Overview of Progent's Security and Compliance Support Services
Progent's industry certified computer security and compliance consultants offer a wide selection of services intended to assist organizations of all sizes to uncover and correct security vulnerabilities, block assaults, recover from any damage resulting from a breakdown of protection, and meet regulatory requirements for protecting information and reporting incidents. Progent offers a selection of service delivery models:
On-demand Security and Compliance Support Services
- As-needed online and on-site support invoiced to the nearest minute
- On-going fully managed services invoiced at an affordable flat monthly rate
- Value-priced service packages for a one-time security assessment
Once you sign up for Progent's services (registration is free), you can receive as-needed remote or onsite assistance from one of Progent security consultant. This classic service model is primarily reactive and geared toward rapidly resolving technical issues that are impacting your network or that are beyond the scope of your own support staff. Common examples include debugging a firewall appliance or VPN connection, installing a critical security patch for a Cisco switch, designing compliant access to a public cloud, or recovering from a ransomware attack. These security services are billed by the minute, which eliminates the frustrating case of receiving large invoices for fast fixes.
Delivery alternatives for Progent's on-demand support services include:
Progent's accredited engineers are certified to support systems based on Microsoft, Linux, macOS and OS X, Sun Solaris, and popular derivatives of UNIX. Progent's wide range of consulting services addresses firewall expertise, email and messaging security, protected system design, and data restoration. Progent's technical support staff has been awarded the industry's most advanced security credentials including GIAC and Certified Information Systems Security Professional (CISSP). Progent also can provide fast access to online Cisco CCIE network consultants who can deliver world-class assistance with tough network technology problems.
- Remote Security Support
Most security-related issues can be resolved remotely via a combination of phone help and an Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver remote security help by offering easy access to consultants with the experience and resources to resolve some of the most challenging problems quickly, keeping your support costs low and reducing downtime.
- Onsite Security Services
For instances where onsite support is required, Progent can dispatch a technical professional to major metropolitan areas across the United States. Progent can also send a security consultant with high-level certifications and advanced skills to any site in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to defend endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely escape traditional signature-based AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to address the complete malware attack lifecycle including protection, detection, mitigation, remediation, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge technologies packaged within one agent managed from a unified control. Progent's data protection and virtualization experts can help you to plan and implement a ProSight ESP environment that meets your organization's unique needs and that allows you prove compliance with government and industry information security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require urgent attention. Progent can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates and monitors your backup processes and enables rapid recovery of vital files, applications and VMs that have become lost or damaged due to component breakdowns, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPAA, FIRPA, and PCI and, when needed, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security vendors to provide centralized control and world-class security for all your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, enhance and troubleshoot their connectivity hardware such as routers and switches, firewalls, and load balancers as well as servers, printers, client computers and other networked devices. Incorporating cutting-edge RMM technology, ProSight WAN Watch makes sure that network maps are always current, copies and manages the configuration information of virtually all devices on your network, monitors performance, and sends alerts when potential issues are discovered. By automating time-consuming management and troubleshooting processes, ProSight WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, finding appliances that need important software patches, or identifying the cause of performance issues. Learn more about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your IT system operating at peak levels by checking the health of critical computers that power your business network. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your designated IT management personnel and your assigned Progent consultant so all potential issues can be addressed before they can disrupt your network Learn more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be moved easily to a different hosting solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard data about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate as much as 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size businesses to get an unbiased assessment of the health of their IT system. Powered by a selection of the leading remote monitoring and management (RMM) tools in the industry, and overseen by Progent's world-class team of IT professionals, ProSight Network Audits show you how well the deployment of your core infrastructure devices conform to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide instant benefits like a cleaner Active Directory (AD) system. Both versions also include one year of advanced remote network monitoring and management (RMM). Benefits can include lower-cost network management, improved compliance with data security requirements, more efficient utilization of network assets, quicker troubleshooting, more reliable backup and recovery, and higher availability. Read more information about ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is an affordable service built around a phone discussion with a Progent backup/recovery consultant. The interview is intended to evaluate your company's ability either to block or recover quickly after an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you directly to gather information about your current security profile and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can follow industry best practices to build an efficient AV and backup system that meets your company's needs. For more information, visit The ProSight Ransomware Preparedness Report.
