Overview of Progent's Security and Compliance Support Services
Progent's certified computer security consultants can provide a broad range of support services intended to help companies of any size to uncover and eliminate security vulnerabilities, block malicious attacks, recover from any issues resulting from a breakdown of security, and meet government mandates for protecting information and reporting security incidents. Progent offers a selection of service delivery modes:

  • As-needed online and on-premises support invoiced to the nearest minute
  • Continual managed services invoiced at an affordable fixed monthly fee
  • Value-priced service packages for a one-time security and compliance evaluation
On-demand Security Consulting Services
Once you sign up for Progent's services (signing up is free), you can receive on-demand online or on-premises support from a Progent security expert. This classic support model is essentially reactive and geared toward rapidly taking care of IT problems that are disrupting your network or that have stymied your own support personnel. Typical scenarios include replacing a firewall or VPN connection, installing a critical security patch for a Cisco switch or router, setting up compliant access to a public cloud, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the frustrating case of getting big bills for fast fixes.

Delivery alternatives for Progent's as-needed support include:

  • Remote Security Services
    Most security-related problems can be resolved remotely through a combination of phone support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide online security help by offering efficient access to consultants with the background and technical resources to fix many of the most challenging problems quickly, keeping your support expenses low and reducing lost productivity.
  • Onsite Security Support
    For cases where onsite assistance is required, Progent can send a technical expert to major metropolitan areas across the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any site in the U.S.
Progent's security engineers are premier to provide help for systems based on Microsoft Windows, Linux, Mac, Sun, and major derivatives of UNIX. Progent's broad selection of consulting services addresses firewall configuration, email systems, protected system design, and information recovery. Progent's support staff has earned the industry's most advanced security certifications including GIAC and Certified Information Systems Security Professional (CISSP). Progent also offers immediate access to remote Cisco-certified CCIE network consultants who can deliver world-class support with tough network technology issues.

ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to defend endpoints as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely evade legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to automate the complete malware attack progression including filtering, detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device control, and web filtering through leading-edge tools packaged within a single agent managed from a unified control. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent's consultants can also help you to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery. For a fixed monthly price, ProSight DPS automates and monitors your backup activities and enables rapid restoration of vital files, applications and virtual machines that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can deliver world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical data. Learn more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security vendors to provide centralized management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a further level of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, DLP, and encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, monitor, reconfigure and debug their connectivity appliances such as routers and switches, firewalls, and load balancers plus servers, endpoints and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch ensures that infrastructure topology diagrams are kept current, copies and displays the configuration information of almost all devices connected to your network, monitors performance, and sends notices when potential issues are discovered. By automating time-consuming management and troubleshooting activities, WAN Watch can knock hours off common tasks like making network diagrams, expanding your network, finding devices that require critical software patches, or resolving performance issues. Find out more details about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management technology to help keep your IT system operating efficiently by checking the state of vital assets that drive your business network. When ProSight LAN Watch uncovers an issue, an alarm is sent immediately to your specified IT management staff and your Progent engineering consultant so any potential issues can be addressed before they can disrupt your network Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and affordable way for small and medium-size businesses to get an unbiased assessment of the health of their information system. Based on some of the leading remote monitoring and management (RMM) platforms available, and overseen by Progent's world-class group of information technology experts, ProSight Network Audits show you how closely the configuration of your core network assets adhere to industry leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide immediate benefits like a more manageable Active Directory environment. Both also come with one year of advanced remote network monitoring and management. Advantages can include easier management, improved compliance with data security standards, more efficient utilization of network resources, faster troubleshooting, more reliable backup and restore, and less downtime. Read more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a brief discussion with a Progent information assurance consultant. The interview is designed to help evaluate your company's preparedness to stop or recover rapidly following an assault by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to collect information concerning your existing security profile and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply best practices to create an efficient security and backup system that meets your business requirements. For more information, see The ProSight Ransomware Preparedness Report.

