Introduction to Progent's Security Support Services
Progent's industry certified network security experts offer a broad range of services designed to help companies of any size to identify and correct security weaknesses, defend against attacks, recover from the damage caused by a breakdown of protection, and meet government mandates for protecting information and reporting incidents. Progent offers a selection of service delivery modes:
As-needed Security and Compliance Consulting Services
- As-needed remote and on-site assistance billed to the nearest minute
- On-going fully managed services billed at a low flat monthly fee
- Value-priced service packages for a one-time security and compliance assessment
Once you sign up for Progent's services (signing up is free), you can get as-needed remote or on-premises assistance from one of Progent security expert. This traditional support model is primarily reactive and geared toward rapidly resolving technical problems that are affecting your network or that have stymied your own support staff. Typical scenarios include configuring a firewall or VPN tunnel, installing a vital security update for a Cisco switch or router, designing secure access to cloud-based resources, or restoring data after a ransomware attack. These services are billed by the minute, which eliminates the annoying case of getting big invoices for fast repairs.
Delivery options for Progent's as-needed support services include:
Progent's accredited security consultants are premier to support environments based on Microsoft, Linux, macOS and OS X, Sun, and popular versions of UNIX. Progent's wide array of consulting services covers firewall technology, email systems, protected network architecture, and information restoration. Progent's technical support team has earned the world's most advanced security accreditations including CISM and Information System Security Architecture Professional. Progent also can provide fast access to remote Cisco CCIE network infrastructure consultants who can deliver advanced support with complex network technology issues.
- Online Security Support
The majority security issues can be handled remotely through a mix of phone help and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can deliver online security help by offering easy access to consultants with the background and resources to fix some of the most difficult issues quickly, making your service expenses affordable and reducing downtime.
- On-premises Security Support
For cases where on-premises support is necessary, Progent can send a technical professional to major cities throughout the U.S. Progent can also send a security consultant with top certifications and advanced skills to any location in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to guard endpoint devices and servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching AV products. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack progression including protection, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer security for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering through leading-edge technologies packaged within one agent managed from a single console. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry data protection regulations. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent's consultants can also help you to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of vital files, applications and virtual machines that have become unavailable or corrupted due to component failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory standards such as HIPAA, FINRA, and PCI and, when necessary, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the technology of leading data security vendors to provide web-based control and comprehensive protection for your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.
- ProSight WAN Watch: Infrastructure Management
Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for smaller organizations to diagram, track, optimize and troubleshoot their connectivity appliances such as routers, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Using cutting-edge RMM technology, WAN Watch makes sure that infrastructure topology diagrams are kept current, captures and displays the configuration of virtually all devices on your network, monitors performance, and sends notices when problems are detected. By automating complex network management activities, WAN Watch can cut hours off common tasks such as making network diagrams, expanding your network, locating appliances that require important updates, or resolving performance issues. Find out more details about ProSight WAN Watch network infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your network operating efficiently by checking the health of critical computers that power your information system. When ProSight LAN Watch detects a problem, an alarm is transmitted automatically to your designated IT personnel and your assigned Progent engineering consultant so any looming problems can be addressed before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the system is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard data about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can save as much as half of time wasted searching for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost way for small and mid-size organizations to get an objective evaluation of the overall health of their IT system. Based on some of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class group of IT experts, ProSight Network Audits help you see how well the configuration of your essential infrastructure assets adhere to best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver immediate ROI such as a more manageable Active Directory environment. Both versions also include one year of cutting-edge remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with data security regulations, more efficient utilization of network resources, faster problem resolution, more reliable backup and restore, and increased uptime. See more about ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is a low-cost service centered on a brief discussion with a Progent information assurance expert. The fact-finding interview is intended to help evaluate your company's preparedness either to stop or recover quickly after an assault by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will work with you directly to collect information about your current security profile and backup platform, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow industry best practices to create an efficient security and backup/recovery environment that aligns with your business requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report.
