Overview of Progent's Security Support Services
Progent's certified network security and compliance consultants offer a broad selection of services designed to assist businesses of any size to uncover and correct security weaknesses, defend against malicious attacks, remediate the issues caused by a breakdown of security, and meet government mandates for protecting data and reporting security incidents. Progent can provide expert support for critical security and recovery technologies like AI-driven EDR (End Point Protection and Response), MDR (Managed Detection and Response), complete system restore validation, immutable backup, and off-site backup.
Progent offers a choice of service delivery models:
- On-demand remote and on-premises assistance billed to the nearest minute
- Continual managed services invoiced at an affordable fixed monthly rate
- Set-price service bundles for a single security evaluation
- Emergency ransomware response. Progent will propose a bid based on an evaluation of the extent of the damage.
(If your network has been breached by any strain of crypto-ransomware, do not panic. Get immediate assistance by contacting Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
On-demand Security and Compliance Consulting Services
Once you sign up for Progent's services (registration is free), you can get as-needed remote or onsite support from one of Progent security and compliance expert. This traditional support model is essentially reactive and geared toward rapidly resolving technical problems that are disrupting your network or that have stymied your in-house support personnel. Common examples are replacing a firewall appliance or VPN connection, installing a critical security update for a Cisco switch, setting up secure access to cloud-based resources, or recovering from a ransomware attack. These services are billed by the minute, which eliminates the frustrating situation of getting big bills for fast repairs.
Delivery options for Progent's on-demand support include:
- Online Security Support Services
The majority security-related issues can be resolved remotely through a combination of phone-based support and a remote connection between Progent's Technical Response Center (TRC) and a client's network. Progent's Technical Response Center can provide remote security support by offering efficient access to consultants who have the background and resources to fix many of the most difficult issues quickly, making your support expenses affordable and reducing downtime.
- Onsite Security Support Services
For cases where on-premises support is required, Progent can dispatch a technical professional to major metropolitan areas throughout the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any site in the U.S.
Progent's accredited security engineers are premier to support systems powered by Windows, Linux, Apple Mac, Sun, and major derivatives of UNIX. Progent's broad range of services addresses firewall configuration, email and messaging systems, protected system design, and data restoration. Progent's support staff has earned the industry's most advanced security certifications including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional. Progent also offers immediate access to online Cisco-certified CCIE network infrastructure engineers who can provide advanced assistance with complex network configuration problems.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates SentinelOne's next generation behavior analysis technology to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily escape traditional signature-based anti-virus products. ProSight ASM protects local and cloud resources and provides a unified platform to manage the entire threat lifecycle including filtering, infiltration detection, mitigation, remediation, and forensics. Key features include one-click rollback using Windows VSS and automatic network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, reseller, and integrator. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense based on SentinelOne technology.
- ProSight Reporting: In-depth Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is a growing family of real-time and in-depth reporting utilities designed to work with the industry's top ticketing and network monitoring applications including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and features color coding to surface and contextualize critical issues such as inconsistent support follow-through or endpoints with missing patches. By exposing ticketing or network health problems concisely and in near-real time, ProSight Reporting improves productivity, reduces management overhead, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to plan and configure a ProSight ESP environment that meets your organization's specific requirements and that allows you prove compliance with legal and industry information protection standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate attention. Progent's consultants can also help your company to set up and test a backup and restore system like ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates your backup activities and enables fast recovery of critical data, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-pr1mises storage device, or mirrored to both. Progent's BDR specialists can deliver advanced support to configure ProSight Data Protection Services to be compliant with regulatory standards such as HIPAA, FINRA, and PCI and, when needed, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the technology of leading data security vendors to deliver centralized control and comprehensive protection for your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.
