Overview of Progent's Security Support Services
Progent's certified network security experts offer a wide selection of support services intended to help organizations of all sizes to detect and correct security vulnerabilities, defend against attacks, recover from any damage caused by a breakdown of protection, and comply with government requirements for guarding data and reporting incidents. Progent can deliver advanced help for critical security and recovery solutions such as AI-based End Point Protection and Response, MDR (Managed Detection and Response), complete system restore validation, immutable backup, and off-site backup.
Progent can provide a selection of service models:
- On-demand remote and on-premises support billed by the minute
- Continual managed services invoiced at an affordable flat monthly rate
- Value-priced service packages for a single security and compliance assessment
- Emergency ransomware recovery. Progent will submit a bid based on an assessment of the damage.
(If your network has been victimized by any strain of ransomware, don't panic. Get fast help by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
On-demand Security Consulting Services
Once you register for Progent's services (registration is free), you can receive on-demand remote or onsite assistance from one of Progent security consultant. This classic service model is primarily reactive and geared toward quickly taking care of IT issues that are disrupting your productivity or that have stymied your own support staff. Common examples are configuring a firewall or VPN tunnel, installing a vital security patch for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These services are billed to the nearest minute, which avoids the frustrating situation of getting large bills for fast repairs.
Delivery options for Progent's on-demand support services include:
- Remote Security Support Services
Most security-related problems can be handled remotely via a combination of phone-based support and a remote connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide remote security support by offering easy access to consultants who have the experience and technical resources to resolve many of the most challenging issues quickly, keeping your service costs affordable and reducing downtime.
- On-premises Security Services
For cases where on-premises assistance is required, Progent can dispatch a technical professional to major metropolitan areas across the United States. Progent can also dispatch a security specialist with high-level certifications and world-class skills to any site in the country.
Progent's accredited security engineers are certified to provide help for environments powered by Windows, Linux, Apple Mac, Solaris, and major versions of UNIX. Progent's broad selection of consulting services covers firewall technology, e-mail systems, protected network design, and data recovery. Progent's support team has been awarded the world's most advanced security accreditations including CISA and Certified Information Systems Security Professional. Progent also offers immediate access to online Cisco CCIE network infrastructure engineers who can provide advanced assistance with tough network technology issues.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates SentinelOne's cutting edge behavior-based machine learning technology to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and email phishing, which easily get by traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to automate the complete threat progression including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery powered by SentinelOne technology.
- ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Platforms
ProSight Reporting is a growing line of in-depth reporting plug-ins designed to work with the leading ticketing and remote network monitoring platforms including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and utilizes color coding to surface and contextualize key issues like spotty support follow-up or endpoints with missing patches. By exposing ticketing or network health concerns clearly and in near-real time, ProSight Reporting improves productivity, reduces management hassle, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring applications.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within a single agent accessible from a single control. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP deployment that addresses your company's unique needs and that helps you prove compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also assist your company to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
- ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of critical data, applications and VMs that have become lost or corrupted due to component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class expertise to set up ProSight DPS to be compliant with regulatory requirements such as HIPAA, FIRPA, and PCI and, whenever necessary, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security vendors to deliver centralized control and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for inbound email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local security gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.
- ProSight Duo MFA: Two-Factor Authentication
ProSight Duo is a suite of managed services incorporating top-ranked technology from Duo, a Cisco-owned company, to create two-factor authentication environments. 2FA utilizes an out-of-band endpoint to validate user identity, offering an additional layer of access security rather than just passwords. This counters the majority of cybersecurity break-ins like phishing, brute-force password attacks, and purloined personal credentials. Duo's push technology can save time and minimize annoyance by permitting users to prove their identity as easily as tapping "Approve" on the authentication prompt on their own personal device, which could be a smartphone, a smart watch, or other supported out-of-band endpoint. This single-click validation avoids the need to open an email or text and manually copy a security code. Find out more about Progent's ProSight Duo MFA multi-factor identity authentication services.
- ProSight WAN Watch: Network Infrastructure Management
Progent's ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to map, track, enhance and debug their networking appliances like routers and switches, firewalls, and access points plus servers, client computers and other networked devices. Using state-of-the-art RMM technology, ProSight WAN Watch makes sure that network diagrams are always current, captures and displays the configuration information of virtually all devices connected to your network, monitors performance, and generates alerts when issues are detected. By automating complex management and troubleshooting processes, WAN Watch can knock hours off common chores like making network diagrams, expanding your network, finding appliances that need important updates, or identifying the cause of performance problems. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progent's server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to keep your IT system operating at peak levels by tracking the state of critical computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alarm is sent immediately to your designated IT management staff and your Progent engineering consultant so any looming issues can be resolved before they have a chance to impact your network Find out more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hosting solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard data related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates or domains. By updating and managing your network documentation, you can save up to 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you're planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable way for small and mid-size organizations to get an objective assessment of the health of their network. Based on a selection of the top remote monitoring and management platforms available, and overseen by Progent's world-class group of IT professionals, ProSight Network Audits help you see how well the configuration of your core infrastructure assets adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI such as a cleaner Active Directory (AD) system. Both also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include simpler management, improved compliance with government and industry security standards, higher utilization of IT assets, quicker troubleshooting, more reliable backup and restore, and increased uptime. Learn more about ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service centered on a brief interview with a Progent backup/recovery consultant. The interview is intended to assess your company's preparedness to block or recover quickly after an assault by a ransomware variant like Ryuk, WannaCry, NotPetya, or Hermes. Progent will work with you personally to gather information concerning your existing antivirus tools and backup/recovery platform, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can follow best practices to build a cost-effective security and backup system that meets your company's needs. For more information, see The ProSight Ransomware Preparedness Report.
