Overview of Progent's Security Support Services
Progent's certified network security consultants can provide a wide range of services intended to help companies of any size to identify and eliminate security vulnerabilities, defend against malicious attacks, recover from any damage resulting from a breach of protection, and comply with government mandates for protecting information and reporting security incidents. Progent can provide a choice of service models:

  • On-demand remote and on-premises assistance invoiced by the minute
  • Continual fully managed services billed at an affordable fixed monthly fee
  • Set-price service bundles for a one-time security assessment
As-needed Security and Compliance Support Services
Once you register for Progent's services (registration is free), you can get on-demand online or on-premises support from one of Progent security and compliance consultant. This traditional service model is essentially reactive and optimized for rapidly taking care of technical issues that are affecting your productivity or that have stumped your in-house support personnel. Typical examples are replacing a firewall appliance or VPN connection, installing a critical security update for a Cisco switch or router, designing compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are invoiced by the minute, which avoids the annoying situation of receiving big invoices for quick repairs.

Delivery alternatives for Progent's as-needed support include:

  • Remote Security Services
    The majority security issues can be handled online via a combination of phone-based support and an connection between Progent's Technical Response Center (TRC) and a client's network. Progent's TRC group can provide online security support by offering efficient access to consultants with the experience and technical resources to resolve many of the most challenging problems quickly, keeping your support expenses affordable and minimizing lost productivity.
  • Onsite Security Support Services
    For cases where onsite assistance is required, Progent can send a technical professional to major cities throughout the United States. Progent can also dispatch a security specialist with top certifications and advanced skills to any location in the U.S.
Progent's security engineers are premier to support systems powered by Microsoft, Linux, Apple Mac, Sun, and popular derivatives of UNIX. Progent's broad range of services addresses firewall configuration, e-mail security, protected network design, and data recovery. Progent's support staff has earned the industry's top security accreditations including Certified Information Systems Auditor and Certified Information Systems Security Professional. Progent also offers fast access to online Cisco-certified CCIE network infrastructure engineers who can provide advanced support with tough network configuration problems.

ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:

  • ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to automate the complete malware attack lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
    ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent managed from a single console. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP environment that meets your company's unique needs and that helps you demonstrate compliance with legal and industry information security standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent can also assist your company to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

  • ProSight Data Protection Services: Managed Cloud Backup and Recovery
    ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and enables fast recovery of critical files, apps and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Backup.

  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to provide web-based management and comprehensive protection for your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a further layer of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to map out, monitor, optimize and troubleshoot their connectivity hardware such as routers and switches, firewalls, and access points plus servers, printers, client computers and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network diagrams are always updated, captures and manages the configuration of almost all devices on your network, tracks performance, and sends notices when potential issues are discovered. By automating complex management and troubleshooting processes, ProSight WAN Watch can knock hours off ordinary chores such as network mapping, reconfiguring your network, locating devices that require critical software patches, or identifying the cause of performance issues. Learn more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management (RMM) technology to help keep your network operating at peak levels by tracking the health of critical computers that power your business network. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your designated IT personnel and your Progent engineering consultant so all looming problems can be addressed before they can disrupt your network Learn more details about ProSight LAN Watch server and desktop remote monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved immediately to a different hosting solution without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By updating and managing your network documentation, you can eliminate up to half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost way for small and medium-size businesses to get an objective assessment of the overall health of their information system. Powered by some of the leading remote monitoring and management (RMM) platforms available, and supervised by Progent's world-class group of IT experts, ProSight Network Audits show you how closely the deployment of your essential network assets adhere to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate benefits like a more manageable Active Directory (AD) environment. Both versions also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include lower-cost management, improved compliance with government and industry security standards, more efficient utilization of IT assets, faster troubleshooting, more reliable backup and restore, and increased uptime. See more about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service based on a phone discussion with a Progent backup/recovery expert. The interview is intended to help assess your organization's preparedness either to block or recover quickly following an assault by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to collect information about your existing antivirus tools and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can apply best practices to build a cost-effective AV and backup/recovery system that aligns with your company's requirements. For more information, see Progent's ProSight Ransomware Preparedness Report.