- ProSight Duo MFA: Two-Factor Authentication
ProSight Duo is a suite of managed service plans incorporating industry-leading cybersecurity technology developed by Duo, a Cisco company, to build two-factor authentication (2FA) solutions. 2FA utilizes an outside-channel endpoint to confirm identity, offering an additional level of access security rather than merely passwords. This protects against the most common causes of IT security break-ins such as phishing, brute-force password guessing, and purloined personal credentials. Duo's push capability can save time and reduce frustration by permitting users anywhere to confirm their identity simply by clicking "Approve" on the authentication prompt on their unique endpoint, which can be an Android or iOS smartphone, a watch, or other compatible out-of-band endpoint. This single-click validation avoids the need to find an email or text message and transcribe a security passcode. Learn more about Progent's ProSight Duo MFA multi-factor authentication services.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progent's ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for smaller businesses to map out, monitor, optimize and troubleshoot their connectivity hardware such as routers and switches, firewalls, and access points as well as servers, printers, client computers and other networked devices. Incorporating cutting-edge Remote Monitoring and Management technology, ProSight WAN Watch makes sure that infrastructure topology diagrams are always updated, copies and manages the configuration information of virtually all devices connected to your network, monitors performance, and generates notices when problems are detected. By automating complex management activities, ProSight WAN Watch can cut hours off common chores like network mapping, expanding your network, finding appliances that need critical software patches, or isolating performance problems. Learn more details about ProSight WAN Watch infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your network running at peak levels by tracking the state of critical computers that power your information system. When ProSight LAN Watch detects an issue, an alarm is sent immediately to your designated IT management personnel and your Progent consultant so all potential issues can be addressed before they have a chance to disrupt your network Learn more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be moved immediately to an alternate hardware solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time spent trying to find critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether you're making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable alternative for small and mid-size businesses to get an objective assessment of the health of their IT system. Based on some of the top remote monitoring and management tools available, and overseen by Progent's certified team of information technology experts, ProSight Network Audits show you how well the deployment of your core network assets conform to best practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI like a more manageable Active Directory (AD) system. Both also include a year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier management, better compliance with data security requirements, more efficient utilization of network resources, faster problem resolution, more dependable backup and recovery, and less downtime. See more information about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is an affordable service based on a phone interview with a Progent information assurance consultant. The fact-finding interview is intended to evaluate your company's preparedness to block or recover quickly after an assault by a ransomware variant like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to collect information about your existing security profile and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow best practices to build a cost-effective AV and backup/recovery environment that meets your company's needs. For additional information, see The ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Verification Bundles
Progent offers a variety of set-price security assessment bundles that provide high value by utilizing Progent's advanced network monitoring and analysis tools plus Progent's technical skills to create an unbiased and thorough assessment of your IT environment security posture.
- Security Assessment Service Bundles for Small Organizations
Progent offers two value-priced security inventory scanning packages intended to enable small businesses to obtain a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your IT system from outside your firewalled perimeter to determine potential risks in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized computer within your company firewall to assess your vulnerability to internal assaults. The two security inventory services are set up and run from a secured external site. The project is managed by a consultant who has been awarded high-level security certifications and who produces a document that describes and evaluates the information captured by the security scan and recommend various enhancements where appropriate.
- Security Vulnerability Assessment Packages for Enterprises
Progent has developed three levels of flat-rate security assessment service bundles designed for large organizations who want to meet compliance standards required by government or industry agencies. Progent's security assessment service bundles offer larger organizations a chance to get an objective look at the strength of their security profile. For every security evaluation package, Progent consultants with advanced security credentials analyze and report on captured data and provide suggestions for efficient improvements. Each of the network security audit packages include an extra-cost option for onsite engineers anywhere in the United States.
- Consulting Services for Horizon3.ai's NodeZero Pentest Platform
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) product family that supports continuous, simultaneous, automated testing of your network to help you expose, rank, fix, and confirm security weaknesses before threat actors can take advantage of them. Progent offers the skills of a NodeZero Certified Operator (NCO) who can assist you to deploy NodeZero to carry out comprehensive penetration tests of your perimeter and your internal IT infrastructure in order to determine your present security posture. Progent's NodeZero experts can also help you to harden your network security and can assist you to plan and implement a unified cybersecurity ecosystem that streamlines management and provides optimum protection for on-premises, cloud-based, and perimeter IT assets. To learn additional details about Progent's vulnerability assessment solutions powered by on NodeZero's pentest products, see Consulting Support for NodeZero's Penetration Test Platform.
