Overview of Progent's Security Consulting Services
Progent's certified network security professionals can provide a broad range of support services intended to help companies of any size to identify and correct security vulnerabilities, block attacks, remediate any issues resulting from a breach of security, and meet government mandates for protecting information and reporting incidents. Progent can provide a selection of service modes:

  • On-demand online and on-premises assistance invoiced by the minute
  • On-going managed services billed at an affordable fixed monthly rate
  • Value-priced service packages for a single security and compliance assessment
On-demand Security Support Services
After you sign up for Progent's services (signing up is free), you can get as-needed remote or onsite assistance from one of Progent security consultant. This traditional support model is primarily reactive and optimized for rapidly resolving technical issues that are disrupting your network or that are beyond the scope of your in-house support staff. Typical examples are replacing a firewall appliance or VPN connection, installing a vital security patch for a Cisco switch, designing secure access to a public cloud, or restoring data after a ransomware attack. These services are invoiced by the minute, which eliminates the frustrating case of receiving large bills for quick fixes.

Delivery alternatives for Progent's as-needed support include:

  • Online Security Services
    Most security problems can be resolved remotely through a combination of phone help and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide remote security help by offering easy access to consultants with the background and technical resources to resolve many of the most challenging issues quickly, making your service costs low and reducing lost productivity.
  • On-premises Security Services
    For instances where onsite assistance is required, Progent can dispatch a technical professional to major cities throughout the U.S. Progent can also dispatch a security consultant with top certifications and advanced skills to any location in the country.
Progent's accredited security engineers are certified to support systems powered by Windows, Linux, Mac, Solaris, and popular derivatives of UNIX. Progent's broad range of services covers firewall configuration, e-mail systems, protected network architecture, and data recovery. Progent's support team has been awarded the world's most advanced security credentials including Certified Information Systems Auditor (CISA) and CISSP. Progent also offers fast access to remote Cisco-certified CCIE network consultants who can provide world-class support with complex network technology issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily escape traditional signature-matching AV tools. ProSight ASM protects local and cloud-based resources and provides a single platform to address the complete threat progression including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge technologies incorporated within a single agent accessible from a unified console. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP deployment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent's consultants can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup and Recovery
    ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid recovery of vital data, apps and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your business-critical data. Learn more about ProSight DPS Managed Cloud Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security companies to provide centralized control and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device provides a deeper layer of inspection for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.

  • ProSight WAN Watch: Network Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized organizations to map, track, reconfigure and debug their connectivity appliances such as routers and switches, firewalls, and load balancers plus servers, endpoints and other networked devices. Incorporating state-of-the-art RMM technology, ProSight WAN Watch ensures that network diagrams are always updated, copies and displays the configuration information of almost all devices on your network, tracks performance, and sends alerts when potential issues are discovered. By automating tedious management and troubleshooting processes, WAN Watch can cut hours off ordinary chores like making network diagrams, expanding your network, locating appliances that require important updates, or resolving performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates state-of-the-art remote monitoring and management technology to keep your network running efficiently by tracking the health of vital assets that power your information system. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your specified IT management personnel and your assigned Progent consultant so any potential issues can be addressed before they can impact productivity Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the apps. Because the system is virtualized, it can be moved immediately to a different hardware solution without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect data about your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can save as much as 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost way for small and medium-size organizations to get an unbiased assessment of the overall health of their information system. Based on a selection of the leading remote monitoring and management platforms available, and overseen by Progent's certified group of IT experts, ProSight Network Audits help you see how well the configuration of your core network assets conform to best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI such as a cleaner Active Directory (AD) environment. Both also come with one year of state-of-the-art remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with information security standards, higher utilization of network assets, faster problem resolution, more reliable backup and recovery, and higher availability. Learn more information about Progent's ProSight Network Audits network infrastructure review.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is an affordable service based on a brief phone discussion with a Progent backup/recovery expert. The interview is designed to evaluate your company's ability either to stop or recover quickly following an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to gather information about your current AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to deploy an efficient AV and backup/recovery environment that meets your company's needs. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.

