Overview of Progent's Security and Compliance Consulting Services
Progent's industry certified network security experts can provide a broad selection of services intended to assist organizations of any size to detect and correct security vulnerabilities, defend against malicious attacks, recover from the issues caused by a breach of protection, and comply with government requirements for protecting information and reporting incidents. Progent can provide a selection of service models:
On-demand Security and Compliance Support Services
- On-demand online and on-premises assistance invoiced by the minute
- Continual fully managed services invoiced at an affordable flat monthly fee
- Value-priced service bundles for a one-time security evaluation
Once you register for Progent's services (signing up is free), you can receive on-demand online or on-premises assistance from a Progent security and compliance consultant. This traditional support model is essentially reactive and optimized for quickly taking care of IT problems that are impacting your productivity or that are beyond the scope of your own support personnel. Typical scenarios are configuring a firewall appliance or VPN connection, implementing a critical security patch for a Cisco switch or router, setting up secure access to a public cloud, or recovering from a ransomware assault. These services are invoiced by the minute, which avoids the frustrating case of receiving big invoices for quick repairs.
Delivery options for Progent's on-demand support services include:
Progent's accredited security engineers are certified to provide help for systems based on Microsoft Windows, Linux, Mac, Solaris, and popular versions of UNIX. Progent's wide range of services covers firewall technology, email and messaging security, protected network architecture, and data restoration. Progent's support team has been awarded the industry's most advanced security certifications including GIAC (Global Information Assurance Certification) and ISSAP. Progent also offers immediate access to online Cisco-certified CCIE network engineers who can deliver world-class support with tough network integration problems.
- Online Security Support
The majority security-related problems can be resolved remotely through a combination of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants who have the experience and technical resources to resolve many of the most difficult problems quickly, making your service expenses low and minimizing lost productivity.
- On-premises Security Support Services
For instances where onsite support is necessary, Progent can send a technical professional to major cities across the United States. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any location in the U.S.
ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight suite of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis tools to defend endpoints as well as servers and VMs against modern malware assaults like ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight ASM safeguards local and cloud resources and offers a single platform to manage the entire malware attack lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your company's unique requirements and that allows you demonstrate compliance with government and industry data security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent's consultants can also assist your company to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of vital data, apps and virtual machines that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can help you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security companies to deliver web-based control and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of inspection for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized businesses to diagram, monitor, enhance and debug their connectivity hardware such as routers and switches, firewalls, and load balancers as well as servers, client computers and other networked devices. Using state-of-the-art RMM technology, WAN Watch makes sure that infrastructure topology diagrams are kept current, captures and manages the configuration information of almost all devices connected to your network, tracks performance, and generates notices when problems are discovered. By automating time-consuming management processes, WAN Watch can knock hours off ordinary chores such as network mapping, expanding your network, finding devices that need critical updates, or resolving performance bottlenecks. Find out more about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates advanced remote monitoring and management technology to help keep your network operating at peak levels by tracking the health of vital computers that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your designated IT staff and your Progent consultant so that any looming issues can be addressed before they can disrupt your network Learn more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time wasted trying to find critical information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Learn more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and affordable alternative for small and medium-size organizations to obtain an unbiased evaluation of the health of their IT system. Based on some of the top remote monitoring and management platforms available, and overseen by Progent's certified team of IT professionals, ProSight Network Audits help you see how closely the deployment of your essential network assets conform to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate benefits such as a cleaner Active Directory environment. Both versions also come with one year of state-of-the-art remote network monitoring and management. Advantages can include easier management, better compliance with information security standards, higher utilization of network assets, quicker troubleshooting, more reliable backup and restore, and less downtime. See more about Progent's ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a brief discussion with a Progent backup/recovery consultant. The interview is designed to assess your organization's ability either to block or recover rapidly following an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you personally to collect information about your current security profile and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can follow best practices to create a cost-effective security and backup environment that aligns with your company's needs. For additional information, see The ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Verification Bundles
Progent offers a portfolio of set-price security assessment bundles that deliver exceptional value by utilizing Progent's enterprise-class system monitoring tools plus Progent's consulting experience to create an unbiased and thorough assessment of your network security profile.
Our Network Has Been Hacked: What Should We Do Now?
- Security Inventory Service Bundles for Small Organizations
Progent offers two ultra-affordable security inventory service packages intended to allow small organizations to obtain an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive examination of your IT system from beyond your corporate firewall to identify possible gaps in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan from an authorized computer inside your company firewall to evaluate your vulnerability to internal threats. These two security inventory scanning services are set up and executed from a secured external site. The project is administered by an engineer who has been awarded advanced security certifications and who produces a document that details and interprets the data captured by the scan and recommend various enhancements where appropriate.
- Security Vulnerability Assessment Packages for Enterprises
Progent has developed three levels of set-price security evaluation service packages intended for enterprises who need to meet security standards required by state or industry regulators. Progent's security evaluation service packages offer enterprises an opportunity to obtain a professional assessment at the strength of their security profile. For every security assessment bundle, Progent consultants with advanced security credentials study and report on collected data and offer suggestions for cost-effective improvements. All the network security assessment packages include an extra-cost option for on-premises engineers anywhere in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly referred to as PEN testing, is a critical tool for helping organizations to find out how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing services test how effectively your corporate security policies and technologies resist authorized but unannounced penetration attempts managed by Progent's certified security experts utilizing advanced hacking techniques. Read about Progent's stealth penetration testing services.
If your company is currently experiencing a network security emergency and you do not have a formal recovery plan, visit Progent's Remote Network Support to see how to receive fast help. Progent provides online assistance from experienced engineers and can escalate problems to high-level security experts if necessary. Your company does not need to be a registered Progent client to receive urgent help for a security breach, but you can register as a Progent client ahead of time for free and your standing as a current customer can save valuable time in case of a crisis.
