Introduction to Progent's Security Consulting Services
Progent's industry certified network security and compliance experts can provide a wide range of support services intended to help organizations of all sizes to uncover and eliminate security weaknesses, defend against attacks, remediate any problems caused by a breach of protection, and comply with regulatory requirements for guarding data and reporting incidents. Progent can provide a selection of service modes:
As-needed Security Support Services
- As-needed remote and on-premises support invoiced to the nearest minute
- On-going fully managed services billed at a low flat monthly fee
- Value-priced service bundles for a one-time security and compliance evaluation
Once you sign up for Progent's services (registration is free), you can get as-needed online or onsite assistance from a Progent security consultant. This traditional service model is essentially reactive and optimized for rapidly resolving IT issues that are affecting your network or that are beyond the scope of your own support staff. Typical scenarios include replacing a firewall appliance or VPN tunnel, installing a vital security update for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are billed to the nearest minute, which eliminates the annoying case of receiving big bills for quick repairs.
Delivery alternatives for Progent's as-needed support include:
Progent's accredited engineers are premier to provide help for environments powered by Microsoft, Linux, Mac, Sun, and popular versions of UNIX. Progent's broad array of services encompasses firewall configuration, e-mail systems, protected system design, and data recovery. Progent's technical support team has been awarded the world's top security credentials including Certified Information Security Manager and ISSAP. Progent also offers immediate access to online Cisco-certified CCIE network consultants who can provide world-class assistance with tough network technology problems.
- Remote Security Services
Most security issues can be handled online through a combination of phone support and a remote connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can provide remote security support by offering efficient access to consultants who have the background and technical resources to fix many of the most difficult problems quickly, making your support expenses affordable and reducing lost productivity.
- Onsite Security Services
For instances where on-premises support is required, Progent can dispatch a technical professional to major cities across the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any site in the country.
ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight suite of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to defend endpoints and servers and VMs against new malware attacks such as ransomware and email phishing, which easily escape traditional signature-matching AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to manage the complete malware attack lifecycle including blocking, identification, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services deliver affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP delivers firewall protection, penetration alerts, device management, and web filtering through leading-edge technologies incorporated within one agent accessible from a single control. Progent's data protection and virtualization experts can help you to design and configure a ProSight ESP environment that meets your company's specific requirements and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
- ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates your backup activities and enables rapid recovery of vital data, applications and VMs that have become lost or damaged as a result of hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight Data Protection Services to to comply with regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security companies to deliver centralized control and world-class security for your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller organizations to diagram, monitor, optimize and debug their networking appliances such as switches, firewalls, and wireless controllers as well as servers, client computers and other networked devices. Using cutting-edge RMM technology, ProSight WAN Watch makes sure that network maps are kept current, copies and manages the configuration information of virtually all devices connected to your network, monitors performance, and sends notices when issues are discovered. By automating complex management and troubleshooting activities, ProSight WAN Watch can cut hours off common chores such as making network diagrams, expanding your network, finding devices that need important updates, or resolving performance problems. Find out more details about ProSight WAN Watch infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent’s server and desktop remote monitoring service that incorporates state-of-the-art remote monitoring and management techniques to help keep your network operating efficiently by tracking the state of vital computers that power your business network. When ProSight LAN Watch uncovers an issue, an alert is transmitted immediately to your designated IT management staff and your assigned Progent consultant so all potential problems can be resolved before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved easily to a different hardware environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or domains. By updating and managing your network documentation, you can save as much as 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether you’re planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a fast and low-cost way for small and medium-size organizations to obtain an objective evaluation of the overall health of their network. Powered by a selection of the leading remote monitoring and management tools available, and supervised by Progent's world-class group of IT experts, ProSight Network Audits show you how closely the configuration of your essential network devices conform to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate ROI such as a cleaner Active Directory (AD) system. Both also include one year of state-of-the-art remote network monitoring and management. Benefits can include easier management, better compliance with government and industry security requirements, higher utilization of network assets, quicker troubleshooting, more reliable backup and recovery, and less downtime. Learn more information about ProSight Network Audits network infrastructure review.
Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief phone discussion with a Progent information assurance consultant. The interview is intended to help assess your organization's ability to block or recover rapidly after an attack by a ransomware variant like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to collect information about your current AV defense and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report describing how you can apply best practices to create an efficient AV and backup environment that aligns with your business requirements. For additional information, visit The ProSight Ransomware Preparedness Report Service.
Fixed-price Security Assessment and Validation Bundles
Progent offers a selection of set-price security and compliance assessment packages that provide exceptional value by utilizing Progent's enterprise-class network monitoring tools as well as Progent's technical skills to produce an objective and comprehensive evaluation of your IT environment security posture.
We've Been Hacked: What Are We Supposed to Do Now?
- Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning service packages designed to enable small businesses to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant administers a comprehensive examination of your network from outside your firewalled perimeter to determine potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan using an authorized computer inside your firewalled perimeter to assess your exposure to internal attacks. These two security inventory services are configured and run from a secured offsite location. The project is managed by a consultant who has earned high-level security certifications and who creates a document that describes and evaluates the information captured by the scan and recommend various improvements where required.
- Security Vulnerability Assessment Packages for Large Businesses
Progent has developed three levels of set-price security assessment service packages intended for large organizations who want to meet compliance standards required by state or industry agencies. Progent's security assessment service bundles offer enterprises an opportunity to obtain a professional assessment at the strength of their security profile. For each security assessment package, Progent engineers with advanced security credentials analyze and report on captured data and provide recommendations for efficient remediation. Each of the network security assessment packages include an added-cost option for on-premises engineers at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly referred to as PEN testing, is a vital technique for allowing businesses to determine how open their IT systems are to modern attacks. Progent's stealth penetration testing check how well your corporate security procedures and platforms resist authorized but unannounced penetration attempts launched by Progent's veteran security experts utilizing advanced hacking methods. Find out about Progent's stealth penetration testing services.
If your business is currently fighting a security emergency and you have not prepared a formal recovery plan, visit Progent's Remote Technical Support to find out how to get fast assistance. Progent offers online help from skilled network technicians and can escalate trouble tickets to certified security experts if required. Your company does not have to be a current Progent customer to receive emergency help for a security problem, but you can register as a Progent client in advance for free and your status as a registered customer could save valuable time during an emergency.
Typically, smaller organizations have no recovery procedure in case of a successful attack. This is risky, since the cost of a serious security attack can be more catastrophic for a small business than for a big enterprise. Progent's security engineers can assist your you to design an effective recovery and event reporting plan that minimizes the IT system disruption following an attack. The formal incident response model outlined by GIAC is Progent's preferred method for handling a serious security incident.
Advanced Security Services Offered by Progent
Progent's certified engineers offer expertise in vital facets of network compliance including:
Progent's Security Accreditations
- Security Vulnerability Audits and Security Compliance Testing
Progent provides expertise with information risk evaluation software such as MS Baseline Security Analyzer and LANguard from GFI for performing a variety of comprehensive system scans to identify potential security problems. Progent has broad experience with these utilities and can assist your company to analyze assessment reports and react efficiently. Progent's certified security engineers also can perform web application validation and can perform thorough assessments of corporate-wide security to confirm your company's compliance with major worldwide security specifications including FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection including fixed wireless equipment plus mobile devices. Learn more details concerning Progent's Vulnerability Evaluation and Security Compliance Assessment.
- Planning, Building, and Validating Protected Networks
Any business should have a thoroughly thought out security plan that includes both preventive and reactive activity. The proactive strategy is a collection of steps that helps to minimize vulnerabilities. The post-attack strategy specifies activities to assist security staff to inventory the damage caused by a breach, remediate the damage, record the experience, and revive business activity as soon as feasible. Progent can show you how to incorporate security into your business processes, set up scanning utilities, define and implement a safe IT architecture, and propose procedures and policies that will optimize the safety of your computing environment. Progent's security experts are available to help you to set up a firewall, deploy secure remote access to e-mail and files, and configure an efficient VPN. If you are looking for an economical way for jobbing out your network security administration, Progent's Round-the-clock Network Support Services include continual remote network monitoring and quick resolution of problems.
