Introduction to Progent's Security and Compliance Consulting Services
Progent's certified network security and compliance consultants offer a broad selection of support services designed to help organizations of any size to uncover and correct security vulnerabilities, defend against attacks, recover from the issues resulting from a breach of protection, and comply with government requirements for guarding information and reporting security incidents. Progent offers a choice of service delivery modes:
As-needed Security and Compliance Support Services
- As-needed remote and on-premises assistance billed by the minute
- On-going fully managed services billed at a low flat monthly fee
- Value-priced service packages for a one-time security and compliance assessment
After you sign up for Progent's services (signing up is free), you can get as-needed remote or onsite support from one of Progent security and compliance consultant. This classic service model is essentially reactive and geared toward quickly resolving IT issues that are affecting your productivity or that have stumped your in-house support personnel. Common examples are debugging a firewall or VPN tunnel, implementing a critical security update for a Cisco switch or router, designing compliant access to a public cloud, or recovering from a ransomware attack. These services are invoiced by the minute, which eliminates the frustrating situation of getting big invoices for fast repairs.
Delivery options for Progent's as-needed support services include:
Progent's accredited security engineers are premier to support environments based on Microsoft, Linux, Mac, Sun, and popular versions of UNIX. Progent's wide range of services encompasses firewall configuration, email systems, secure system design, and data restoration. Progent's support team has earned the world's top security credentials including Certified Information Systems Auditor (CISA) and Information System Security Architecture Professional. Progent also can provide immediate access to online Cisco-certified CCIE network infrastructure engineers who can provide advanced support with tough network integration problems.
- Online Security Support
Most security-related problems can be handled online through a mix of phone-based help and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can deliver online security support by offering efficient access to consultants who have the background and technical resources to fix some of the most difficult problems quickly, making your support costs affordable and reducing lost productivity.
- Onsite Security Support Services
For cases where on-premises support is required, Progent can send a technical professional to major cities across the U.S. Progent can also send a security consultant with top certifications and advanced skills to any location in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning technology to guard endpoints as well as physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by traditional signature-matching AV tools. ProSight ASM protects local and cloud resources and offers a single platform to manage the entire threat lifecycle including filtering, infiltration detection, mitigation, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services deliver affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies packaged within one agent managed from a single console. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP environment that addresses your company's specific requirements and that allows you prove compliance with government and industry data security standards. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical files, applications and virtual machines that have become lost or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight DPS to to comply with regulatory requirements such as HIPAA, FIRPA, and PCI and, when needed, can help you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide centralized management and world-class protection for your email traffic. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and keeps most threats from reaching your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outbound email, the onsite gateway provides AV and anti-spam filtering, DLP, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for small and mid-sized businesses to map out, track, enhance and troubleshoot their connectivity hardware like routers, firewalls, and access points plus servers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology maps are kept updated, copies and displays the configuration of virtually all devices on your network, tracks performance, and sends notices when potential issues are discovered. By automating time-consuming network management activities, ProSight WAN Watch can knock hours off common tasks such as making network diagrams, expanding your network, finding devices that require critical updates, or identifying the cause of performance problems. Learn more details about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses state-of-the-art remote monitoring and management techniques to keep your IT system operating efficiently by tracking the health of critical computers that drive your business network. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your designated IT personnel and your Progent engineering consultant so any potential issues can be addressed before they can impact productivity Find out more about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to an alternate hosting solution without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can save up to 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and affordable way for small and mid-size organizations to obtain an unbiased assessment of the health of their network. Powered by some of the leading remote monitoring and management (RMM) platforms in the industry, and supervised by Progent's world-class team of IT professionals, ProSight Network Audits show you how well the configuration of your core infrastructure assets conform to industry leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and deliver instant benefits such as a more manageable Active Directory environment. Both versions also include a year of cutting-edge remote network monitoring and management. Benefits can include lower-cost management, better compliance with data security requirements, more efficient utilization of IT resources, faster problem resolution, more dependable backup and restore, and increased uptime. Read more information about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service built around a phone interview with a Progent information assurance consultant. The fact-finding interview is intended to help evaluate your organization's preparedness either to block or recover quickly following an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to collect information about your existing security profile and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can apply industry best practices to deploy an efficient AV and backup system that meets your company's needs. For details, refer to The ProSight Ransomware Preparedness Report Service.
