Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified computer security and compliance consultants offer a broad selection of support services intended to help companies of all sizes to detect and eliminate security vulnerabilities, defend against attacks, recover from any damage resulting from a breakdown of security, and comply with government mandates for guarding information and reporting incidents. Progent can provide a choice of service modes:

  • On-demand remote and on-premises support billed to the nearest minute
  • On-going managed services billed at a low flat monthly rate
  • Value-priced service bundles for a one-time security evaluation
As-needed Security and Compliance Consulting Services
After you register for Progent's services (registration is free), you can receive as-needed remote or on-premises assistance from a Progent security consultant. This traditional support model is essentially reactive and geared toward quickly resolving technical problems that are impacting your productivity or that have stumped your own support personnel. Typical scenarios are configuring a firewall or VPN connection, installing a critical security patch for a Cisco switch, setting up compliant access to a public cloud, or recovering from a ransomware assault. These security services are billed to the nearest minute, which eliminates the frustrating case of getting large bills for fast repairs.

Delivery alternatives for Progent's as-needed support services include:

  • Remote Security Support
    Most security issues can be resolved online via a combination of phone-based help and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver remote security help by offering efficient access to consultants with the experience and resources to resolve some of the most difficult issues quickly, making your service expenses low and minimizing downtime.
  • Onsite Security Services
    For cases where on-premises assistance is required, Progent can send a technical professional to major cities across the United States. Progent can also dispatch a security specialist with top certifications and world-class skills to any location in the U.S.
Progent's accredited consultants are premier to support environments powered by Windows, Linux, macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's wide array of consulting services addresses firewall configuration, e-mail security, protected system design, and data recovery. Progent's technical support staff has been awarded the industry's most advanced security certifications including CISA and Certified Information Systems Security Professional. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can deliver advanced assistance with tough network integration problems.

ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight ASM safeguards local and cloud-based resources and provides a unified platform to automate the entire malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
    Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge tools packaged within one agent managed from a single console. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that addresses your organization's unique needs and that allows you demonstrate compliance with legal and industry data security regulations. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

  • ProSight DPS: Managed Cloud Backup
    ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup processes and allows fast restoration of critical data, apps and virtual machines that have become unavailable or corrupted due to component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security companies to provide centralized management and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.

  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for smaller businesses to diagram, track, enhance and troubleshoot their connectivity hardware like routers, firewalls, and load balancers as well as servers, client computers and other devices. Using state-of-the-art RMM technology, WAN Watch ensures that infrastructure topology maps are kept updated, captures and manages the configuration of almost all devices connected to your network, monitors performance, and sends alerts when potential issues are detected. By automating time-consuming management and troubleshooting activities, ProSight WAN Watch can knock hours off common chores such as network mapping, expanding your network, locating devices that require critical software patches, or isolating performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) technology to help keep your IT system running at peak levels by tracking the health of critical computers that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is transmitted immediately to your designated IT staff and your Progent consultant so that all looming issues can be resolved before they can disrupt productivity Find out more details about ProSight LAN Watch server and desktop monitoring consulting.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the apps. Because the system is virtualized, it can be moved immediately to a different hardware solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted looking for critical information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable alternative for small and mid-size organizations to get an unbiased assessment of the health of their IT system. Based on a selection of the top remote monitoring and management tools in the industry, and overseen by Progent's certified team of information technology experts, ProSight Network Audits show you how closely the configuration of your core network assets adhere to industry best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and provide instant benefits like a more manageable Active Directory (AD) environment. Both also come with one year of advanced remote network monitoring and management. Advantages can include lower-cost management, improved compliance with information security requirements, more efficient utilization of IT assets, faster troubleshooting, more dependable backup and restore, and higher availability. Learn more information about Progent's ProSight Network Audits network infrastructure assessment.

Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is a low-cost service based on a brief interview with a Progent backup/recovery expert. The fact-finding interview is intended to help evaluate your organization's preparedness either to stop or recover quickly after an assault by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to gather information about your existing AV defense and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report detailing how you can apply industry best practices to build an efficient AV and backup environment that meets your business requirements. For additional information, refer to The ProSight Ransomware Preparedness Report Service.

