Overview of Progent's Security Consulting Services
Progent's industry certified computer security experts offer a broad range of services intended to help organizations of all sizes to detect and correct security vulnerabilities, block malicious attacks, remediate the damage caused by a breach of protection, and meet government requirements for protecting information and reporting security incidents. Progent can provide world-class help for key cybersecurity and restoration technologies such as AI-driven End Point Protection and Response, MDR (Managed Detection and Response), full system restore validation and testing, immutable backup, and off-premises backup.
Progent can provide a selection of service modes:
- As-needed remote and on-premises assistance billed to the nearest minute
- Continual fully managed services billed at a low flat monthly rate
- Set-price service bundles for a single security assessment
- Urgent ransomware response. Progent will propose a bid after an assessment of the extent of the damage.
(If your network has been victimized by any version of crypto-ransomware, don't panic. Get fast assistance by calling Progent's 24-hour Ransomware Hot Line at 800-462-8800.)
On-demand Security Support Services
Once you sign up for Progent's services (registration is free), you can receive on-demand remote or on-premises support from one of Progent security and compliance consultant. This classic support model is essentially reactive and geared toward quickly resolving IT problems that are disrupting your productivity or that have stumped your in-house support personnel. Typical scenarios are debugging a firewall or VPN connection, implementing a critical security update for a Cisco switch or router, designing compliant access to a public cloud, or restoring data after a ransomware attack. These security services are billed to the nearest minute, which eliminates the frustrating case of receiving big invoices for fast fixes.
Delivery options for Progent's as-needed support include:
- Remote Security Services
Most security-related problems can be resolved online through a mix of phone help and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can provide remote security support by offering efficient access to consultants who have the experience and technical resources to fix many of the most challenging problems quickly, keeping your service costs low and reducing lost productivity.
- Onsite Security Support
For instances where onsite support is necessary, Progent can dispatch a technical professional to major metropolitan areas throughout the United States. Progent can also dispatch a security consultant with top certifications and advanced skills to any site in the U.S.
Progent's accredited security consultants are premier to provide help for environments powered by Microsoft Windows, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's wide range of services addresses firewall configuration, email and messaging systems, secure network architecture, and information recovery. Progent's support staff has been awarded the world's top security certifications including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional (CISSP). Progent also offers fast access to online Cisco-certified CCIE network consultants who can provide world-class support with tough network integration issues.
ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight suite of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates SentinelOne's next generation behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily get by legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to address the complete threat lifecycle including protection, identification, mitigation, cleanup, and forensics. Top capabilities include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery based on SentinelOne technology.
- ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Platforms
ProSight Reporting is an expanding family of in-depth reporting utilities created to work with the top ticketing and network monitoring applications including ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to surface and contextualize critical issues such as spotty support follow-through or machines with out-of-date AVs. By identifying ticketing or network health concerns concisely and in near-real time, ProSight Reporting enhances productivity, reduces management overhead, and saves money. For more information, visit ProSight Reporting for ticketing and network monitoring applications.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device control, and web filtering through cutting-edge technologies packaged within one agent accessible from a single control. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP environment that addresses your organization's unique requirements and that helps you demonstrate compliance with legal and industry data security regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent attention. Progent can also assist you to set up and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
- ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup processes and allows rapid restoration of critical files, apps and VMs that have become lost or corrupted due to component failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced support to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical information. Read more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security vendors to deliver web-based control and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.
- ProSight Duo MFA: Two-Factor Identity Authentication
ProSight Duo is a suite of managed service plans utilizing industry-leading technology developed by Duo, a Cisco company, to build two-factor authentication solutions. Two-factor authentication uses an out-of-band device to confirm identity, providing an additional layer of protection rather than merely passwords. This counters the most common causes of cybersecurity break-ins like phishing, brute-force password guessing, and burglarized personal credentials. Duo's push technology can save time and reduce hassle by permitting users anywhere to confirm their identity simply by clicking "Approve" on the authentication prompt on their own personal endpoint, which could be a phone, a smart watch, or other supported out-of-band device. This single-tap process eliminates the requirement to find an email or text and transcribe a temporary security code. Find out more about Progent's ProSight Duo MFA two-factor identity authentication services.
