Overview of Progent's Security and Compliance Support Services
Progent's industry certified network security and compliance consultants can provide a broad selection of services intended to assist businesses of all sizes to identify and correct security weaknesses, block malicious attacks, recover from the damage resulting from a breakdown of protection, and meet government requirements for guarding information and reporting incidents. Progent can provide a choice of service delivery models:

  • On-demand online and on-site support billed to the nearest minute
  • Continual fully managed services billed at a low fixed monthly rate
  • Set-price service bundles for a one-time security assessment
On-demand Security Support Services
After you sign up for Progent's services (signing up is free), you can receive as-needed remote or on-premises support from a Progent security consultant. This traditional service model is primarily reactive and geared toward rapidly taking care of IT issues that are impacting your productivity or that are beyond the scope of your own support staff. Common examples are debugging a firewall appliance or VPN tunnel, installing a critical security update for a Cisco switch or router, designing compliant access to a public cloud, or restoring data after a ransomware assault. These security services are invoiced to the nearest minute, which eliminates the annoying case of getting big bills for fast fixes.

Delivery alternatives for Progent's on-demand support include:

  • Online Security Support Services
    Most security issues can be resolved remotely through a mix of phone-based support and a remote connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can provide remote security support by offering easy access to consultants with the background and resources to resolve some of the most challenging problems quickly, keeping your service expenses low and reducing lost productivity.
  • Onsite Security Services
    For cases where onsite assistance is necessary, Progent can send a technical expert to major cities throughout the U.S. Progent can also send a security specialist with top certifications and advanced skills to any site in the U.S.
Progent's accredited security engineers are certified to provide help for environments based on Microsoft Windows, Linux, macOS and OS X, Solaris, and popular versions of UNIX. Progent's wide array of services encompasses firewall expertise, e-mail systems, secure system design, and data restoration. Progent's technical support staff has been awarded the industry's most advanced security credentials including Certified Information Systems Auditor (CISA) and Information System Security Architecture Professional (ISSAP). Progent also can provide immediate access to online Cisco CCIE network infrastructure consultants who can deliver advanced support with complex network technology issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
    ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based machine learning technology to guard endpoints and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to address the entire malware attack lifecycle including filtering, detection, mitigation, cleanup, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
    ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering through cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP deployment that addresses your organization's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services so you can recover rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, apps and VMs that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
    ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security vendors to provide centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.

  • ProSight WAN Watch: Infrastructure Management
    Progentís ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and affordable for small and mid-sized businesses to diagram, monitor, reconfigure and debug their connectivity hardware like routers and switches, firewalls, and wireless controllers as well as servers, client computers and other networked devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network diagrams are always updated, captures and displays the configuration of virtually all devices connected to your network, monitors performance, and sends notices when issues are discovered. By automating tedious management and troubleshooting activities, ProSight WAN Watch can knock hours off common chores such as network mapping, expanding your network, finding appliances that need important software patches, or isolating performance issues. Learn more about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) technology to keep your network running at peak levels by checking the health of critical computers that power your information system. When ProSight LAN Watch uncovers an issue, an alarm is transmitted immediately to your specified IT management personnel and your assigned Progent engineering consultant so all potential problems can be resolved before they have a chance to disrupt productivity Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Because the system is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save up to half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and medium-size organizations to obtain an objective assessment of the overall health of their IT system. Powered by some of the top remote monitoring and management (RMM) tools available, and supervised by Progent's world-class team of information technology professionals, ProSight Network Audits help you see how closely the configuration of your essential infrastructure assets adhere to best practices. The Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate ROI such as a cleaner Active Directory environment. Both versions also come with a year of advanced remote network monitoring and management. Advantages can include lower-cost management, better compliance with government and industry security standards, more efficient utilization of IT resources, quicker troubleshooting, more reliable backup and restore, and higher availability. Read more about ProSight Network Audits IT infrastructure review.

The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief interview with a Progent information assurance expert. The fact-finding interview is designed to evaluate your organization's ability either to stop or recover quickly following an attack by a ransomware variant such as Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you personally to collect information about your existing security profile and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can apply industry best practices to deploy a cost-effective security and backup/recovery environment that meets your business needs. For details, visit Progent's ProSight Ransomware Preparedness Report.