Fixed-price Security Assessment and Validation Packages
Progent offers a selection of set-price security and compliance evaluation packages that provide high value by utilizing Progent's advanced network monitoring software plus Progent's technical experience to create an unbiased and comprehensive assessment of your network security profile.
We've Been Hacked: What Do We Do Now?
- Security Inventory Service Bundles for Small Organizations
Progent offers two value-priced security inventory scanning service packages designed to allow small businesses to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your network from outside your corporate firewall to identify possible gaps in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant executes a system scan from an authorized machine within your company firewall to evaluate your vulnerability to internal assaults. These two security inventory services are set up and executed from a secured external site. The project is managed by an engineer who has been awarded advanced security certifications and who produces a document that details and evaluates the data collected by the security scan and recommend practical improvements where required.
- Security Vulnerability Assessment Bundles for Large Organizations
Progent offers three levels of set-price security assessment service bundles designed for enterprises who need to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer larger businesses an opportunity to get an objective look at the viability of their security profile. For every security assessment package, Progent consultants with advanced security credentials study and report on collected data and offer suggestions for efficient remediation. All the network security audit packages include an extra-cost option for onsite consultants anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, often known as PEN testing, is an accepted tool for allowing businesses to find out how open their IT systems are to modern threats. Progent's stealth penetration testing services test how well your existing security procedures and platforms resist authorized but unannounced penetration attempts launched by Progent's veteran security experts utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
If your business is now experiencing a network security crisis and you have no detailed recovery plan, go to Progent's Remote Computer Support to see how to receive immediate assistance. Progent provides remote assistance from skilled network technicians and can refer problems to certified security specialists if required. Your business does not have to be a current Progent customer to get urgent support for a security breakdown, but you can sign up as a Progent client ahead of time at no cost and your standing as a current client could save valuable time during an emergency.
Typically, smaller businesses do not have a response procedure in case of a damaging penetration. This is not good, because the cost of a serious security attack can be more devastating for a small company than for a large corporation. Progent's security specialists can help your business to create an effective response and event reporting procedure that minimizes the network downtime resulting from an attack. The formal incident handling procedure promoted by GIAC is Progent's suggested procedure for responding to a serious security incident.
Advanced Security Services Offered by Progent
Progent's veteran consultants offer world-class consulting in vital areas of computer compliance such as:
Progent's Security Accreditations
- Vulnerability Audits and Compliance Assessment
Progent provides experience with information risk evaluation software like MS Baseline Security Analyzer or LANguard for performing a variety of automatic network tests to identify potential security holes. Progent has extensive experience with these and similar tools and can help your company to understand assessment reports and react efficiently. Progent's certified security engineers also provide web software testing and can conduct expert assessments of enterprise-wide security to verify your company's compliance with major industry security standards such as HIPAA, PCI, and ISO. In addition, Progent can assess the strength of your wireless protection including fixed wireless appliances as well as portable handsets. Learn the details about Progent's Information Risk Audits and Compliance Testing.
- Planning, Building, and Validating Protected Networks
Every company ought to develop a thoroughly considered security plan that incorporates both proactive and reactive elements. The pre-attack plan is a collection of precautions that helps to reduce security holes. The post-attack plan specifies activities to assist security staff to evaluate the damage resulting from an attack, remediate the damage, record the event, and revive network functions as soon as feasible. Progent can advise you how to build security into your business processes, configure scanning utilities, define and execute a safe network architecture, and recommend processes and policies that will optimize the protection of your information system. Progent's security experts are ready to help you to configure a firewall, design protected offsite connectivity to e-mail and data, and configure an effective virtual private network (VPN). If you are looking for an affordable option for jobbing out your network security administration, Progent's Round-the-clock Monitoring Services include automated remote network tracking and immediate response to emergencies.