- ProSight WAN Watch: Infrastructure Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and affordable for smaller organizations to map out, track, enhance and debug their connectivity hardware like switches, firewalls, and load balancers plus servers, endpoints and other devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that infrastructure topology diagrams are always updated, copies and displays the configuration information of virtually all devices on your network, tracks performance, and generates alerts when issues are discovered. By automating time-consuming management and troubleshooting activities, WAN Watch can knock hours off ordinary chores such as network mapping, expanding your network, finding devices that require important software patches, or resolving performance issues. Learn more details about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progent's server and desktop monitoring service that uses advanced remote monitoring and management techniques to help keep your network running at peak levels by checking the state of critical assets that drive your business network. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your designated IT management personnel and your assigned Progent consultant so that all looming issues can be addressed before they can impact your network Find out more about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and protect information about your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you're making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size businesses to get an objective assessment of the overall health of their network. Based on some of the leading remote monitoring and management (RMM) tools in the industry, and supervised by Progent's certified team of information technology experts, ProSight Network Audits show you how closely the configuration of your essential infrastructure devices conform to best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide immediate benefits like a more manageable Active Directory system. Both versions also include one year of advanced remote network monitoring and management (RMM). Advantages can include easier management, better compliance with data security requirements, higher utilization of network resources, quicker problem resolution, more reliable backup and recovery, and increased uptime. Learn more information about ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is an affordable service built around a brief discussion with a Progent backup/recovery expert. The fact-finding interview is intended to assess your company's preparedness to block or recover quickly following an attack by a ransomware strain like Ryuk, WannaCry, MongoLock, or Locky. Progent will work with you directly to gather information about your current security profile and backup/recovery platform, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply best practices to create an efficient security and backup/recovery environment that meets your business needs. For additional information, visit The ProSight Ransomware Preparedness Report.
Flat-rate Security Assessment and Validation Packages
Progent has put together a portfolio of set-price security assessment bundles that deliver high value by deploying Progent's enterprise-class network monitoring software as well as Progent's consulting skills to produce an unbiased and comprehensive evaluation of your IT environment security profile.
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory packages intended to enable small businesses to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive examination of your IT system from beyond your corporate firewall to determine potential gaps in the security posture you present to the outside. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan from an authorized machine within your firewalled perimeter to assess your exposure to inside attacks. The two security inventory services are set up and executed from a secured external site. The project is managed by a consultant who has been awarded advanced security certifications and who creates a document that details and evaluates the data collected by the security scan and suggests practical enhancements where appropriate.
- Security Vulnerability Assessment Bundles for Enterprises
Progent has developed three levels of fixed-price security evaluation service bundles intended for enterprises who need to meet compliance standards required by state or industry regulators. Progent's security assessment service packages offer enterprises an opportunity to get a professional assessment at the strength of their security posture. For each security evaluation package, Progent consultants with top security credentials analyze and report on collected data and provide recommendations for cost-effective improvements. All the network security assessment bundles include an added-cost option for onsite consultants anywhere in the U.S.
- Support for Horizon3.ai's NodeZero Penetration Testing Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that supports continuous, concurrent, automated testing of your internal and perimeter network so you can find, prioritize, fix, and confirm security weaknesses before threat actors can exploit them. Progent offers the skills of a NodeZero Certified Operator (NCO) who can assist you to use NodeZero to carry out thorough pentests of your perimeter and your internal IT infrastructure in order to determine your current security profile. Progent's NodeZero experts can also assist you to strengthen your existing network security and can assist you to design and implement a unified cybersecurity strategy that streamlines management and delivers maximum protection for on-premises, cloud-based, and perimeter IT resources. To learn additional details about Progent's threat analysis solutions powered by on NodeZero's pentest products, see Consulting Services for NodeZero's PEN Test Platform.