Fixed-price Security Assessment and Validation Packages
Progent has put together a variety of set-price security evaluation bundles that deliver exceptional value by utilizing Progent's advanced network monitoring software as well as Progent's consulting experience to produce an unbiased and thorough evaluation of your network security profile.
Our System Has Been Hacked: What Do We Do?
- Security Assessment Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages designed to enable small organizations to obtain a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers a comprehensive examination of your IT system from beyond your corporate firewall to determine possible gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan from an authorized machine inside your company firewall to assess your vulnerability to internal assaults. The two security inventory services are set up and executed from a secured external site. The project is administered by an engineer who has been awarded high-level security certifications and who produces a document that describes and evaluates the information captured by the scan and suggests practical enhancements where appropriate.
- Security Vulnerability Assessment Packages for Large Businesses
Progent offers three levels of flat-rate security evaluation service packages designed for enterprises who want to meet compliance standards required by state or industry regulators. Progent's security evaluation service bundles offer enterprises a chance to get an objective look at the viability of their security profile. For each security evaluation bundle, Progent consultants with advanced security credentials analyze and report on captured data and offer suggestions for cost-effective remediation. All the network security assessment bundles include an extra-cost option for onsite engineers anywhere in the United States.
- Stealth Penetration Testing
Stealth penetration testing, commonly known as PEN testing, is a vital technique for allowing businesses to find out how vulnerable their network systems are to current-generation attacks. Progent's stealth penetration testing test how effectively your existing security procedures and platforms stand up to authorized but unannounced penetration attempts launched by Progent's veteran security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
If your company is currently faced with a network security crisis and you have no detailed response plan, go to Progent's Remote Technical Help to learn how to receive immediate help. Progent provides remote assistance from experienced network technicians and can escalate problems to high-level security experts if required. Your business does not need to be a registered Progent client to get urgent support for a security breach, but you can sign up as a Progent customer in advance at no cost and your standing as a registered customer could save precious time during an emergency.
Usually, smaller companies have no response plan in the event of a successful attack. This is risky, since the damage from a successful security attack can be even more devastating for a small company than for a big enterprise. Progent's security engineers can assist your business to create a practical response and event reporting procedure that reduces the network disruption resulting from a security breach. The step-by-step incident handling procedure outlined by Global Information Assurance Certification is Progent's recommended method for responding to a serious security attack.
High-value Security Expertise Offered by Progent
Progent's seasoned engineers offer advanced support in vital facets of IT security such as:
Progent's Security Credentials
- Vulnerability Evaluation and Security Compliance Testing
Progent provides expertise with information risk auditing utilities such as Microsoft Baseline Security Analyzer or LANguard for performing a variety of automatic system tests to uncover potential security holes. Progent has broad skills with these utilities and can assist you to understand assessment results and react efficiently. Progent's security consultants also offer web application validation and can conduct thorough evaluation of enterprise-wide security to validate your company's compliance with key global security standards including HIPAA, PCI, and ISO. In addition, Progent can assess the effectiveness of your wireless security covering fixed wireless appliances plus mobile handsets. Get the details about Progent's Information Risk Evaluation and Compliance Assessment.
- Designing, Building, and Testing Protected Networks
Every organization ought to have a thoroughly considered security plan that includes both preventive and reactive elements. The pre-attack plan is a collection of precautions that works to reduce vulnerabilities. The post-attack plan specifies activities to assist security personnel to inventory the losses caused by an attack, repair the damage, record the event, and restore business functions as quickly as feasible. Progent can show you how to build protection into your business processes, install auditing utilities, create and execute a secure network architecture, and recommend processes and policies to enhance the protection of your information system. Progent's security experts are ready to help you to set up a firewall, design secure offsite access to email and data, and configure an efficient virtual private network (VPN). If your company is interested in an economical way for jobbing out your network security administration, Progent's 24x7 Network Support Packages feature continual remote network monitoring and quick response to emergencies.