Set-price Security Assessment and Validation Bundles
Progent offers a portfolio of set-price security assessment bundles that deliver exceptional value by utilizing Progent's enterprise-class system monitoring and analysis tools plus Progent's technical skills to produce an objective and comprehensive assessment of your network security profile.

  • Security Inventory Service Packages for Small Businesses
    Progent offers two value-priced security inventory packages intended to allow small organizations to get an objective security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your IT system from beyond your corporate firewall to identify potential gaps in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan using an authorized machine inside your company firewall to evaluate your exposure to inside attacks. The two security inventory services are set up and executed from a secured external site. The project is managed by an engineer who has earned advanced security certifications and who produces a report that describes and interprets the data collected by the scan and recommend practical improvements where appropriate.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent has developed three levels of fixed-price security evaluation service packages designed for enterprises who want to meet security standards required by state or industry agencies. Progent's security evaluation service bundles offer larger organizations an opportunity to get an objective assessment at the viability of their security profile. For every security evaluation bundle, Progent engineers with advanced security credentials study and report on collected data and offer suggestions for cost-effective improvements. Each of the network security audit bundles include an extra-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly called PEN testing, is a vital tool for helping businesses to determine how open their IT environments are to current-generation attacks. Progent's stealth penetration testing test how effectively your corporate security procedures and platforms stand up to authorized but unannounced penetration attempts managed by Progent's certified security specialists utilizing cutting-edge hacking methods. Find out about Progent's stealth penetration testing services.
We've Been Hacked: What Are We Supposed to Do Now?
Network Security ConsultantsIf your company is currently faced with a network security emergency and you do not have a detailed response procedure, go to Progent's Online Computer Help to find out how to receive fast help. Progent offers online assistance from experienced network technicians and can escalate trouble tickets to certified security specialists if necessary. Your organization does not need to be a registered Progent customer to receive urgent support for a security breakdown, but you can register as a Progent client in advance for free and your status as a registered client can save precious time during a crisis.

Usually, smaller organizations have not documented a recovery plan in case of a successful attack. This is risky, because the damage from a successful security assault can be even more devastating for a small business than for a big corporation. Progent's security specialists can help your business to create an efficient recovery and event reporting procedure that minimizes the IT system disruption following a security breach. The formal post-attack response procedure outlined by GIAC is Progent's recommended procedure for handling a serious security incident.

Advanced Security Expertise Available from Progent
Progent's certified security engineers can provide world-class consulting in key facets of computer protection such as:

  • Vulnerability Evaluation and Security Compliance Testing
    Progent offers experience with information risk auditing utilities like Microsoft Baseline Security Analyzer or LANguard for conducting a set of automatic network tests to uncover possible security problems. Progent has broad skills with these and similar tools and can help your company to analyze assessment results and react efficiently. Progent's security engineers also can perform web application validation and can perform expert assessments of corporate-wide security to confirm your company's compliance with important industry security specifications including HIPAA, PCI, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including stationary wireless appliances as well as mobile devices. Read additional information concerning Progent's Information Risk Audits and Compliance Assessment.
  • Designing, Building, and Validating Protected Environments
    Any company ought to develop a thoroughly considered security strategy that incorporates both preventive and responsive steps. The proactive plan is a set of precautions that works to minimize security holes. The post-attack strategy defines procedures to assist IT personnel to inventory the damage resulting from an attack, remediate the damage, document the experience, and restore business activity as quickly as possible. Progent can show you how to build security into your business processes, set up scanning software, create and implement a secure network architecture, and recommend processes and policies that will enhance the protection of your information system. Progent's security experts are ready to assist you to configure a firewall, deploy secure offsite connectivity to email and data, and configure an efficient VPN. If you are looking for an affordable option for outsourcing your security administration, Progent's 24x7 Monitoring Packages include automated online network tracking and quick resolution of emergencies.
  • Data Restoration and Security Forensics
    Progent has skill in recovering networks and servers that have been hacked, are in question, or have stopped working as a result of a security attack. Progent can help evaluate the damage caused by the assault, return your company to ordinary business operations, and recover information lost as a result of the attack. Progent's security engineers can also oversee a thorough failure evaluation by going over event logs and using other proven forensics tools. Progent's experience with security consulting minimizes your business disruption and allows Progent to propose efficient ways to avoid or mitigate future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
    Cisco Certified CCIE Security SpecialistsThe latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
  • Additional Firewall and VPN Consulting Services
    In addition to supporting a wide array of security technologies available from Microsoft and Cisco, Progent offers small companies top-level engineering services for products from other major firewall and Virtual Private Network (VPN) suppliers such as:
  • SIEM Integration and Support
    Security information and event management (SIEM) applications and services are designed to digest the massive quantity of data represented by security event logs generated by multiple sources such as network appliances, servers, and application software and tools. SIEM applications organizes the security event records from these various sources and produces consolidated reports of security incidents as required by government regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure experts can assist businesses to design, deploy and operate a SIEM solution that helps them to see the behavior of security incidents and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security professionals have earned the most prestigious accreditations available in the security industry. These accreditations require extensive examinations and proven field background to guarantee that recipients have acquired expertise with a significant amount of security knowledge and methodologies and can provide high-level solutions to information environments of any size.
  • Certified Information Security Manager Security Support Expertise
    Certified Information Security Manager identifies the fundamental competencies and international standards of performance that computer security professionals are required to master. It provides executive management the confidence that those who have earned their CISM have the experience and skill to offer efficient security management and consulting services. Progent can offer a CISM-certified expert to assist your enterprise in vital security disciplines such as data protection governance, vulnerability assessment, data protection process control, and crisis response support. Get additional details concerning Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • CISSP Security Consulting Expertise
    Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP accreditation through verified experience, extensive study, and formal examination. CISSP qualification recognizes expertise in a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of expertise covered within CISSP include security management practices, security design and test systems, connection permission methodology, applications development security, operations security, hardware security, encryption, telecommunications, Internet security, and business continuity planning. Find out the details concerning Progent's CISSP Support Expertise.

  • CISSP-ISSAP} Security Architecture Consulting Expertise
    Progent's CISSP-ISSAP Certified security architecture experts have earned ISSAP certification following rigorous testing and substantial experience. field experience with information security architecture. ISSAP consultants possess in-depth knowledge of access control systems and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-premier security consultants can assist your company with all phases of architecture security. Read the details concerning Progent's ISSAP Certified Protected IT Architecture Consulting Services.

  • CISA Support Expertise
    The Certified Information Systems Auditor credential is a globally recognized achievement that indicates expertise in information system security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo a comprehensive test given by the ISACA international professional association. Progent can provide the expertise of a CISA-Premier security audit engineer able to help companies in the fields of IS audit process, IT enforcement, systems and infrastructure planned useful life, information technology support, protecting information resources, and business continuity planning. Get more details concerning Progent's CISA Consulting Services.

  • CRISC-certified IT Risk Mitigation Specialists
    The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's ability to plan, implement, and maintain IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's risk management services are a good fit the services provided by Progent's CISA-Premier security engineers for impartially auditing your IT management mechanisms and also with the expertise of Progent's CISM-certified support professionals for implementing security policies and procedures. Get more details about Progent's CRISC-certified IT Risk Management Services.

  • GIAC Support Services
    GIAC was founded in 1999 to certify the knowledge of network security experts. GIAC's goal is to verify that a certified professional has the skills necessary to provide services in critical categories of system, information, and application program security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. NSA. Progent can provide the support of certified consultants for all of the network security disciplines addressed under GIAC accreditation topics including assessing security systems, security incident response, intrusion detection, and web application security. Get the details concerning Progent's Global Information Assurance Certification Professional Expertise.
Depend on Progent for Network Security Support
If you're trying to find security consulting expertise, call Progent at 800-993-9400 or see Contact Progent.