- Stealth Penetration Testing
Stealth penetration testing, often known as PEN testing, is a critical technique for helping businesses to find out how vulnerable their IT environments are to current-generation attacks. Progent's stealth penetration testing test how effectively your corporate security procedures and platforms resist authorized but unannounced intrusion attempts managed by Progent's veteran security specialists using advanced hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
Download Progent's Security Services Overview Datasheet
To download a datasheet with an overview of Progent's services for network security, click:
Overview of Progent's IT Security Services (PDF - 511 KB).
Our Network Has Been Hacked: What Should We Do Now?
If your company is now experiencing a network security crisis and you have not prepared a detailed recovery procedure, visit Progent's Online Technical Help to see how to receive fast help. Progent provides remote help from experienced engineers and can escalate problems to certified security specialists if required. Your business does not need to be a registered Progent client to receive emergency support for a security breach, but you can sign up as a Progent customer in advance for free and your standing as a current client can save precious time in case of a crisis.
Usually, smaller businesses have no recovery procedure in case of a damaging security breach. This is risky, because the cost of a successful security assault can be even more catastrophic for a small business than for a big enterprise. Progent's security consultants can help your you to design a practical recovery and event reporting plan that reduces the network downtime resulting from an attack. The formal incident response model promoted by GIAC is Progent's preferred procedure for handling a serious security penetration.
Advanced Security Expertise Offered by Progent
Progent's certified consultants offer advanced support in key areas of IT compliance such as:
- Information Risk Evaluation and Security Compliance Assessment
Progent provides expertise with information risk evaluation software like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of comprehensive network scans to uncover potential security holes. Progent has broad skills with monitoring utilities and can assist your company to analyze audit results and respond efficiently. Progent's certified security engineers also provide web software validation and can conduct expert evaluation of corporate-wide security to validate your organization's compliance with key global security specifications including HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including fixed wireless equipment plus portable devices. Get more information concerning Progent's Information Risk Audits and Compliance Testing.
- Planning, Building, and Testing Secure Environments
Any company should develop a thoroughly thought out security strategy that includes both proactive and reactive activity. The proactive strategy is a collection of steps that works to minimize security holes. The post-attack strategy defines procedures to help security personnel to evaluate the damage resulting from a breach, remediate the damage, document the experience, and revive business functions as quickly as feasible. Progent can show you how to design security into your business processes, set up scanning software, define and build a safe computer architecture, and recommend procedures and policies to optimize the protection of your information system. Progent's security experts are ready to assist you to configure a firewall, deploy protected remote connectivity to email and data, and configure an effective virtual private network. If your company is looking for an affordable option for outsourcing your network security administration, Progent's Round-the-clock Monitoring Packages include automated remote system tracking and fast response to emergencies.
