Progent has put together a variety of fixed-price security and compliance evaluation packages that deliver high value by deploying Progent's enterprise-class network monitoring and analysis software plus Progent's consulting skills to produce an unbiased and comprehensive evaluation of your network security posture.
Our System Has Been Hacked: What Should We Do Now?
- Security Inventory Service Bundles for Small Organizations
Progent offers two ultra-affordable security inventory scanning packages designed to allow small businesses to get a professional security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT system from outside your firewalled perimeter to identify possible risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan from an authorized machine inside your company firewall to assess your vulnerability to internal assaults. These two security inventory scans are configured and run from a secured offsite location. The project is managed by an engineer who has earned advanced security certifications and who produces a report that describes and evaluates the information captured by the scan and recommend practical enhancements where appropriate.
- Security Vulnerability Evaluation Bundles for Enterprises
Progent offers three levels of set-price security evaluation service bundles intended for large organizations who need to meet security standards required by government or industry regulators. Progent's security assessment service packages offer larger organizations an opportunity to get a professional look at the viability of their security profile. For each security evaluation bundle, Progent consultants with advanced security credentials analyze and report on collected data and offer suggestions for cost-effective improvements. All the network security assessment bundles include an extra-cost option for onsite consultants anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, often referred to as PEN testing, is a critical technique for helping businesses to find out how open their IT environments are to modern attacks. Progent's stealth penetration testing check how well your corporate security procedures and platforms stand up to authorized but unannounced intrusion attempts launched by Progent's experienced security experts using advanced hacking methods. Find out about Progent's stealth penetration testing services.
If you are now fighting a security emergency and you do not have a detailed response procedure, refer to Progent's Remote Network Help to see how to get immediate assistance. Progent offers remote technical support from skilled network technicians and can escalate problems to high-level security specialists if necessary. Your company does not need to be a registered Progent customer to receive urgent help for a security breach, but you can sign up as a Progent customer ahead of time for free and your status as a current customer could save valuable time during a crisis.
Usually, smaller businesses have no recovery procedure in the event of a successful penetration. This is risky, because the damage from a successful security attack can be even more catastrophic for a small company than for a large corporation. Progent's security consultants can assist your business to design a sensible response and event reporting plan that reduces the network disruption following an attack. The step-by-step post-attack response model outlined by Global Information Assurance Certification is Progent's recommended procedure for responding to a major security incident.
High-value Security Services Available from Progent
Progent's veteran consultants offer world-class consulting in key facets of computer security such as:
Progent's Security Credentials
- Security Vulnerability Evaluation and Security Compliance Assessment
Progent provides experience with information risk auditing utilities such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of comprehensive network tests to uncover potential security gaps. Progent has broad skills with these and similar tools and can help your company to understand assessment reports and respond efficiently. Progent's security engineers also offer web application testing and can conduct thorough evaluation of corporate-wide security to confirm your company's compliance with key global security standards including FISMA, NIST, and ISO 17799. In addition, Progent can evaluate the strength of your wireless security including stationary wireless equipment plus mobile devices. Get the details about Progent's Information Risk Evaluation and Compliance Assessment.
- Planning, Implementing, and Validating Secure Environments
Every business should have a carefully thought out security plan that includes both proactive and responsive activity. The pre-attack strategy is a set of precautions that helps to reduce vulnerabilities. The post-attack strategy defines activities to help security staff to assess the losses caused by a breach, remediate the damage, document the experience, and restore business activity as quickly as possible. Progent can show you how to build protection into your company operations, set up auditing utilities, define and implement a secure computer architecture, and recommend processes and policies to maximize the protection of your network. Progent's security professionals are ready to assist you to configure a firewall, deploy protected online and mobile connectivity to email and data, and install an efficient virtual private network (VPN). If you are looking for an affordable way for jobbing out your security administration, Progent's 24x7 Network Support Services include automated remote network tracking and quick response to emergencies.