Fixed-price Security Evaluation and Validation Packages
Progent offers a number of flat-rate security and compliance evaluation bundles that provide exceptional value by utilizing Progent's enterprise-class network monitoring tools plus Progent's consulting experience to create an objective and thorough assessment of your network security posture.
Our Network Has Been Hacked: What Are We Supposed to Do?
- Security Inventory Service Packages for Small Organizations
Progent offers two value-priced security inventory packages designed to allow small businesses to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer manages an extensive assessment of your IT system from beyond your corporate firewall to identify potential gaps in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan using an authorized computer inside your company firewall to evaluate your exposure to inside threats. These two security inventory services are configured and executed from a secured external site. The project is managed by a consultant who has earned advanced security certifications and who creates a report that details and evaluates the information captured by the scan and suggests practical enhancements where required.
- Security Vulnerability Evaluation Packages for Large Organizations
Progent offers three levels of fixed-price security evaluation service bundles designed for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security evaluation service bundles offer enterprises a chance to get a professional look at the strength of their security profile. For every security assessment bundle, Progent engineers with advanced security credentials analyze and report on collected data and provide suggestions for efficient remediation. All the network security assessment bundles include an extra-cost option for onsite consultants anywhere in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, often known as PEN testing, is an accepted tool for allowing organizations to determine how open their IT environments are to current-generation attacks. Progent's stealth penetration testing services check how effectively your corporate security policies and technologies stand up to authorized but unannounced penetration attempts managed by Progent's experienced security experts using advanced hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
If you are currently faced with a network security emergency and you have no detailed recovery plan, refer to Progent's Remote Computer Support to learn how to receive fast help. Progent provides online technical support from experienced engineers and can refer problems to certified security experts if necessary. Your organization does not have to be a registered Progent customer to get urgent support for a security breakdown, but you can sign up as a Progent client ahead of time for free and your standing as a current customer could save precious time in a crisis.
Typically, smaller businesses do not have a recovery procedure in the event of a successful security breach. This is not good, since the damage from a successful security assault can be more devastating for a small company than for a large corporation. Progent's security specialists can help your business to design an effective recovery and event reporting procedure that reduces the network downtime following a security breach. The formal post-attack response model promoted by Global Information Assurance Certification is Progent's preferred procedure for responding to a serious security incident.
Advanced Security Expertise Available from Progent
Progent's certified security consultants offer specialized help in key areas of network compliance including:
Progent's Security Certifications
- Vulnerability Audits and Security Compliance Testing
Progent provides expertise with information risk auditing software like MS Baseline Security Analyzer or LANguard for performing a variety of automatic network scans to uncover potential security holes. Progent has broad experience with these utilities and can assist you to analyze assessment reports and respond efficiently. Progent's security engineers also provide web application validation and can perform expert evaluation of enterprise-wide security to validate your company's compliance with key worldwide security standards including FISMA, NIST, and ISO. In addition, Progent can assess the strength of your wireless security covering fixed wireless equipment plus portable devices. Learn more information concerning Progent's Information Risk Audits and Compliance Testing.
- Designing, Implementing, and Validating Secure Networks
Any organization ought to develop a thoroughly thought out security strategy that includes both preventive and responsive elements. The proactive strategy is a set of steps that helps to reduce vulnerabilities. The reactive plan specifies procedures to assist IT personnel to evaluate the losses caused by a breach, remediate the damage, record the event, and restore business functions as soon as feasible. Progent can advise you how to design security into your company operations, configure scanning utilities, define and implement a safe network infrastructure, and recommend procedures and policies to enhance the safety of your computing environment. Progent's security professionals are available to help you to configure a firewall, design secure remote connectivity to e-mail and data, and configure an efficient virtual private network. If your company is interested in an economical way for outsourcing your network security administration, Progent's 24x7 Monitoring Options feature automated online system monitoring and fast response to problems.
