Introduction to Progent's Security and Compliance Consulting Services
Progent's certified computer security and compliance consultants offer a broad selection of services designed to help organizations of any size to detect and correct security weaknesses, defend against attacks, recover from the damage caused by a breach of protection, and meet government mandates for guarding data and reporting security incidents. Progent offers a choice of service delivery modes:
As-needed Security and Compliance Consulting Services
- As-needed remote and on-premises support invoiced to the nearest minute
- Continual managed services invoiced at an affordable flat monthly rate
- Value-priced service bundles for a one-time security evaluation
After you sign up for Progent's services (registration is free), you can get as-needed online or on-premises assistance from a Progent security and compliance expert. This classic support model is essentially reactive and optimized for quickly taking care of IT problems that are affecting your network or that have stumped your own support personnel. Typical scenarios are replacing a firewall or VPN connection, implementing a vital security patch for a Cisco switch or router, designing secure access to cloud-based resources, or restoring data after a ransomware assault. These services are billed by the minute, which avoids the annoying situation of receiving big bills for fast repairs.
Delivery options for Progent's as-needed support include:
Progent's accredited engineers are certified to provide help for environments based on Windows, Linux, Mac, Sun Solaris, and major derivatives of UNIX. Progent's broad selection of consulting services encompasses firewall configuration, e-mail systems, protected network design, and data restoration. Progent's technical support team has been awarded the industry's most advanced security accreditations including CISM and Information System Security Architecture Professional. Progent also offers fast access to online Cisco-certified CCIE network infrastructure engineers who can deliver world-class assistance with complex network technology issues.
- Online Security Support
Most security-related problems can be resolved remotely through a mix of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver remote security support by offering easy access to consultants who have the experience and technical resources to fix some of the most difficult issues quickly, keeping your support expenses low and minimizing downtime.
- Onsite Security Support
For instances where onsite assistance is necessary, Progent can send a technical professional to major metropolitan areas throughout the United States. Progent can also send a security consultant with top certifications and world-class skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior machine learning technology to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely escape traditional signature-matching AV tools. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to automate the entire malware attack progression including blocking, identification, containment, remediation, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your company's specific requirements and that allows you demonstrate compliance with government and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require urgent attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
- ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and enables fast recovery of vital data, applications and VMs that have become unavailable or corrupted due to hardware failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security companies to provide centralized management and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further level of inspection for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, monitor, optimize and debug their connectivity appliances such as switches, firewalls, and wireless controllers as well as servers, printers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch makes sure that infrastructure topology maps are kept current, copies and manages the configuration information of virtually all devices connected to your network, monitors performance, and generates alerts when potential issues are detected. By automating time-consuming management activities, WAN Watch can cut hours off ordinary tasks like network mapping, reconfiguring your network, locating devices that need critical software patches, or identifying the cause of performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your IT system operating efficiently by tracking the state of vital computers that power your business network. When ProSight LAN Watch uncovers a problem, an alarm is transmitted automatically to your designated IT management personnel and your assigned Progent consultant so that all potential problems can be resolved before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect data related to your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or domains. By updating and managing your network documentation, you can eliminate up to 50% of time wasted looking for critical information about your network. ProSight IT Asset Management features a common location for storing and sharing all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a fast and low-cost alternative for small and mid-size organizations to obtain an objective assessment of the overall health of their IT system. Based on some of the top remote monitoring and management platforms in the industry, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits show you how well the configuration of your essential infrastructure devices conform to industry best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate ROI like a more manageable Active Directory environment. Both versions also include one year of advanced remote network monitoring and management. Advantages can include lower-cost management, better compliance with data security requirements, more efficient utilization of network assets, faster troubleshooting, more dependable backup and recovery, and increased uptime. Read more about Progent's ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is an affordable service centered on a phone discussion with a Progent information assurance consultant. The interview is intended to help evaluate your organization's preparedness either to block or recover rapidly after an assault by a ransomware variant like Ryuk, WannaCry, MongoLock, or Locky. Progent will consult with you directly to collect information about your existing antivirus tools and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow best practices to build a cost-effective AV and backup system that meets your company's requirements. For additional information, visit The ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Bundles
Progent has put together a selection of fixed-price security and compliance assessment bundles that provide high value by deploying Progent's advanced system monitoring and analysis software as well as Progent's consulting skills to produce an objective and comprehensive evaluation of your network security profile.
Our Network Has Been Hacked: What Are We Supposed to Do Now?
- Security Assessment Service Packages for Small Organizations
Progent offers two value-priced security inventory packages intended to enable small businesses to get an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your IT system from beyond your corporate firewall to identify potential gaps in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from an authorized machine inside your firewalled perimeter to evaluate your vulnerability to internal threats. The two security inventory services are configured and executed from a secured external site. The project is administered by a consultant who has earned advanced security certifications and who creates a report that describes and evaluates the data collected by the scan and suggests various improvements where required.
- Security Vulnerability Assessment Bundles for Enterprises
Progent has developed three levels of flat-rate security evaluation service packages intended for enterprises who need to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer enterprises an opportunity to obtain a professional look at the strength of their security posture. For every security assessment package, Progent engineers with top security credentials study and report on collected data and offer recommendations for efficient improvements. All the network security audit packages include an added-cost option for onsite engineers at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is an accepted technique for allowing businesses to determine how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing services test how effectively your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's experienced security experts using cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
If your company is currently fighting a security crisis and you do not have a detailed response plan, visit Progent's Remote Technical Support to see how to get immediate assistance. Progent offers remote assistance from skilled engineers and can escalate problems to high-level security specialists if necessary. Your company does not have to be a current Progent customer to get emergency support for a security problem, but you can register as a Progent customer in advance at no cost and your standing as a current client can save precious time when there is a crisis.