Set-price Security Evaluation and Verification Bundles
Progent has put together a number of fixed-price security evaluation packages that provide exceptional value by utilizing Progent's advanced system monitoring and analysis tools as well as Progent's technical experience to produce an objective and thorough evaluation of your IT environment security posture.

  • Security Inventory Service Bundles for Small Organizations
    Progent offers two ultra-affordable security inventory packages designed to allow small organizations to obtain a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive examination of your IT system from beyond your corporate firewall to identify potential risks in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a network scan from an authorized machine within your firewalled perimeter to assess your vulnerability to internal threats. The two security inventory scanning services are set up and run from a secured offsite location. The project is managed by an engineer who has been awarded high-level security certifications and who produces a report that describes and evaluates the data captured by the security scan and suggests various improvements where required.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent has developed three levels of fixed-price security evaluation service bundles designed for large organizations who want to meet security standards required by state or industry agencies. Progent's security evaluation service bundles offer enterprises an opportunity to obtain an objective look at the strength of their security profile. For each security assessment package, Progent engineers with top security credentials analyze and report on collected data and offer recommendations for efficient remediation. Each of the network security assessment packages include an added-cost option for onsite engineers at any location in the U.S.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is a critical technique for helping businesses to determine how open their network systems are to modern threats. Progent's stealth penetration testing services check how well your corporate security policies and platforms stand up to authorized but unannounced intrusion attempts managed by Progent's certified security experts utilizing advanced hacking techniques. Read about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your business is now fighting a security crisis and you do not have a detailed recovery procedure, go to Progent's Online Network Support to see how to receive immediate assistance. Progent offers remote technical support from experienced engineers and can refer trouble tickets to certified security specialists if required. Your company does not have to be a registered Progent client to get urgent support for a security breach, but you can sign up as a Progent client ahead of time at no cost and your standing as a registered client could save precious time during a crisis.

Typically, smaller organizations have no response procedure in case of a successful attack. This is risky, since the damage from a serious security assault can be even more devastating for a small company than for a big corporation. Progent's security specialists can assist your you to create an efficient response and event reporting procedure that minimizes the network disruption following a security breach. The step-by-step incident response procedure promoted by Global Information Assurance Certification is Progent's suggested method for responding to a serious security incident.

High-value Security Expertise Offered by Progent
Progent's veteran consultants offer world-class consulting in vital areas of network compliance such as:

  • Vulnerability Audits and Compliance Testing
    Progent offers expertise with security auditing software such as MS Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic system tests to uncover possible security problems. Progent has broad skills with these and similar tools and can help your company to analyze audit results and respond efficiently. Progent's certified security engineers also can perform web software testing and can conduct thorough evaluation of corporate-wide security to verify your organization's compliance with key global security standards such as HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless appliances as well as mobile devices. Get the details about Progent's Information Risk Audits and Security Compliance Assessment.
  • Planning, Implementing, and Validating Protected Environments
    Every company ought to have a carefully considered security strategy that incorporates both proactive and reactive elements. The proactive strategy is a set of steps that helps to reduce vulnerabilities. The reactive strategy specifies activities to assist IT personnel to inventory the losses resulting from a breach, remediate the damage, record the experience, and restore network functions as soon as feasible. Progent can show you how to incorporate protection into your company processes, configure scanning software, create and execute a secure network architecture, and propose procedures and policies to optimize the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, design secure online and mobile access to email and data, and install an effective virtual private network. If your company is interested in an economical way for jobbing out your network security management, Progent's Round-the-clock Network Support Options feature continual online server tracking and fast resolution of problems.
  • Data Recovery and Security Forensics
    Progent offers skill in restoring networks and servers that have been compromised, are suspect, or have stopped working because of a security attack. Progent can help evaluate the damage caused by the attack, return your company to normal functions, and retrieve data compromised owing to the breach. Progent's security specialists can also manage a comprehensive failure analysis by examining activity logs and utilizing a variety of proven assessment techniques. Progent's experience with security problems minimizes your business disruption and permits Progent to propose effective ways to avoid or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
    Cisco Certified CCIE Network Security EngineersThe latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, configure, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
  • Additional Firewall and VPN Solutions
    As well as being expert in a broad array of network security solutions available from Microsoft and Cisco, Progent offers small and mid-size companies top-level engineering services for security products from other major firewall and Virtual Private Network suppliers including:
  • SIEM Security Information and Event Management Integration and Support
    Security information and event management (SIEM) applications and services are designed to make sense the massive quantity of information represented by security event logs created by a wide range of sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM software organizes the security event records from these various sources and creates summary reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified computer security consultants and Cisco CCIE certified network experts can help organizations to plan, install and manage a SIEM solution that enables them to see the progress of attacks and comply with event reporting requirements. (Visit Progent's SIEM solutions.)
Progent's Security Credentials
Progent's security engineers have been awarded the most respected certifications available in the security industry. All of these certifications demand extensive testing and proven field experience to ensure that recipients have mastered a significant amount of security knowledge and techniques and can provide high-level consulting to information networks of any complexity.
  • Certified Information Security Manager (CISM) Security Support Services
    CISM defines the fundamental competencies and international benchmarks of service that information technology security professionals are required to master. It offers executive management the confidence that consultants who have earned their certification have the background and skill to provide effective security administration and engineering support. Progent can provide a CISM support professional to help your enterprise in key security areas including information security governance, vulnerability assessment, data security program control, and crisis response support. Get additional details concerning Progent's Certified Information Security Manager Security Support Assistance.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    Progent's CISSP experts are security specialists who have earned CISSP accreditation through verified professional work, rigorous study, and exhaustive examination. CISSP qualification recognizes expertise in an international standard for IT security. ANSI has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration procedures, security architecture and test systems, access control methodology, software development security, operations security, hardware security, encryption, telecommunications, Internet security, and disaster recovery planning. Find out the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

  • CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
    Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have been awarded ISSAP accreditation following rigorous testing and significant hands-on work with network security architecture. ISSAP consultants have in-depth knowledge of access control mechanisms and methodologies, telecommunications and network protection, cryptography, needs evaluation, business continuity and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security consultants can help your company with all phases of secure network architecture. Find out more details about Progent's ISSAP Accredited Protected Network Infrastructure Consulting Support.

  • Certified Information Systems Auditor (CISA) Professional Expertise
    The Certified Information Systems Auditor credential is a prestigious qualification that signifies mastery in network security auditing. Certified by ANSI, the CISA accreditation requires that candidates pass an extensive test given by the ISACA international professional association. Progent offers the services of a CISA-Certified security professional trained to help businesses in the areas of information systems audit services, information technology enforcement, systems and infrastructure lifecycle, information technology support, safeguarding data resources, and disaster recovery preparedness. Read more details about Progent's Certified Information Systems Auditor Support Expertise.

  • CRISC-certified Network Risk Management Experts
    The CRISC program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, implement, and maintain information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and execute a business continuity strategy based on industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's risk mitigation services are a good fit the support available from Progent's CISA-Certified security engineers for objectively evaluating your IS control design and with the services of Progent's CISM experts for defining company-wide security policies. Read more details concerning Progent's CRISC IT Risk Management Expertise.

  • GIAC Consulting Services
    GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security experts. GIAC's mission is to ensure that a certified professional possesses the knowledge necessary to deliver services in important areas of system, information, and application security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency. Progent offers the help of GIAC certified consultants for all of the network security services addressed within GIAC certification programs including auditing IT infrastructure, security incident response, traffic analysis, and web-based services security. Read additional information concerning Progent's Global Information Assurance Certification Consulting Services.
Contact Progent for Network Security Expertise
If you want security consulting expertise, call Progent at 800-993-9400 or see Contact Progent.