- System Restoration and Security Forensics
Progent provides skill in restoring systems and servers that have been compromised, are suspect, or have ceased to function because of a security breach. Progent can show you how to evaluate the losses resulting from the assault, return your company to ordinary business operations, and retrieve information lost owing to the event. Progent's certified engineers can also manage a comprehensive failure analysis by examining event logs and utilizing other advanced forensics tools. Progent's background with security consulting minimizes your downtime and allows Progent to suggest efficient ways to prevent or contain new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower integration and debugging support.
- Additional Firewall and Virtual Private Network (VPN) Consulting Services Provided by Progent
In addition to offering support for a broad array of protection solutions available from Microsoft and Cisco, Progent offers small and mid-size organizations expert consulting for solutions from other important firewall and Virtual Private Network (VPN) suppliers by providing services including:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are intended to make sense the enormous amounts of information collected in security incident records created by multiple sources including network infrastructure appliances, servers, and applications and monitoring tools. SIEM applications analyzes the security event records from these diverse sources and creates consolidated reports of security incidents as required by government regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network experts can assist organizations to plan, install and operate a SIEM system that helps them to understand the progress of attacks and comply with event reporting regulations. (See Progent's SIEM solutions.)
Progent's security engineers have been awarded the most prestigious accreditations offered in the security industry. These accreditations demand extensive testing and proven work background to ensure that recipients have acquired expertise with a substantial body of security information and techniques and can offer advanced solutions to information networks of any size.
Depend on Progent for Computer Security Consulting Services
- CISM Security Support Services
Certified Information Security Manager defines the fundamental skills and international benchmarks of service that IT security managers are required to achieve. CISM provides executive management the assurance that those who have earned their CISM possess the experience and skill to provide effective security administration and engineering services. Progent can provide a CISM-certified expert to help your organization in vital security areas such as data protection governance, risk management, data protection program management, and incident handling support. Learn additional information about Progent's Certified Information Security Manager Security Support Expertise.
- CISSP Security Consulting Expertise
Progent's CISSP experts are security engineers who have been awarded CISSP status through verified professional work, rigorous study, and exhaustive examination. CISSP qualification indicates expertise in an international standard for IT security. ANSI has given the CISSP status official recognition in the field of information security under ISO/IEC 17024. Fields of expertise covered under CISSP include security administration practices, security design and models, connection control methodology, applications development security, operations security, physical security, cryptography, communications, Internet security, and business continuity planning. Find out more information about Progent's CISSP Support Services.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Certified security architecture experts have earned ISSAP status as a result of rigorous examination and extensive experience. field experience with information security architecture. ISSAP consultants have in-depth understanding of access management systems and techniques, phone system and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-premier security specialists can help your company with all aspects of architecture security. Get more information about Progent's ISSAP Certified Secure System Infrastructure Consulting Services.
- CISA Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that signifies mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive test administered by the ISACA international professional association. Progent offers the expertise of a CISA-Premier security professional able to assist companies in the areas of IS audit services, information technology governance, network assets and architecture planned useful life, information technology support, safeguarding data resources, and business continuity preparedness. Read more information about Progent's Certified Information Systems Auditor Professional Assistance.
- CRISC Network Risk Management Specialists
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's ability to design, implement, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's network risk management expertise is complementary to the services available from Progent's CISA-Certified consultants for objectively evaluating your IS management mechanisms and also with the expertise of Progent's CISM experts for implementing company-wide security policies and procedures. Learn additional information about Progent's CRISC Network Risk Management Support.
- GIAC (Global Information Assurance Certification) Support Expertise
Global Information Assurance Certification was founded in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to make sure that a certified security consultant has the knowledge appropriate to provide support in vital areas of system, data, and application program security. GIAC certifications are recognized by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent offers the support of certified consultants for any of the security services addressed under GIAC accreditation topics including assessing IT infrastructure, security incident response, intrusion detection, and web-based services security. Read the details about Progent's GIAC Consulting Assistance.
If you're looking for computer security support services, telephone Progent at 800-993-9400 or visit Contact Progent.