- System Restoration and Failure Analysis
Progent provides expertise in recovering systems and devices that have been hacked, are in question, or have stopped working following a security penetration. Progent can help determine the losses caused by the attack, return your company to normal functions, and recover information lost owing to the attack. Progent's security engineers can also oversee a thorough forensic evaluation by going over event logs and using other advanced assessment techniques. Progent's background with security issues minimizes your downtime and permits Progent to suggest efficient measures to prevent or contain new attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
- Additional Firewall and VPN Solutions Provided by Progent
As well as supporting a wide array of protection technologies from Microsoft and Cisco, Progent can provide small and mid-size organizations top-tier engineering services for products from other important firewall and VPN suppliers by delivering services including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) applications and services are intended to interpret the massive amounts of data collected in security incident records generated by a wide range of sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM software analyzes the security event records from these diverse sources and creates consolidated reports of security events as mandated by state regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network experts can help businesses to plan, install and manage a SIEM system that helps them to understand the behavior of attacks and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's security engineers have been awarded some of the most prestigious certifications offered in the security industry. All of these certifications require extensive examinations and demonstrated field experience to guarantee that candidates have mastered a significant amount of security information and methodologies and can provide high-level security solutions to computer environments of any size.
Get in Touch with Progent for Network Security Expertise
- CISM Security Consulting Expertise
Certified Information Security Manager identifies the basic skills and international benchmarks of performance that information security managers are required to master. CISM offers business management the confidence that consultants who have been awarded their accreditation possess the experience and skill to offer effective security management and consulting services. Progent can offer a CISM-certified expert to help your organization in key security areas such as information security governance, vulnerability management, data protection program management, and crisis handling management. Find out additional information concerning Progent's CISM Security Support Services.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP consultants are security engineers who have earned CISSP accreditation through demonstrated experience, extensive study, and exhaustive examination. CISSP Certification indicates mastery of an international standard for IT security. ANSI has granted the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Areas of expertise included within CISSP include security management practices, security design and models, access control methodology, applications development security, operations security, hardware security, cryptography, communications, network security, and business continuity planning. Get more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified security architecture experts have been awarded ISSAP accreditation after rigorous examination and substantial experience. field experience with network security architecture. ISSAP consultants have in-depth knowledge of access management systems and techniques, phone system and network infrastructure security, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-premier security experts can help your company with all phases of architecture security. Find out the details about Progent's ISSAP Certified Secure Network Architecture Consulting Assistance.
- Certified Information Systems Auditor Support Services
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies mastery in IS security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants pass a comprehensive test administered by the ISACA professional group. Progent offers the expertise of a CISA-Certified security consultant trained to help businesses in the areas of IS audit services, information technology administration, network assets and architecture planned useful life, information technology support, safeguarding information assets, and disaster recovery planning. Read more details about Progent's CISA Professional Services.
- CRISC Network Risk Management Specialists
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's skills to design, implement, and support information system controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a business continuity plan that follows leading practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's risk mitigation expertise is complementary to the support available from Progent's CISA-Certified consultants for impartially evaluating your IS control mechanisms and with the services of Progent's CISM-certified experts for implementing company-wide security policies. Read additional information about Progent's CRISC Network Risk Management Services.
- Global Information Assurance Certification Support Services
GIAC was founded in 1999 to certify the skill of IT security professionals. GIAC's goal is to verify that a certified security consultant possesses the skills appropriate to deliver services in important categories of system, information, and application program security. GIAC certifications are acknowledged by companies and institutions around the world including and the United States National Security Agency (NSA). Progent offers the expertise of certified professionals for any of the security capabilities addressed under GIAC accreditation topics such as assessing IT infrastructure, security incident response, traffic analysis, and web services security. Learn additional information concerning Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
If you're trying to find security engineering help, phone Progent at 800-993-9400 or visit Contact Progent.