Set-price Security Assessment and Validation Bundles
Progent offers a variety of fixed-price security assessment packages that deliver high value by deploying Progent's enterprise-class network monitoring tools as well as Progent's consulting experience to create an objective and comprehensive assessment of your IT environment security posture.
- Security Inventory Service Bundles for Small Businesses
Progent offers two value-priced security inventory service packages designed to allow small organizations to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive assessment of your network from beyond your corporate firewall to identify possible gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan from an authorized machine within your corporate firewall to evaluate your exposure to inside assaults. The two security inventory scans are configured and executed from a secured external site. The project is administered by an engineer who has earned advanced security certifications and who creates a document that details and interprets the information captured by the security scan and recommend various enhancements where required.
- Security Vulnerability Evaluation Packages for Enterprises
Progent has developed three levels of set-price security evaluation service bundles designed for enterprises who want to meet security standards required by state or industry agencies. Progent's security evaluation service bundles offer larger organizations a chance to obtain a professional assessment at the strength of their security posture. For each security evaluation bundle, Progent consultants with top security credentials analyze and report on captured data and provide suggestions for cost-effective improvements. Each of the network security assessment packages include an added-cost option for onsite engineers anywhere in the U.S.
- Expertise with Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that supports repeated, simultaneous, programmable testing of your network so you can uncover, rank, fix, and verify cybersecurity weaknesses before threat actors can take advantage of them. Progent offers the support of a NodeZero Certified Operator (NCO) who can help you to use NodeZero to carry out thorough pentests of your perimeter and your internal IT infrastructure so you can determine your current security profile. Progent can also help you to harden your network security and can assist you to design and implement a unified cybersecurity strategy that streamlines management and delivers optimum protection for on-premises, cloud-based, and perimeter IT assets. To learn more details about Progent's vulnerability analysis services powered by on NodeZero's penetration test platform, see Consulting Support for NodeZero's PEN Test Products.
- Stealth Penetration Testing Services
Stealth penetration testing, often referred to as PEN testing, is a vital technique for allowing organizations to determine how vulnerable their IT systems are to current-generation attacks. Progent's stealth penetration testing services check how well your existing security policies and technologies stand up to authorized but unannounced penetration attempts launched by Progent's experienced security experts using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
Download Progent's Security Services Overview Datasheet
To download a datasheet with an overview of Progent's services for network security, click:
Overview of Progent's Network Security Services (PDF - 511 KB).
Our System Has Been Hacked: What Do We Do Now?
If you are currently fighting a security crisis and you do not have a detailed response procedure, visit Progent's Online Technical Help to learn how to get fast help. Progent provides remote technical support from skilled engineers and can refer problems to certified security specialists if necessary. Your organization does not need to be a registered Progent customer to receive urgent help for a security breakdown, but you can register as a Progent client ahead of time for free and your standing as a registered client can save precious time in a crisis.
Typically, smaller companies have not documented a response procedure in case of a successful attack. This is not good, because the cost of a serious security attack can be more devastating for a small company than for a big corporation. Progent's security specialists can help your you to design a practical recovery and incident reporting plan that minimizes the IT system disruption resulting from a security breach. The step-by-step incident response procedure promoted by Global Information Assurance Certification is Progent's recommended procedure for reacting to a serious security penetration.
High-value Security Expertise Offered by Progent
Progent's certified security engineers can provide world-class consulting in key facets of computer protection such as:
- Information Risk Evaluation and Security Compliance Assessment
Progent offers expertise with security evaluation tools such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive system tests to identify potential security problems. Progent has extensive experience with scanning utilities and can help you to understand assessment results and react efficiently. Progent's certified security engineers also offer web software testing and can perform expert evaluation of corporate-wide security to verify your organization's compliance with major global security specifications including FISMA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless protection including fixed wireless equipment plus portable handsets. Read additional information concerning Progent's Security Vulnerability Evaluation and Security Compliance Assessment.
- Planning, Implementing, and Testing Protected Environments
Every business should develop a carefully considered security plan that includes both proactive and responsive steps. The proactive plan is a set of precautions that helps to minimize security holes. The post-attack plan defines activities to help security personnel to inventory the losses caused by an attack, remediate the damage, record the experience, and restore business functions as quickly as feasible. Progent can show you how to design security into your company operations, set up auditing utilities, create and implement a secure IT infrastructure, and recommend processes and policies to optimize the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, design safe online and mobile access to email and files, and install an effective VPN. If you are interested in an economical way for jobbing out your security management, Progent's 24x7 Network Support Services include automated online network tracking and quick response to emergencies.