- Data Restoration and Failure Analysis
Progent has expertise in restoring systems and devices that have been compromised, are in question, or have failed as a result of a security penetration. Progent can help evaluate the losses resulting from the assault, return your company to normal functions, and recover data lost owing to the breach. Progent's certified engineers can also perform a comprehensive failure evaluation by going over event logs and using a variety of advanced assessment tools. Progent's experience with security consulting minimizes your off-air time and allows Progent to recommend efficient measures to avoid or contain future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your existing PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
- Additional Firewall and VPN Consulting Services Offered by Progent
In addition to supporting a wide range of network security technologies available from Microsoft and Cisco, Progent offers small organizations top-tier engineering services for security products from other important firewall and Virtual Private Network vendors by providing services such as:
- SIEM Solutions
Security information and event management (SIEM) software and services are designed to make sense the massive amounts of data collected in security event logs created by multiple sources including network appliances, servers, and application software and tools. SIEM applications analyzes the security logs from these various sources and produces consolidated reports of security events as required by government regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco CCIE certified network infrastructure consultants can help organizations to design, install and operate a SIEM system that enables them to see the behavior of security incidents and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's security engineers have been awarded some of the most prestigious accreditations available in the industry. These accreditations require exhaustive testing and demonstrated work experience to guarantee that recipients have acquired expertise with a substantial amount of security knowledge and methodologies and can provide high-level security solutions to computer networks of any complexity.
Get in Touch with Progent for Network Security Support
- Certified Information Security Manager Security Consulting Services
Certified Information Security Manager (CISM) identifies the fundamental competencies and international benchmarks of service that IT security managers are required to master. It provides business management the confidence that those who have earned their accreditation possess the experience and skill to offer effective security administration and consulting services. Progent can offer a CISM expert to assist your organization in key security disciplines such as data protection governance, risk management, data protection program control, and incident response support. Find out additional information concerning Progent's Certified Information Security Manager Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP status as a result of verified professional work, rigorous study, and exhaustive testing. CISSP qualification recognizes expertise in a worldwide standard for information security. ANSI has given the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security management practices, security architecture and models, access control methodology, applications development security, business processes security, physical security, encryption, communications, network security, and business continuity planning. Read more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP Certified cybersecurity architecture experts have been awarded ISSAP accreditation following rigorous examination and extensive experience. field experience with network security design. ISSAP consultants possess in-depth knowledge of access control systems and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-premier security consultants can help your business with all aspects of architecture security. Learn additional information concerning Progent's ISSAP Certified Secure IT Architecture Consulting Support.
- CISA Consulting Services
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that indicates expertise in information system security audit and control. Accredited by ANSI, the CISA credential requires that candidates undergo a comprehensive test administered by the ISACA professional association. Progent can provide the expertise of a CISA-Certified security audit engineer able to help companies in the areas of IS audit process, IT enforcement, systems and architecture planned useful life, information technology support, safeguarding information resources, and disaster recovery preparedness. Learn more information about Progent's CISA Professional Expertise.
- CRISC-certified Network Risk Mitigation Specialists
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's skills to design, implement, and support IS control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and carry out a business continuity strategy that follows leading practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's network risk mitigation services are a good fit the services available from Progent's CISA-Certified security engineers for impartially assessing your IT control mechanisms and also with the expertise of Progent's CISM-certified support professionals for implementing security policies and procedures. Find out additional details concerning Progent's CRISC IT Risk Management Support.
- Global Information Assurance Certification Professional Services
GIAC was established in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to verify that an accredited professional has the knowledge needed to deliver services in critical areas of system, information, and application security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the United States National Security Agency (NSA). Progent can provide the assistance of GIAC certified consultants for any of the network security services addressed under GIAC accreditation topics such as auditing perimeters, incident handling, intrusion detection, and web services security. Read additional information about Progent's GIAC (Global Information Assurance Certification) Support Expertise.
If you're looking for security expertise, phone Progent at 800-993-9400 or refer to Contact Progent.