- Data Recovery and Security Forensics
Progent has skill in recovering networks and devices that have been hacked, are in question, or have failed as a result of a security breach. Progent can show you how to evaluate the losses caused by the assault, return your company to ordinary business operations, and retrieve information compromised owing to the breach. Progent's certified specialists can also perform a comprehensive forensic evaluation by going over activity logs and utilizing other proven forensics techniques. Progent's experience with security consulting reduces your off-air time and allows Progent to recommend effective measures to avoid or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your existing PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
- Additional Firewall and Virtual Private Network (VPN) Technologies Offered by Progent
As well as offering support for a wide array of security solutions available from Microsoft and Cisco, Progent offers small organizations top-level consulting for technologies from other major firewall and Virtual Private Network (VPN) vendors by offering services including:
- SIEM Solutions
Security information and event management (SIEM) applications and services are intended to digest the massive quantity of data represented by security incident records generated by a wide range of sources such as network appliances, operating systems, and applications and monitoring tools. SIEM software analyzes the security logs from these diverse sources and produces consolidated reports of security incidents as mandated by state regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco-certified network consultants can help businesses to design, install and manage a SIEM system that helps them to see the progress of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
- Patch Management Solutions
Software update management entails installing software updates to operating systems and applications, servers and endpoints, peripherals like printers and scanners, network appliances such as switches and Wi-Fi access points, and Internet-of-Things devices such as sensors and robotics. Prompt and correctly managed updating maximizes security, regulatory compliance, availability, and capability. Haphazard patch management can result in security vulnerabilities, compatibility issues, slow or erratic responsiveness, excessive offline stretches, or loss of key functions. Progent's support services for software and firmware patch management provide businesses of any size a flexible and cost-effective alternative for assessing, testing, scheduling, implementing, and tracking updates to your ever-evolving information system. (Visit Progent's software update management service plans.)
Progent's Security Certifications
Progent's security consultants have been awarded some of the most respected certifications available in the industry. All of these certifications demand exhaustive examinations and demonstrated work background to ensure that recipients have acquired expertise with a substantial body of security information and techniques and can offer high-level consulting to computer environments of any complexity.
- Certified Information Security Manager (CISM) Security Support Services
Certified Information Security Manager (CISM) defines the basic competencies and worldwide standards of performance that computer security professionals are required to achieve. CISM offers executive management the confidence that consultants who have earned their CISM possess the background and knowledge to offer effective security management and engineering support. Progent can provide a CISM-certified expert to help your organization in vital security areas including information protection governance, vulnerability management, information security process control, and incident handling management. Find out additional details about Progent's Certified Information Security Manager Security Support Services.
- CISSP Security Consulting Expertise
Progent's CISSP experts are security engineers who have been awarded CISSP accreditation through verified experience, extensive study, and formal examination. CISSP qualification indicates mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management procedures, security design and test systems, connection control methodology, applications development security, business processes security, hardware security, cryptography, communications, Internet security, and disaster recovery planning. Find out more details about Progent's CISSP Support Assistance.
- CISSP-ISSAP Security Architecture Consulting Services
Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP accreditation as a result of thorough examination and significant hands-on work with information security design. ISSAP consultants possess comprehensive knowledge of access control systems and techniques, telecommunications and network infrastructure protection, cryptography, requirements analysis, BCP and disaster recovery, and physical security. Progent's CISSP-ISSAP-certified security experts can assist your business with all phases of architecture security. Read the details concerning Progent's ISSAP Accredited Secure System Architecture Consulting Services.
- CISA Support Services
The CISA credential is a prestigious qualification that represents expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants pass an extensive test administered by the ISACA international professional group. Progent can provide the services of a CISA-Premier security audit professional trained to assist companies in the fields of information systems audit process, IT enforcement, network assets and infrastructure planned useful life, IT support, protecting information assets, and disaster recovery preparedness. Get more details about Progent's CISA Support Expertise.
- CRISC Network Risk Mitigation Experts
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, implement, and maintain information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk management expertise is a good fit the support available from Progent's CISA-Certified consultants for impartially auditing your IS management design and also with the expertise of Progent's CISM-certified consultants for designing company-wide security policies and procedures. Get additional information about Progent's CRISC Network Risk Management Services.
- GIAC Professional Services
Global Information Assurance Certification was founded in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to make sure that a certified professional possesses the knowledge appropriate to deliver support in critical categories of network, information, and software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent can provide the support of GIAC certified security engineers for any of the security services covered within GIAC certification programs such as assessing networks, security incident response, intrusion detection, and web services security. Get additional information concerning Progent's GIAC Support Services.
Depend on Progent for Computer Security Support
If you want network security engineering help, telephone Progent at 800-993-9400 or see Contact Progent.