- Stealth Penetration Testing
Stealth penetration testing, often known as PEN testing, is a vital technique for allowing organizations to determine how open their IT systems are to current-generation threats. Progent's stealth penetration testing check how well your corporate security policies and platforms resist authorized but unannounced intrusion attempts launched by Progent's veteran security experts using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
Download the Security Services Overview Datasheet
To download a datasheet with an overview of Progent's portfolio of services for network security, click:
Overview of Progent's Network Security Services (PDF - 511 KB).
We've Been Hacked: What Can We Do?
If you are currently faced with a security emergency and you have no formal response procedure, refer to Progent's Online Computer Support to see how to receive fast assistance. Progent provides remote technical support from experienced network technicians and can escalate problems to certified security specialists if necessary. Your business does not need to be a registered Progent client to get emergency help for a security problem, but you can sign up as a Progent client in advance for free and your standing as a registered customer could save valuable time in a crisis.
Typically, smaller businesses have no response plan in the event of a damaging penetration. This is not good, since the damage from a successful security assault can be more catastrophic for a small company than for a big enterprise. Progent's security consultants can help your company to create a sensible recovery and event reporting procedure that minimizes the IT system downtime following an attack. The step-by-step incident handling model promoted by Global Information Assurance Certification is Progent's preferred method for handling a serious security incident.
High-value Security Expertise Offered by Progent
Progent's certified engineers offer specialized help in key facets of computer security including:
- Vulnerability Audits and Compliance Testing
Progent provides expertise with information risk evaluation software like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic network scans to reveal possible security problems. Progent has broad experience with scanning tools and can help you to analyze assessment results and react efficiently. Progent's security consultants also offer web application testing and can perform expert evaluation of corporate-wide security to determine your company's compliance with important global security specifications including FISMA, PCI, and ISO. In addition, Progent can assess the effectiveness of your wireless security covering fixed wireless appliances as well as portable devices. Find out additional information about Progent's Information Risk Audits and Compliance Assessment.
- Designing, Building, and Validating Secure Environments
Any business ought to have a carefully considered security strategy that includes both proactive and reactive activity. The pre-attack plan is a set of precautions that helps to minimize security holes. The reactive plan specifies procedures to assist IT staff to assess the damage caused by an attack, repair the damage, document the event, and revive network functions as quickly as feasible. Progent can advise you how to build security into your business operations, install scanning software, define and execute a safe IT infrastructure, and propose processes and policies that will enhance the safety of your network. Progent's security professionals are ready to help you to set up a firewall, deploy secure online and mobile access to email and data, and install an effective virtual private network. If you are looking for an economical way for outsourcing your network security administration, Progent's 24x7 Monitoring Services feature non-stop remote server monitoring and immediate response to emergencies.
- Data Restoration and Failure Analysis
Progent offers expertise in restoring networks and devices that have been compromised, are suspect, or have ceased to function because of a security penetration. Progent can show you how to evaluate the losses resulting from the attack, restore ordinary business operations, and retrieve information lost owing to the breach. Progent's security specialists can also manage a comprehensive failure analysis by examining activity logs and using a variety of advanced assessment tools. Progent's background with security consulting reduces your off-air time and allows Progent to propose effective measures to avoid or contain future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
- Additional Firewall and Virtual Private Network Consulting Services Provided by Progent
As well as supporting a broad range of network security technologies available from Microsoft and Cisco, Progent offers small and mid-size businesses expert support for security products from other important firewall and VPN suppliers by offering services including:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) applications and services are intended to make sense the massive quantity of data collected in security incident records generated by a wide range of sources such as network appliances, servers, and applications and tools. SIEM software organizes the security event records from these various sources and creates consolidated reports of security events as mandated by state regulations and business compliance standards. Progent's GIAC-certified computer security consultants and Cisco CCIE certified network infrastructure consultants can help businesses to design, deploy and operate a SIEM system that helps them to understand the behavior of attacks and comply with event reporting regulations. (See Progent's SIEM solutions.)