Usually, smaller organizations have no recovery plan in case of a damaging attack. This is not good, because the damage from a successful security assault can be more catastrophic for a small business than for a large corporation. Progent's security specialists can help your company to design a practical response and incident reporting plan that minimizes the network disruption resulting from a security breach. The step-by-step post-attack response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's preferred method for handling a serious security penetration.
High-value Security Expertise Offered by Progent
Progent's veteran consultants offer world-class consulting in vital areas of IT security including:
Progent's Security Credentials
- Security Vulnerability Audits and Security Compliance Assessment
Progent provides experience with security auditing tools like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of comprehensive network tests to identify potential security gaps. Progent has extensive skills with these and similar tools and can assist you to analyze assessment reports and respond efficiently. Progent's certified security consultants also provide web application validation and can conduct expert evaluation of corporate-wide security to validate your company's compliance with important worldwide security specifications such as FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection including fixed wireless appliances as well as portable handsets. Read more information concerning Progent's Security Vulnerability Audits and Security Compliance Assessment.
- Designing, Implementing, and Validating Secure Environments
Every organization should have a thoroughly considered security strategy that includes both preventive and reactive steps. The pre-attack plan is a collection of precautions that works to minimize vulnerabilities. The reactive plan defines activities to help IT personnel to evaluate the damage resulting from an attack, repair the damage, document the experience, and revive business functions as quickly as feasible. Progent can advise you how to build protection into your business operations, install auditing software, define and execute a secure network architecture, and recommend processes and policies that will enhance the protection of your computing environment. Progent's security professionals are available to help you to set up a firewall, deploy secure remote access to email and files, and configure an efficient virtual private network. If your company is looking for an economical way for outsourcing your network security management, Progent's Round-the-clock Network Support Services feature non-stop remote server monitoring and immediate resolution of problems.
- Data Recovery and Failure Analysis
Progent has skill in restoring networks and servers that have been hacked, are in question, or have stopped working because of a security penetration. Progent can show you how to evaluate the damage caused by the assault, return your company to ordinary business operations, and recover information lost as a result of the attack. Progent's certified specialists can also oversee a comprehensive forensic evaluation by examining activity logs and using other proven assessment tools. Progent's experience with security consulting reduces your off-air time and permits Progent to suggest efficient measures to avoid or contain future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower Services integration and troubleshooting support.
- Other Firewall and VPN Technologies
In addition to supporting a wide array of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size companies expert support for solutions from other important firewall and VPN vendors such as:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) applications and services are designed to interpret the enormous amounts of information represented by security incident records generated by a wide range of sources including network infrastructure appliances, operating systems, and applications and tools. SIEM software analyzes the security logs from these various sources and creates consolidated reports of security incidents as required by government regulations and industry compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure experts can help organizations to plan, install and operate a SIEM system that helps them to see the behavior of attacks and comply with security incident reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's security professionals have earned the most respected certifications available in the industry. These accreditations require exhaustive examinations and demonstrated field experience to guarantee that candidates have acquired expertise with a significant body of security knowledge and techniques and can offer high-level solutions to information networks of any size.
Depend on Progent for Network Security Consulting Services
- Certified Information Security Manager (CISM) Security Support Expertise
Certified Information Security Manager (CISM) identifies the basic competencies and worldwide benchmarks of service that computer security managers are expected to master. CISM offers executive management the confidence that consultants who have earned their accreditation have the background and skill to provide effective security administration and consulting support. Progent can provide a CISM consultant to assist your organization in critical security areas such as information protection governance, risk management, information protection program management, and incident response management. Get more information concerning Progent's CISM Security Consulting Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP consultants are security specialists who have earned CISSP accreditation through verified experience, rigorous study, and exhaustive examination. CISSP Certification recognizes mastery of an international standard for IT security. ANSI has granted the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security administration procedures, security architecture and models, access permission systems, software development security, business processes security, physical security, encryption, telecommunications, network security, and disaster recovery planning. Read the details about Progent's CISSP Support Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier security architecture consultants have earned ISSAP certification as a result of rigorous testing and extensive hands-on work with information security architecture. ISSAP consultants have acquired in-depth understanding of access management systems and methodologies, phone system and network security, cryptography, needs evaluation, BCP and DRP, and physical security. Progent's CISSP-ISSAP-premier security experts can help your business with all aspects of secure network architecture. Learn additional information concerning Progent's ISSAP Certified Secure IT Infrastructure Consulting Assistance.
- Certified Information Systems Auditor (CISA) Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an exhaustive examination administered by the ISACA international professional group. Progent offers the expertise of a CISA-Premier security audit engineer trained to assist businesses in the fields of information systems audit services, IT administration, network assets and infrastructure lifecycle, IT service delivery, safeguarding information resources, and business continuity planning. Get more information concerning Progent's CISA Professional Assistance.
- CRISC-certified Network Risk Mitigation Specialists
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and support information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a business continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's network risk management expertise is a good fit the support available from Progent's CISA-Premier consultants for impartially evaluating your IS management design and also with the services of Progent's CISM consultants for defining company-wide security policies. Read additional information about Progent's CRISC-certified Risk Management Expertise.
- Global Information Assurance Certification Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security experts. GIAC's goal is to assure that an accredited security consultant has the knowledge appropriate to deliver support in important areas of network, information, and program security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the U.S. National Security Agency. Progent offers the help of GIAC certified consultants for all of the security capabilities covered within GIAC accreditation topics including assessing IT infrastructure, security incident handling, intrusion detection, and web application security. Read the details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Services.
If you want computer security engineering help, call Progent at 800-993-9400 or visit Contact Progent.