Flat-rate Security Assessment and Verification Packages
Progent has put together a variety of set-price security and compliance evaluation packages that provide exceptional value by utilizing Progent's enterprise-class system monitoring and analysis software plus Progent's consulting skills to produce an objective and comprehensive evaluation of your network security posture.

  • Security Assessment Service Bundles for Small Organizations
    Progent offers two value-priced security inventory service packages intended to enable small businesses to get an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive assessment of your network from outside your firewalled perimeter to identify possible gaps in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan using an authorized machine within your company firewall to assess your exposure to inside threats. The two security inventory scanning services are set up and run from a secured external site. The scan is administered by a consultant who has earned high-level security certifications and who produces a document that details and evaluates the data captured by the security scan and suggests practical improvements where required.
  • Security Vulnerability Assessment Packages for Large Organizations
    Progent has developed three levels of flat-rate security assessment service packages designed for large organizations who need to meet security standards required by state or industry agencies. Progent's security assessment service packages offer larger businesses a chance to get a professional assessment at the strength of their security profile. For each security assessment package, Progent engineers with top security credentials analyze and report on collected data and provide recommendations for cost-effective remediation. Each of the network security audit packages include an added-cost option for on-premises consultants anywhere in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often called PEN testing, is a critical tool for helping businesses to find out how open their network systems are to modern threats. Progent's stealth penetration testing services test how well your existing security procedures and platforms stand up to authorized but unannounced penetration attempts launched by Progent's certified security specialists using cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
Our System Has Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your business is now experiencing a security emergency and you have no detailed recovery plan, refer to Progent's Remote Computer Support to find out how to receive immediate help. Progent offers online technical support from experienced network technicians and can refer problems to certified security specialists if necessary. Your company does not have to be a current Progent customer to receive urgent help for a security breach, but you can register as a Progent customer in advance for free and your standing as a registered customer can save precious time in case of an emergency.

Usually, smaller organizations have no response plan in case of a successful penetration. This is not good, because the damage from a serious security attack can be even more devastating for a small company than for a big corporation. Progent's security specialists can assist your company to design an efficient response and incident reporting procedure that minimizes the network disruption following an attack. The step-by-step post-attack handling model outlined by GIAC is Progent's recommended procedure for handling a major security incident.

High-value Security Services Offered by Progent
Progent's seasoned consultants can provide expertise in key areas of computer compliance including:

  • Security Vulnerability Audits and Security Compliance Testing
    Progent offers experience with information risk auditing software such as MS Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network scans to identify possible security problems. Progent has broad skills with these utilities and can assist you to analyze audit results and respond appropriately. Progent's certified security consultants also offer web software testing and can conduct expert evaluation of corporate-wide security to verify your organization's compliance with important industry security specifications such as HIPAA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless protection covering stationary wireless equipment plus portable devices. Read more details concerning Progent's Vulnerability Evaluation and Compliance Assessment.
  • Designing, Building, and Testing Protected Networks
    Any business ought to have a thoroughly considered security plan that incorporates both preventive and responsive steps. The pre-attack plan is a set of precautions that helps to minimize vulnerabilities. The post-attack plan specifies procedures to assist IT personnel to assess the damage caused by a breach, repair the damage, document the event, and revive network functions as quickly as feasible. Progent can advise you how to build security into your company operations, set up auditing utilities, create and execute a safe computer architecture, and recommend processes and policies that will maximize the protection of your information system. Progent's security professionals are ready to assist you to set up a firewall, deploy secure online and mobile connectivity to e-mail and files, and configure an efficient VPN. If your company is interested in an economical option for jobbing out your security administration, Progent's 24x7 Monitoring Options feature continual remote network tracking and fast resolution of problems.
  • Data Recovery and Security Forensics
    Progent provides skill in restoring systems and computers that have been compromised, are quarantined, or have ceased to function following a security penetration. Progent can help evaluate the losses caused by the assault, restore normal business operations, and recover information compromised as a result of the assault. Progent's certified specialists can also perform a comprehensive failure analysis by examining event logs and using other proven forensics tools. Progent's background with security problems minimizes your off-air time and permits Progent to recommend efficient strategies to prevent or mitigate new assaults.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
    Cisco CCIE Network Security ExpertsThe latest generation of ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower Services integration and debugging support.
  • Additional Firewall and Virtual Private Network (VPN) Consulting Services
    As well as being expert in a broad range of security solutions from Microsoft and Cisco, Progent can provide small businesses expert engineering services for solutions from other major firewall and VPN vendors such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to interpret the enormous amounts of data represented by security event records generated by a wide range of sources such as network appliances, servers, and application software and monitoring tools. SIEM applications organizes the security event records from these diverse sources and produces summary reports of security incidents as mandated by state regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure consultants can assist businesses to plan, install and operate a SIEM system that helps them to see the progress of security incidents and comply with security incident reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security specialists have been awarded some of the most respected certifications offered in the security industry. All of these accreditations require extensive testing and proven field experience to ensure that candidates have acquired expertise with a substantial body of security knowledge and methodologies and can offer high-level solutions to computer environments of any complexity.
  • Certified Information Security Manager Security Consulting Services
    Certified Information Security Manager identifies the fundamental competencies and international standards of service that computer security managers are expected to master. CISM provides business management the confidence that those who have earned their accreditation possess the experience and knowledge to offer effective security management and engineering support. Progent can offer a CISM support professional to assist your enterprise in key security areas including data protection governance, vulnerability assessment, information security program control, and incident handling management. Get more information concerning Progent's CISM Security Consulting Assistance.

  • CISSP Security Support Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP certification through demonstrated professional work, rigorous study, and exhaustive examination. CISSP qualification recognizes expertise in an international standard for information security. ANSI has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of expertise included within CISSP include security management practices, security design and test systems, connection control systems, applications development security, business processes security, physical security, encryption, communications, network security, and business continuity planning. Get more information about Progent's CISSP Consulting Expertise.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Expertise
    Progent's CISSP-ISSAP Certified security architecture experts have been awarded ISSAP status after thorough testing and substantial experience. field experience with information security design. ISSAP security experts have acquired comprehensive understanding of access management mechanisms and techniques, telecommunications and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security specialists can help your business with all aspects of architecture security. Learn the details concerning Progent's ISSAP Accredited Protected System Architecture Consulting Assistance.

  • CISA Professional Expertise
    The Certified Information Systems Auditor credential is a recognized achievement that signifies expertise in IS security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates pass an extensive test given by the ISACA international professional group. Progent offers the expertise of a CISA-Premier security consultant trained to help companies in the fields of information systems audit process, information technology governance, systems and infrastructure planned useful life, IT support, protecting data resources, and business continuity preparedness. Get more information about Progent's CISA Professional Assistance.

  • CRISC-certified Risk Management Specialists
    The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's skills to design, deploy, and support information system controls to reduce risk. Progent offers the services of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's risk management expertise is a good fit the services provided by Progent's CISA-Premier security engineers for impartially evaluating your IT control design and also with the services of Progent's CISM experts for designing security policies. Get the details concerning Progent's CRISC-certified Network Risk Management Expertise.

  • Global Information Assurance Certification Consulting Services
    Global Information Assurance Certification was founded in 1999 to validate the skill of information technology security engineers. GIAC's goal is to ensure that an accredited professional has the skills necessary to provide support in key areas of network, data, and application program security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the United States NSA. Progent can provide the expertise of GIAC certified consultants for any of the network security services addressed under GIAC certification topics including assessing perimeters, security incident handling, traffic analysis, and web-based application security. Find out more information about Progent's GIAC Support Expertise.
Depend on Progent for Network Security Support
If you're trying to find computer security consulting, call Progent at 800-993-9400 or visit Contact Progent.