Introduction to Progent's Security Consulting Services
Progent's industry certified network security and compliance experts can provide a wide range of services designed to help businesses of all sizes to identify and correct security vulnerabilities, block malicious attacks, recover from any damage resulting from a breach of security, and meet government requirements for protecting data and reporting incidents. Progent offers a selection of service delivery modes:
As-needed Security and Compliance Consulting Services
- As-needed online and on-site assistance invoiced by the minute
- Continual fully managed services invoiced at a low fixed monthly fee
- Value-priced service bundles for a one-time security assessment
Once you register for Progent's services (registration is free), you can get as-needed remote or onsite assistance from a Progent security expert. This traditional service model is essentially reactive and geared toward rapidly resolving IT problems that are affecting your productivity or that have stymied your own support personnel. Common examples include configuring a firewall appliance or VPN tunnel, implementing a critical security patch for a Cisco switch, designing compliant access to a public cloud, or recovering from a ransomware assault. These services are billed by the minute, which eliminates the annoying situation of getting large bills for fast fixes.
Delivery alternatives for Progent's as-needed support include:
Progent's security consultants are certified to provide help for systems powered by Microsoft Windows, Linux, Apple Mac, Solaris, and popular derivatives of UNIX. Progent's broad array of services covers firewall technology, e-mail systems, protected system design, and data recovery. Progent's technical support staff has been awarded the industry's most advanced security credentials including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional. Progent also offers fast access to remote Cisco CCIE network consultants who can deliver advanced support with tough network configuration problems.
- Online Security Support
The majority security issues can be resolved online via a mix of phone-based help and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver online security support by offering easy access to consultants with the background and technical resources to resolve some of the most challenging problems quickly, making your support costs affordable and minimizing lost productivity.
- On-premises Security Support Services
For instances where on-premises assistance is necessary, Progent can send a technical professional to major metropolitan areas across the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any location in the country.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the complete threat lifecycle including blocking, infiltration detection, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering via cutting-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP environment that addresses your company's unique needs and that allows you prove compliance with government and industry information security regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates your backup activities and enables rapid restoration of vital data, apps and virtual machines that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPAA, FINRA, and PCI and, when necessary, can help you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security companies to deliver web-based control and world-class security for all your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your vulnerability to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for smaller businesses to diagram, monitor, optimize and debug their connectivity appliances such as routers and switches, firewalls, and load balancers as well as servers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch ensures that network maps are kept current, captures and manages the configuration information of almost all devices connected to your network, tracks performance, and sends notices when potential issues are detected. By automating time-consuming management and troubleshooting processes, WAN Watch can knock hours off common chores such as network mapping, reconfiguring your network, finding devices that require critical software patches, or identifying the cause of performance bottlenecks. Learn more details about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to help keep your network running at peak levels by tracking the state of vital assets that drive your information system. When ProSight LAN Watch uncovers an issue, an alarm is sent automatically to your specified IT staff and your Progent consultant so all potential issues can be addressed before they can impact your network Find out more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard data about your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and managing your IT documentation, you can save as much as half of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre making enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost alternative for small and medium-size businesses to obtain an unbiased assessment of the overall health of their information system. Powered by a selection of the top remote monitoring and management (RMM) tools available, and supervised by Progent's certified team of IT experts, ProSight Network Audits help you see how well the configuration of your essential network assets adhere to leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI like a cleaner Active Directory (AD) system. Both also include one year of advanced remote network monitoring and management. Benefits can include simpler management, better compliance with government and industry security regulations, more efficient utilization of network resources, faster problem resolution, more reliable backup and restore, and less downtime. See more about ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is a low-cost service centered on a phone discussion with a Progent backup/recovery consultant. The fact-finding interview is designed to help assess your company's ability either to stop or recover quickly after an assault by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you directly to collect information concerning your existing security profile and backup platform, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply best practices to deploy a cost-effective AV and backup system that aligns with your business needs. For details, visit The ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Validation Bundles
Progent has put together a variety of set-price security evaluation packages that deliver high value by utilizing Progent's enterprise-class network monitoring software plus Progent's consulting skills to produce an objective and comprehensive assessment of your IT environment security posture.