- Patch Management Solutions
Software update management includes installing software or firmware updates to operating systems and applications, physical and virtual servers and endpoint devices, peripherals such as printers and scanners, infrastructure appliances like switches and Wi-Fi APs, and Internet-of-Things (IoT) devices such as alarms and health monitors. Timely and properly managed updating optimizes security, compliance, uptime, and functionality. Sporadic software update management can result in security vulnerabilities, compatibility problems, sluggish or erratic performance, excessive offline stretches, or loss of important features. Progent's support services for patch management provide organizations of all sizes a flexible and affordable option for assessing, testing, scheduling, implementing, and tracking updates to your ever-evolving information system. (See Progent's patch management solutions.)
Progent's Security Accreditations
Progent's security engineers have been awarded some of the most prestigious accreditations available in the industry. These certifications require extensive testing and demonstrated field background to guarantee that candidates have mastered a substantial body of security information and techniques and can provide high-level security solutions to computer networks of any complexity.
- CISM Security Consulting Services
Certified Information Security Manager (CISM) identifies the core competencies and international benchmarks of performance that information technology security professionals are required to master. It provides executive management the confidence that those who have earned their CISM have the background and knowledge to provide effective security management and consulting services. Progent can provide a CISM consultant to assist your enterprise in vital security areas including data protection governance, vulnerability management, data protection process control, and crisis handling management. Read additional information about Progent's CISM Security Consulting Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's CISSP experts are security specialists who have been awarded CISSP certification through verified professional work, extensive study, and formal testing. CISSP qualification indicates mastery of a worldwide standard for IT security. ANSI has granted the CISSP status official recognition in the area of information security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security administration procedures, security design and test systems, access permission methodology, applications development security, business processes security, hardware security, cryptography, telecommunications, network security, and business continuity planning. Find out the details about Progent's CISSP Consulting Assistance.
- CISSP-ISSAP Cybersecurity Architecture Consulting Support
Progent's CISSP-ISSAP Premier cybersecurity architecture experts have earned ISSAP status after rigorous examination and extensive hands-on work with information security architecture. ISSAP consultants possess in-depth understanding of access control systems and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-premier security experts can help your company with all aspects of secure network architecture. Get the details about Progent's ISSAP Certified Secure IT Architecture Consulting Support.
- CISA Consulting Services
The CISA credential is a recognized qualification that represents mastery in IS security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates undergo a comprehensive examination given by the ISACA international professional group. Progent offers the services of a CISA-Premier security audit engineer trained to help companies in the areas of IS audit services, information technology enforcement, systems and architecture lifecycle, IT service delivery, safeguarding data resources, and business continuity planning. Read additional details about Progent's Certified Information Systems Auditor Consulting Expertise.
- CRISC IT Risk Management Specialists
The CRISC program was initiated by ISACA to verify an IT professional's skills to design, deploy, and support IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and execute a business continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's network risk mitigation services are a good fit the services available from Progent's CISA-Premier security engineers for impartially evaluating your IS control design and also with the expertise of Progent's CISM-certified consultants for defining company-wide security policies. Find out more information concerning Progent's CRISC Network Risk Management Consulting.
- Global Information Assurance Certification Support Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to ensure that a certified professional possesses the knowledge appropriate to provide support in key categories of network, data, and application program security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent offers the expertise of certified professionals for any of the network security services addressed within GIAC accreditation topics such as auditing networks, incident response, intrusion detection, and web-based application security. Read more details about Progent's GIAC Professional Assistance.
Depend on Progent for Network Security Consulting Services
If you need computer security consulting, telephone Progent at 800-993-9400 or refer to Contact Progent.