Fixed-price Security Evaluation and Validation Bundles
Progent has put together a selection of flat-rate security evaluation bundles that deliver exceptional value by utilizing Progent's enterprise-class network monitoring and analysis software as well as Progent's consulting experience to produce an unbiased and thorough evaluation of your network security profile.

  • Security Assessment Service Bundles for Small Businesses
    Progent offers two ultra-affordable security inventory service packages intended to enable small businesses to obtain a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your IT system from beyond your corporate firewall to identify possible gaps in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan using an authorized machine within your firewalled perimeter to assess your vulnerability to inside attacks. These two security inventory scans are set up and executed from a secured offsite location. The scan is administered by an engineer who has earned high-level security certifications and who produces a document that details and evaluates the data captured by the security scan and recommend various enhancements where appropriate.
  • Security Vulnerability Evaluation Bundles for Enterprises
    Progent offers three levels of set-price security assessment service packages designed for enterprises who need to meet compliance standards required by state or industry regulators. Progent's security assessment service packages offer larger businesses a chance to obtain an objective assessment at the viability of their security profile. For each security assessment bundle, Progent consultants with advanced security credentials analyze and report on collected data and offer suggestions for cost-effective remediation. All the network security assessment packages include an added-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly called PEN testing, is an accepted technique for helping businesses to find out how open their IT environments are to modern attacks. Progent's stealth penetration testing check how effectively your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's certified security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
We've Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your company is currently faced with a security emergency and you do not have a formal response procedure, refer to Progent's Online Technical Support to learn how to receive fast assistance. Progent offers online technical support from experienced engineers and can refer trouble tickets to certified security experts if necessary. Your business does not need to be a registered Progent customer to get emergency help for a security breach, but you can register as a Progent client in advance at no cost and your status as a current client could save valuable time during an emergency.

Usually, smaller companies have no recovery procedure in case of a successful security breach. This is risky, since the cost of a successful security assault can be more catastrophic for a small company than for a large corporation. Progent's security specialists can help your company to design a practical recovery and incident reporting plan that reduces the network disruption following an attack. The formal incident handling model outlined by GIAC is Progent's suggested method for handling a serious security incident.

Advanced Security Services Available from Progent
Progent's certified security engineers offer advanced support in key facets of IT protection including:

  • Vulnerability Audits and Security Compliance Assessment
    Progent provides experience with information risk evaluation utilities such as MS Baseline Security Analyzer and LANguard for performing a set of automatic network scans to identify possible security holes. Progent has broad experience with these utilities and can help you to understand assessment results and react appropriately. Progent's certified security engineers also provide web software validation and can perform thorough evaluation of corporate-wide security to confirm your company's compliance with major worldwide security standards such as HIPAA, PCI, and ISO 17799. In addition, Progent can evaluate the strength of your wireless protection including fixed wireless equipment plus mobile handsets. Get more details concerning Progent's Vulnerability Audits and Compliance Assessment.
  • Planning, Building, and Testing Secure Environments
    Every business should develop a thoroughly thought out security plan that incorporates both preventive and reactive activity. The proactive plan is a collection of steps that helps to minimize security holes. The post-attack strategy specifies activities to assist IT staff to evaluate the losses caused by a breach, repair the damage, record the experience, and revive network activity as quickly as feasible. Progent can show you how to incorporate security into your company operations, install scanning software, define and implement a secure network infrastructure, and recommend processes and policies that will enhance the safety of your network. Progent's security professionals are available to assist you to set up a firewall, design secure offsite access to e-mail and data, and install an efficient VPN. If you are interested in an affordable option for outsourcing your network security administration, Progent's Round-the-clock Monitoring Packages include continual remote network monitoring and quick resolution of problems.
  • Data Restoration and Failure Analysis
    Progent provides skill in restoring networks and devices that have been compromised, are suspect, or have ceased to function as a result of a security breach. Progent can help determine the damage resulting from the breach, return your company to ordinary business operations, and recover information compromised as a result of the breach. Progent's certified engineers can also oversee a comprehensive forensic analysis by going over activity logs and utilizing a variety of advanced assessment techniques. Progent's experience with security problems reduces your business disruption and allows Progent to propose efficient measures to prevent or mitigate new attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
    Cisco Certified CCIE Security SpecialistsThe current ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your current PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA Firewalls with Firepower configuration and troubleshooting services.
  • Other Firewall and VPN Consulting Services
    In addition to being expert in a wide range of security technologies available from Microsoft and Cisco, Progent can provide small and mid-size organizations top-level engineering services for products from other major firewall and VPN vendors such as:
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are designed to interpret the massive quantity of data represented by security event records created by a wide range of sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM software analyzes the security logs from these various sources and produces consolidated reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network infrastructure consultants can help organizations to design, install and manage a SIEM system that helps them to understand the progress of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Certifications
Progent's security engineers have earned the most prestigious accreditations offered in the industry. All of these accreditations require exhaustive examinations and demonstrated work background to ensure that candidates have mastered a substantial amount of security information and techniques and can provide advanced consulting to computer environments of any size.
  • Certified Information Security Manager Security Support Services
    CISM identifies the core skills and international standards of performance that information technology security managers are expected to achieve. It provides executive management the assurance that consultants who have been awarded their CISM have the experience and knowledge to offer efficient security management and consulting support. Progent can provide a CISM expert to assist your organization in vital security areas including information protection governance, risk management, data security program control, and crisis handling support. Find out additional information about Progent's Certified Information Security Manager (CISM) Security Support Assistance.

  • CISSP Security Consulting Services
    Progent's CISSP consultants are security specialists who have earned CISSP certification as a result of verified experience, rigorous study, and exhaustive testing. CISSP Certification recognizes expertise in an international standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of expertise covered under CISSP include security administration procedures, security architecture and models, access control systems, software development security, operations security, hardware security, cryptography, communications, Internet security, and business continuity planning. Learn the details concerning Progent's CISSP Consulting Expertise.

  • CISSP-ISSAP} Security Architecture Consulting Support
    Progent's CISSP-ISSAP Premier cybersecurity architecture experts have been awarded ISSAP status following thorough testing and extensive experience. field experience with network security architecture. ISSAP security experts have in-depth understanding of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security consultants can assist your business with all phases of secure network architecture. Get the details concerning Progent's ISSAP Certified Secure Network Architecture Consulting Services.

  • Certified Information Systems Auditor (CISA) Support Services
    The CISA credential is a recognized qualification that signifies expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an exhaustive test given by the ISACA international professional group. Progent offers the expertise of a CISA-Certified security consultant able to assist companies in the areas of information systems audit process, IT enforcement, systems and infrastructure planned useful life, IT service delivery, protecting data assets, and disaster recovery preparedness. Find out more information about Progent's CISA Professional Services.

  • CRISC-certified IT Risk Mitigation Specialists
    The CRISC program was initiated by ISACA in 2010 to validate a consultant's ability to plan, implement, and maintain IS controls to reduce network risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's network risk mitigation services are a good fit the services available from Progent's CISA-Premier consultants for impartially evaluating your IT management design and with the expertise of Progent's CISM-certified support professionals for defining company-wide security policies and procedures. Read additional details concerning Progent's CRISC-certified Network Risk Management Support.

  • Global Information Assurance Certification Support Expertise
    Global Information Assurance Certification was established in 1999 to validate the knowledge of computer security experts. GIAC's mission is to verify that an accredited security consultant possesses the knowledge appropriate to deliver services in critical categories of system, data, and program security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent can provide the expertise of certified consultants for all of the network security capabilities covered within GIAC accreditation topics such as assessing IT infrastructure, security incident handling, traffic analysis, and web-based application security. Read additional details concerning Progent's GIAC Consulting Assistance.
Contact Progent for Computer Security Expertise
If you're trying to find network security consulting, phone Progent at 800-993-9400 or see Contact Progent.