Our System Has Been Hacked: What Can We Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory scanning service packages designed to enable small businesses to get an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your network from beyond your corporate firewall to identify potential gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan using an authorized computer inside your company firewall to assess your vulnerability to internal attacks. The two security inventory scans are configured and run from a secured offsite location. The scan is administered by a consultant who has earned advanced security certifications and who produces a document that details and evaluates the data collected by the security scan and recommend practical improvements where required.
- Security Vulnerability Assessment Bundles for Large Organizations
Progent has developed three levels of set-price security evaluation service bundles intended for enterprises who need to meet compliance standards required by government or industry regulators. Progent's security evaluation service bundles offer larger organizations an opportunity to obtain an objective assessment at the viability of their security profile. For each security evaluation package, Progent consultants with top security credentials study and report on captured data and offer suggestions for efficient remediation. All the network security assessment packages include an added-cost option for on-premises consultants at any location in the United States.
- Stealth Penetration Testing
Stealth penetration testing, often called PEN testing, is a vital tool for allowing businesses to find out how vulnerable their IT systems are to current-generation threats. Progent's stealth penetration testing services test how effectively your existing security policies and platforms resist authorized but unannounced penetration attempts launched by Progent's certified security experts using advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If your company is now faced with a security crisis and you do not have a detailed response procedure, visit Progent's Remote Computer Help to learn how to receive fast assistance. Progent provides remote help from experienced engineers and can refer trouble tickets to certified security experts if necessary. Your business does not have to be a current Progent customer to get emergency support for a security breach, but you can sign up as a Progent customer ahead of time for free and your standing as a current client could save precious time during a crisis.
Usually, smaller organizations do not have a recovery plan in case of a damaging penetration. This is not good, because the cost of a successful security attack can be even more devastating for a small company than for a big enterprise. Progent's security engineers can help your company to design an efficient recovery and incident reporting procedure that minimizes the network disruption following a security breach. The formal post-attack handling model outlined by Global Information Assurance Certification is Progent's preferred procedure for handling a serious security incident.
Advanced Security Services Offered by Progent
Progent's certified consultants can provide world-class consulting in key areas of computer protection such as:
Progent's Security Accreditations
- Security Vulnerability Evaluation and Security Compliance Assessment
Progent offers experience with information risk auditing tools like Microsoft Baseline Security Analyzer and LANguard for performing a set of comprehensive network tests to reveal potential security problems. Progent has broad skills with monitoring utilities and can help your company to understand assessment results and respond appropriately. Progent's certified security consultants also can perform web software testing and can conduct expert assessments of enterprise-wide security to determine your company's compliance with major global security standards including FISMA, NIST, and ISO 17799. In addition, Progent can assess the strength of your wireless security including fixed wireless appliances as well as mobile handsets. Find out more details about Progent's Vulnerability Evaluation and Compliance Assessment.
- Designing, Implementing, and Testing Secure Environments
Every business ought to have a carefully thought out security strategy that incorporates both preventive and responsive steps. The proactive strategy is a set of precautions that helps to minimize security holes. The reactive plan specifies procedures to assist security personnel to assess the losses resulting from an attack, remediate the damage, document the experience, and restore business activity as soon as possible. Progent can advise you how to design protection into your business processes, install scanning utilities, define and implement a secure IT architecture, and propose procedures and policies to optimize the safety of your information system. Progent's security professionals are available to assist you to configure a firewall, design safe online and mobile access to email and data, and install an efficient virtual private network (VPN). If you are looking for an affordable way for jobbing out your security administration, Progent's 24x7 Network Support Services include non-stop remote network tracking and fast response to problems.