- Data Recovery and Security Forensics
Progent offers skill in restoring networks and computers that have been compromised, are suspect, or have ceased to function because of a security breakdown. Progent can help determine the damage caused by the assault, return your company to ordinary business operations, and retrieve information lost owing to the breach. Progent's security engineers can also perform a comprehensive failure evaluation by examining event logs and using other proven forensics techniques. Progent's background with security problems reduces your business disruption and permits Progent to propose efficient ways to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
- Additional Firewall and VPN Technologies Provided by Progent
As well as offering support for a broad array of security technologies from Microsoft and Cisco, Progent can provide small and mid-size companies expert support for technologies from other important firewall and Virtual Private Network (VPN) suppliers by delivering services such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are designed to make sense the massive amounts of data represented by security event logs generated by a wide range of sources such as network appliances, operating systems, and application software and monitoring tools. SIEM applications organizes the security logs from these diverse sources and produces consolidated reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network consultants can help organizations to plan, install and operate a SIEM system that enables them to see the behavior of security incidents and comply with event reporting requirements. (Visit Progent's SIEM solutions.)
Progent's security specialists have earned the most prestigious accreditations offered in the security industry. These certifications require extensive testing and demonstrated work experience to ensure that recipients have mastered a significant amount of security knowledge and methodologies and can offer high-level solutions to computer networks of any size.
Get in Touch with Progent for Computer Security Help
- CISM Security Consulting Services
Certified Information Security Manager (CISM) defines the core competencies and worldwide benchmarks of performance that information security managers are required to master. CISM provides executive management the assurance that consultants who have been awarded their CISM have the experience and skill to offer effective security management and engineering services. Progent can offer a CISM-certified support professional to help your organization in critical security areas such as data security governance, vulnerability management, data protection process control, and crisis response support. Learn the details concerning Progent's Certified Information Security Manager Security Support Expertise.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP consultants are security specialists who have earned CISSP certification as a result of demonstrated experience, extensive study, and exhaustive testing. CISSP Certification recognizes expertise in a worldwide standard for IT security. ANSI has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management procedures, security architecture and test systems, connection permission systems, software development security, business processes security, hardware security, cryptography, communications, Internet security, and disaster recovery planning. Find out more information about Progent's CISSP Support Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier cybersecurity architecture experts have earned ISSAP certification as a result of rigorous examination and extensive hands-on work with information security architecture. ISSAP security experts have comprehensive understanding of access control systems and techniques, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-certified security consultants can assist your company with all phases of architecture security. Find out more information concerning Progent's ISSAP Certified Protected Network Architecture Consulting Assistance.
- Certified Information Systems Auditor Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that signifies mastery in IS security audit and control. Certified by ANSI, the CISA accreditation requires that candidates undergo an extensive test administered by the ISACA professional association. Progent offers the expertise of a CISA-Premier security engineer able to assist businesses in the fields of information systems audit process, IT administration, systems and architecture lifecycle, IT service delivery, safeguarding information assets, and disaster recovery preparedness. Get additional information concerning Progent's Certified Information Systems Auditor Support Assistance.
- CRISC Risk Mitigation Experts
The CRISC program was initiated by ISACA to validate an IT professional's skills to plan, implement, and maintain information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and carry out a business continuity strategy that follows leading practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's risk mitigation expertise is complementary to the services available from Progent's CISA-Premier security engineers for objectively auditing your IS control design and with the expertise of Progent's CISM experts for defining company-wide security policies and procedures. Get additional information about Progent's CRISC-certified Network Risk Management Consulting.
- Global Information Assurance Certification Professional Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of network security experts. GIAC's mission is to verify that an accredited security consultant possesses the skills appropriate to deliver services in critical categories of system, data, and software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent offers the expertise of GIAC certified professionals for all of the security capabilities addressed under GIAC accreditation topics including auditing networks, security incident response, traffic analysis, and web application security. Get more information about Progent's Global Information Assurance Certification Professional Assistance.
If you want network security engineering help, phone Progent at 800-993-9400 or visit Contact Progent.