- System Recovery and Security Forensics
Progent provides expertise in restoring networks and servers that have been hacked, are in question, or have ceased to function following a security attack. Progent can show you how to assess the losses caused by the attack, restore normal business operations, and retrieve information lost as a result of the assault. Progent's security specialists can also manage a thorough failure evaluation by going over event logs and using a variety of proven assessment tools. Progent's experience with security issues minimizes your downtime and allows Progent to recommend efficient measures to prevent or contain future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower Services configuration and troubleshooting support.
- Additional Firewall and Virtual Private Network (VPN) Technologies Provided by Progent
In addition to offering support for a broad range of protection technologies available from Microsoft and Cisco, Progent offers small businesses expert consulting for security products from other major firewall and Virtual Private Network vendors by delivering services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of data collected in security event logs created by a wide range of sources including network appliances, operating systems, and application software and tools. SIEM software analyzes the security event records from these diverse sources and produces summary reports of security incidents as required by government regulations and business compliance standards. Progent's GIAC-certified network security experts and Cisco-certified network infrastructure experts can assist businesses to design, deploy and manage a SIEM system that enables them to see the progress of attacks and comply with security incident reporting regulations. (Visit Progent's SIEM solutions.)
- Patch Management Services
Patch management entails applying software updates to operating systems and apps, physical and virtual servers and endpoint devices, peripherals like printers and scanners, network appliances such as switches and wireless APs, and Internet-of-Things (IoT) devices such as sensors and robotics. Timely and correctly managed updating maximizes cybersecurity, regulatory compliance, uptime, and capability. Haphazard software update management can result in security vulnerabilities, compatibility problems, slow or erratic performance, excessive offline stretches, or unavailability of important functions. Progent's managed services for software and firmware patch management offer organizations of all sizes a flexible and cost-effective option for assessing, validating, scheduling, applying, and documenting software and firmware updates to your dynamic IT network. (Visit Progent's software update management service plans.)
Progent's Security Certifications
Progent's security consultants have earned some of the most prestigious certifications offered in the security industry. All of these accreditations require exhaustive examinations and proven work experience to guarantee that candidates have mastered a significant amount of security knowledge and techniques and can provide advanced solutions to information environments of any size.
- Certified Information Security Manager Security Support Services
Certified Information Security Manager (CISM) defines the basic competencies and international benchmarks of performance that information technology security managers are expected to achieve. It provides executive management the confidence that consultants who have been awarded their accreditation possess the experience and skill to offer effective security management and consulting support. Progent can provide a CISM-certified support professional to assist your organization in key security disciplines including information protection governance, vulnerability assessment, information protection program control, and incident handling management. Get more information about Progent's Certified Information Security Manager Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP accreditation as a result of verified experience, rigorous study, and formal examination. CISSP Certification recognizes mastery of a worldwide standard for information security. ANSI has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management practices, security design and test systems, access control methodology, applications development security, operations security, hardware security, cryptography, telecommunications, network security, and disaster recovery planning. Learn more details about Progent's CISSP Support Expertise.
- CISSP-ISSAP Security Architecture Consulting Services
Progent's CISSP-ISSAP Certified cybersecurity architecture consultants have been awarded ISSAP certification after thorough testing and extensive hands-on work with network security design. ISSAP security experts have acquired comprehensive knowledge of access management mechanisms and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's CISSP-ISSAP-premier security specialists can help your company with all aspects of architecture security. Get the details concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Assistance.
- CISA Consulting Services
The CISA credential is an important qualification that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive test given by the ISACA professional association. Progent can provide the expertise of a CISA-Certified security engineer trained to help businesses in the areas of information systems audit services, IT administration, systems and infrastructure planned useful life, IT support, safeguarding information resources, and business continuity planning. Learn additional details about Progent's Certified Information Systems Auditor Support Services.
- CRISC-certified Risk Management Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and support information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to create and execute a business continuity plan that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's network risk management services are complementary to the services available from Progent's CISA-Premier security engineers for objectively evaluating your IT control design and also with the services of Progent's CISM-certified consultants for defining company-wide security policies and procedures. Find out more details concerning Progent's CRISC Network Risk Management Expertise.
- GIAC Support Expertise
GIAC was founded in 1999 to validate the skill of information technology security professionals. GIAC's mission is to make sure that a certified professional possesses the knowledge appropriate to deliver support in key areas of network, information, and program security. GIAC certifications are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent can provide the support of GIAC certified security engineers for all of the network security disciplines covered under GIAC accreditation programs including assessing security systems, security incident response, intrusion detection, and web services security. Find out additional details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Assistance.
Contact Progent for Computer Security Expertise
If you need network security support services, call Progent at 800-993-9400 or refer to Contact Progent.