- Data Recovery and Security Forensics
Progent has expertise in restoring networks and devices that have been compromised, are suspect, or have ceased to function because of a security attack. Progent can help assess the damage caused by the breach, return your company to normal functions, and recover data compromised owing to the attack. Progent's security specialists can also perform a thorough forensic evaluation by going over activity logs and using other proven forensics techniques. Progent's experience with security consulting minimizes your downtime and allows Progent to propose efficient strategies to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower configuration and troubleshooting services.
- Additional Firewall and Virtual Private Network Consulting Services Offered by Progent
In addition to supporting a broad array of protection technologies available from Microsoft and Cisco, Progent can provide small and mid-size organizations expert consulting for products from other major firewall and Virtual Private Network vendors by providing services such as:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) applications and services are intended to digest the massive quantity of information collected in security incident logs created by a wide range of sources including network infrastructure appliances, servers, and applications and tools. SIEM applications analyzes the security event records from these diverse sources and creates summary reports of security incidents as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco-certified network infrastructure consultants can assist organizations to plan, install and manage a SIEM solution that enables them to understand the progress of security incidents and comply with security incident reporting regulations. (Visit Progent's Security information and Event Management solutions.)
Progent's security professionals have been awarded some of the most prestigious accreditations offered in the security industry. All of these certifications require extensive testing and proven work experience to guarantee that candidates have mastered a substantial amount of security knowledge and techniques and can provide advanced security solutions to information environments of any size.
Get in Touch with Progent for Network Security Help
- Certified Information Security Manager Security Support Expertise
Certified Information Security Manager (CISM) identifies the basic competencies and international standards of performance that IT security professionals are required to master. It provides executive management the confidence that those who have been awarded their certification have the background and skill to offer effective security administration and engineering services. Progent can provide a CISM-certified expert to help your organization in key security areas such as data protection governance, risk assessment, information security program control, and crisis response management. Find out more information concerning Progent's Certified Information Security Manager Security Consulting Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP accreditation as a result of verified professional work, extensive study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for IT security. ANSI has granted the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security management procedures, security architecture and test systems, access control methodology, applications development security, operations security, hardware security, encryption, communications, network security, and business continuity planning. Find out the details about Progent's CISSP Consulting Expertise.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP Premier security architecture experts have been awarded ISSAP certification after rigorous testing and significant experience. field experience with network security architecture. ISSAP security experts have in-depth knowledge of access control systems and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security integration. Progent's CISSP-ISSAP-premier security consultants can help your company with all phases of architecture security. Find out additional information about Progent's ISSAP Accredited Protected Network Infrastructure Consulting Support.
- Certified Information Systems Auditor (CISA) Consulting Services
The CISA credential is an important achievement that signifies mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an exhaustive examination given by the ISACA professional association. Progent offers the expertise of a CISA-Premier security audit professional trained to help businesses in the areas of IS audit services, information technology enforcement, systems and architecture lifecycle, IT support, safeguarding information assets, and disaster recovery preparedness. Find out the details about Progent's Certified Information Systems Auditor (CISA) Professional Assistance.
- CRISC IT Risk Mitigation Specialists
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and maintain information system controls to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's risk management services are complementary to the services provided by Progent's CISA-Certified security engineers for impartially evaluating your IT control mechanisms and also with the services of Progent's CISM-certified consultants for defining security policies and procedures. Read additional information concerning Progent's CRISC-certified Risk Management Services.
- GIAC (Global Information Assurance Certification) Support Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to verify that a certified professional has the knowledge appropriate to provide support in key categories of network, data, and application security. GIAC certifications are acknowledged by companies and institutions around the world including and the United States NSA. Progent can provide the assistance of certified consultants for any of the security disciplines covered under GIAC accreditation programs including auditing networks, incident handling, traffic analysis, and web-based application security. Read more information about Progent's GIAC Professional Services.
If you're trying to find computer security expertise, telephone Progent at 800-993-9400 or go to Contact Progent.