Fixed-price Security Evaluation and Validation Packages
Progent offers a number of flat-rate security and compliance evaluation bundles that provide exceptional value by deploying Progent's enterprise-class system monitoring and analysis software plus Progent's consulting experience to produce an objective and thorough assessment of your network security posture.

  • Security Inventory Service Packages for Small Organizations
    Progent offers two value-priced security inventory service packages intended to enable small organizations to get an objective security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT system from outside your firewalled perimeter to determine potential risks in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security expert executes a system scan using an authorized machine within your firewalled perimeter to assess your vulnerability to inside attacks. These two security inventory scans are set up and executed from a secured external site. The project is administered by a consultant who has been awarded high-level security certifications and who produces a document that details and evaluates the data captured by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Assessment Bundles for Large Businesses
    Progent has developed three levels of flat-rate security assessment service bundles intended for enterprises who need to meet security standards required by state or industry regulators. Progent's security assessment service bundles offer larger businesses a chance to obtain a professional assessment at the strength of their security posture. For each security assessment bundle, Progent engineers with advanced security credentials study and report on captured data and offer recommendations for efficient improvements. Each of the network security assessment packages include an added-cost option for on-premises engineers anywhere in the United States.
  • Stealth Penetration Testing Services
    Stealth penetration testing, often known as PEN testing, is an accepted tool for helping businesses to determine how open their network systems are to modern threats. Progent's stealth penetration testing services check how effectively your existing security procedures and platforms resist authorized but unannounced penetration attempts launched by Progent's certified security experts using cutting-edge hacking techniques. Read about Progent's stealth penetration testing (PEN Test) services.
Our Network Has Been Hacked: What Should We Do Now?
Network Security ConsultantsIf you are now faced with a security emergency and you have not prepared a formal recovery plan, refer to Progent's Remote Technical Support to find out how to get fast help. Progent provides remote technical support from experienced network technicians and can refer problems to certified security experts if required. Your business does not have to be a current Progent customer to get urgent help for a security problem, but you can register as a Progent customer in advance for free and your status as a current customer could save valuable time in case of an emergency.

Typically, smaller businesses have no recovery procedure in the event of a damaging attack. This is not good, because the cost of a successful security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security engineers can help your you to design an efficient response and event reporting procedure that minimizes the IT system downtime following an attack. The step-by-step incident response model promoted by Global Information Assurance Certification is Progent's suggested procedure for responding to a major security penetration.

High-value Security Services Offered by Progent
Progent's seasoned consultants can provide advanced support in vital areas of computer security including:

  • Vulnerability Evaluation and Security Compliance Testing
    Progent offers expertise with information risk auditing software like Microsoft Baseline Security Analyzer and LANguard for conducting a set of comprehensive system scans to reveal possible security problems. Progent has extensive skills with scanning utilities and can help your company to understand audit reports and react appropriately. Progent's security engineers also offer web software validation and can perform thorough assessments of enterprise-wide security to confirm your company's compliance with key worldwide security specifications including FISMA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless protection including stationary wireless appliances as well as portable devices. Learn additional details concerning Progent's Security Vulnerability Evaluation and Security Compliance Testing.
  • Designing, Building, and Testing Secure Networks
    Every organization ought to develop a thoroughly thought out security strategy that incorporates both preventive and reactive steps. The proactive strategy is a collection of steps that helps to reduce vulnerabilities. The post-attack strategy defines activities to help security staff to evaluate the losses caused by a breach, remediate the damage, document the event, and revive business functions as soon as feasible. Progent can show you how to design protection into your business processes, install scanning utilities, create and execute a safe IT architecture, and propose procedures and policies to maximize the protection of your computing environment. Progent's security professionals are ready to help you to configure a firewall, deploy secure offsite connectivity to e-mail and files, and configure an effective virtual private network (VPN). If your company is looking for an economical way for outsourcing your network security management, Progent's 24x7 Network Support Services feature continual remote network tracking and quick resolution of problems.
  • System Restoration and Failure Analysis
    Progent offers expertise in restoring systems and servers that have been hacked, are suspect, or have failed because of a security attack. Progent can help determine the losses caused by the breach, return your company to normal business operations, and retrieve information compromised owing to the event. Progent's security engineers can also perform a thorough forensic analysis by examining activity logs and utilizing other proven forensics tools. Progent's background with security problems minimizes your off-air time and allows Progent to suggest effective measures to prevent or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
    Cisco Certified CCIE Network Security SpecialistsThe new ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
  • Other Firewall and Virtual Private Network Consulting Services
    In addition to being expert in a broad range of network security technologies from Microsoft and Cisco, Progent offers small businesses top-level engineering services for products from other major firewall and VPN suppliers such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) applications and services are intended to interpret the enormous quantity of information represented by security event records generated by a wide range of sources such as network appliances, servers, and applications and monitoring tools. SIEM applications analyzes the security event records from these various sources and produces consolidated reports of security incidents as required by state regulations and industry compliance guidelines. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network infrastructure consultants can assist organizations to plan, install and manage a SIEM solution that enables them to see the behavior of security incidents and comply with security incident reporting regulations. (Visit Progent's SIEM solutions.)
Progent's Security Certifications
Progent's security engineers have been awarded some of the most respected certifications offered in the security industry. These accreditations require exhaustive testing and proven work experience to guarantee that candidates have mastered a substantial body of security knowledge and techniques and can provide high-level security solutions to computer environments of any complexity.
  • CISM Security Consulting Expertise
    Certified Information Security Manager (CISM) identifies the core skills and international standards of service that IT security professionals are required to achieve. It provides executive management the confidence that those who have been awarded their CISM possess the background and skill to provide efficient security management and engineering support. Progent can provide a CISM-certified consultant to help your organization in vital security disciplines such as information protection governance, vulnerability management, data protection program control, and incident response support. Learn more details about Progent's Certified Information Security Manager (CISM) Security Support Expertise.

  • CISSP Security Consulting Expertise
    Progent's CISSP consultants are security specialists who have been awarded CISSP certification through verified experience, rigorous study, and exhaustive testing. CISSP Certification indicates mastery of a worldwide standard for information security. ANSI has granted the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Areas of expertise covered within CISSP include security management practices, security design and models, connection permission methodology, applications development security, operations security, physical security, cryptography, communications, Internet security, and business continuity planning. Get the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.

  • CISSP-ISSAP} Security Architecture Consulting Support
    Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have been awarded ISSAP certification after thorough testing and extensive experience. field experience with information security architecture. ISSAP consultants have comprehensive understanding of access control mechanisms and methodologies, phone system and network security, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security experts can help your business with all aspects of secure network architecture. Find out additional information concerning Progent's ISSAP Accredited Protected System Infrastructure Consulting Assistance.

  • Certified Information Systems Auditor (CISA) Support Expertise
    The CISA credential is a recognized qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an exhaustive test given by the ISACA professional group. Progent offers the services of a CISA-Certified security consultant able to assist companies in the fields of information systems audit process, IT administration, systems and architecture planned useful life, information technology service delivery, safeguarding information resources, and disaster recovery planning. Learn additional information concerning Progent's Certified Information Systems Auditor Professional Expertise.

  • CRISC-certified Risk Mitigation Consultants
    The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's skills to plan, deploy, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's network risk management expertise is a good fit the services available from Progent's CISA-Premier consultants for objectively auditing your IT management design and with the expertise of Progent's CISM consultants for designing security policies. Get more details concerning Progent's CRISC-certified IT Risk Management Expertise.

  • GIAC Consulting Expertise
    GIAC was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to verify that a certified security consultant possesses the knowledge necessary to provide support in key categories of system, data, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States NSA. Progent offers the expertise of certified consultants for all of the network security disciplines addressed under GIAC certification programs including assessing security systems, security incident response, traffic analysis, and web services security. Read more details concerning Progent's GIAC Consulting Assistance.
Get in Touch with Progent for Network Security Consulting Services
If you need computer security help, call Progent at 800-993-9400 or go to Contact Progent.