Usually, smaller organizations have not documented a recovery procedure in case of a damaging penetration. This is risky, because the cost of a serious security attack can be more catastrophic for a small company than for a large corporation. Progent's security consultants can assist your business to create an effective response and incident reporting procedure that reduces the network disruption resulting from a security breach. The formal incident handling procedure outlined by GIAC is Progent's recommended method for responding to a major security attack.
High-value Security Services Offered by Progent
Progent's veteran consultants can provide consulting support in vital areas of network compliance including:
Progent's Security Certifications
- Information Risk Evaluation and Security Compliance Assessment
Progent provides expertise with security evaluation tools such as Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic system scans to identify potential security holes. Progent has broad skills with scanning utilities and can help your company to understand assessment reports and react appropriately. Progent's security consultants also offer web software validation and can conduct expert assessments of corporate-wide security to confirm your company's compliance with key global security specifications such as HIPAA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless security including fixed wireless equipment as well as portable handsets. Read the details about Progent's Vulnerability Audits and Compliance Assessment.
- Planning, Implementing, and Validating Secure Networks
Any company should develop a carefully considered security plan that includes both preventive and responsive elements. The pre-attack strategy is a collection of steps that works to reduce security holes. The reactive strategy defines procedures to assist security staff to evaluate the damage resulting from a breach, remediate the damage, record the experience, and revive network functions as quickly as possible. Progent can show you how to design protection into your business processes, set up auditing utilities, create and execute a safe network infrastructure, and propose procedures and policies to optimize the safety of your computing environment. Progent's security professionals are ready to help you to set up a firewall, design secure remote access to email and data, and configure an effective virtual private network (VPN). If you are looking for an economical way for outsourcing your security management, Progent's Round-the-clock Monitoring Services include non-stop remote system tracking and quick response to emergencies.
- Data Recovery and Failure Analysis
Progent has skill in restoring networks and devices that have been hacked, are suspect, or have failed because of a security penetration. Progent can show you how to determine the damage resulting from the breach, return your company to normal business operations, and retrieve information compromised as a result of the attack. Progent's security specialists can also perform a thorough failure evaluation by examining activity logs and using other advanced assessment techniques. Progent's background with security problems minimizes your downtime and permits Progent to suggest effective ways to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services integration and troubleshooting support.
- Other Firewall and VPN Consulting Services Offered by Progent
As well as supporting a wide range of security solutions available from Microsoft and Cisco, Progent offers small and mid-size businesses top-level support for products from other important firewall and VPN suppliers by providing services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) applications and services are intended to digest the enormous quantity of data represented by security event logs created by a wide range of sources including network infrastructure appliances, operating systems, and applications and monitoring tools. SIEM software organizes the security event records from these diverse sources and produces summary reports of security incidents as required by state regulations and industry compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure experts can assist organizations to plan, deploy and operate a SIEM system that enables them to see the progress of security incidents and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's security specialists have been awarded some of the most respected certifications offered in the security industry. All of these certifications require extensive examinations and demonstrated work experience to guarantee that recipients have acquired expertise with a significant amount of security knowledge and techniques and can offer high-level solutions to computer environments of any size.
Get in Touch with Progent for Network Security Help
- Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager (CISM) identifies the basic competencies and worldwide standards of service that IT security managers are required to achieve. CISM offers executive management the assurance that those who have earned their accreditation possess the experience and knowledge to provide efficient security administration and consulting support. Progent can offer a CISM-certified expert to help your enterprise in vital security disciplines such as data security governance, vulnerability management, data security process management, and crisis handling support. Learn the details about Progent's Certified Information Security Manager (CISM) Security Support Assistance.
- CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification through demonstrated professional work, rigorous study, and exhaustive examination. CISSP Certification indicates mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management practices, security design and models, connection control systems, applications development security, business processes security, physical security, cryptography, telecommunications, Internet security, and business continuity planning. Get more information about Progent's CISSP Support Assistance.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have been awarded ISSAP certification after thorough testing and significant hands-on work with information security architecture. ISSAP consultants have in-depth knowledge of access control systems and methodologies, telecommunications and network protection, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security experts can help your business with all aspects of architecture security. Learn additional details about Progent's ISSAP Certified Protected Network Infrastructure Consulting Support.
- CISA Consulting Services
The Certified Information Systems Auditor accreditation is an important qualification that indicates mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates undergo a comprehensive test given by the ISACA international professional association. Progent offers the expertise of a CISA-Premier security audit consultant trained to assist businesses in the areas of IS audit services, IT administration, network assets and architecture planned useful life, information technology service delivery, protecting data assets, and disaster recovery planning. Find out more information about Progent's CISA Consulting Assistance.
- CRISC Risk Mitigation Experts
The CRISC program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and support information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's risk mitigation services are a good fit the support available from Progent's CISA-Premier security engineers for objectively assessing your IS control design and also with the services of Progent's CISM experts for designing security policies and procedures. Read additional information about Progent's CRISC Risk Management Services.
- GIAC Consulting Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of computer security experts. GIAC's goal is to make sure that an accredited security consultant has the knowledge needed to provide services in vital areas of system, data, and application security. GIAC accreditations are acknowledged by companies and institutions around the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of certified consultants for any of the network security capabilities addressed within GIAC accreditation programs such as auditing perimeters, security incident handling, intrusion detection, and web services security. Read more information about Progent's GIAC Professional Expertise.
If you need computer security expertise, call Progent at 800-993-9400 or see Contact Progent.