- System Recovery and Security Forensics
Progent has skill in recovering networks and computers that have been hacked, are in question, or have stopped working because of a security breakdown. Progent can show you how to assess the losses caused by the breach, restore ordinary business operations, and recover information compromised as a result of the assault. Progent's certified engineers can also oversee a comprehensive failure analysis by examining activity logs and using other advanced assessment tools. Progent's background with security problems reduces your off-air time and allows Progent to recommend efficient ways to avoid or contain future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services configuration and debugging support.
- Additional Firewall and Virtual Private Network (VPN) Solutions Offered by Progent
In addition to supporting a broad range of security solutions from Microsoft and Cisco, Progent offers small companies top-level consulting for solutions from other popular firewall and Virtual Private Network (VPN) suppliers by providing services such as:
- SIEM Solutions
Security information and event management (SIEM) software and services are intended to interpret the enormous amounts of data collected in security event records generated by multiple sources including network appliances, operating systems, and applications and tools. SIEM software analyzes the security logs from these diverse sources and creates summary reports of security incidents as mandated by government regulations and business compliance guidelines. Progent's GIAC-certified computer security experts and Cisco-certified network experts can assist organizations to plan, deploy and operate a SIEM system that helps them to see the progress of attacks and comply with security incident reporting requirements. (Visit Progent's SIEM solutions.)
Progent's security professionals have been awarded the most respected certifications available in the industry. These certifications demand extensive testing and proven work background to ensure that recipients have acquired expertise with a significant amount of security knowledge and methodologies and can offer advanced security solutions to information environments of any complexity.
Contact Progent for Network Security Consulting Services
- Certified Information Security Manager Security Consulting Services
Certified Information Security Manager defines the basic skills and worldwide benchmarks of performance that computer security managers are required to master. CISM provides business management the confidence that consultants who have earned their certification have the background and knowledge to offer effective security management and engineering support. Progent can provide a CISM-certified consultant to help your enterprise in critical security disciplines including information protection governance, vulnerability assessment, data protection process control, and incident handling support. Read additional information concerning Progent's Certified Information Security Manager (CISM) Security Consulting Services.
- Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP status through demonstrated professional work, extensive study, and formal testing. CISSP qualification indicates mastery of a worldwide standard for information security. ANSI has given the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security administration practices, security design and test systems, connection permission systems, software development security, operations security, physical security, encryption, communications, network security, and disaster recovery planning. Get more details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier security architecture consultants have been awarded ISSAP status after thorough examination and extensive hands-on work with network security architecture. ISSAP consultants have acquired in-depth understanding of access control mechanisms and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, BCP and disaster recovery, and physical security integration. Progent's CISSP-ISSAP-certified security consultants can assist your business with all phases of architecture security. Find out more information concerning Progent's ISSAP Certified Secure Network Architecture Consulting Support.
- Certified Information Systems Auditor (CISA) Professional Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that signifies mastery in IS security auditing. Certified by ANSI, the CISA accreditation has consultants pass an exhaustive test administered by the ISACA professional group. Progent can provide the services of a CISA-Certified security audit engineer trained to help businesses in the fields of information systems audit services, IT administration, network assets and architecture lifecycle, information technology support, protecting information resources, and disaster recovery preparedness. Find out the details about Progent's Certified Information Systems Auditor (CISA) Support Expertise.
- CRISC-certified IT Risk Mitigation Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity plan that follows industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's network risk mitigation services are a good fit the services provided by Progent's CISA-Premier security engineers for objectively auditing your IS management mechanisms and with the expertise of Progent's CISM consultants for defining security policies and procedures. Read more details concerning Progent's CRISC-certified Risk Management Support.
- GIAC (Global Information Assurance Certification) Support Services
GIAC was founded in 1999 to certify the knowledge of network security experts. GIAC's goal is to ensure that a certified professional has the knowledge necessary to deliver services in vital categories of network, data, and application program security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the United States National Security Agency (NSA). Progent offers the support of certified consultants for all of the security services covered under GIAC certification topics such as assessing security systems, incident handling, traffic analysis, and web-based application security. Read more details about Progent's GIAC Professional Services.
If you're trying to find security help, telephone Progent at 800-993-9400 or go to Contact Progent.