Overview of Progent's Security Consulting Services
Progent's certified computer security professionals can provide a wide selection of support services designed to help businesses of any size to detect and correct security weaknesses, block attacks, remediate the problems caused by a breach of security, and comply with regulatory mandates for guarding information and reporting incidents. Progent can provide a selection of service delivery models:
On-demand Security and Compliance Consulting Services
- On-demand online and on-premises support billed to the nearest minute
- Continual managed services invoiced at an affordable fixed monthly fee
- Value-priced service bundles for a one-time security assessment
After you register for Progent's services (registration is free), you can get as-needed remote or on-premises assistance from one of Progent security and compliance consultant. This traditional support model is primarily reactive and geared toward quickly taking care of technical problems that are affecting your productivity or that have stumped your in-house support personnel. Typical examples include replacing a firewall appliance or VPN connection, installing a critical security update for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are invoiced by the minute, which avoids the frustrating situation of receiving large bills for quick repairs.
Delivery alternatives for Progent's as-needed support services include:
Progent's accredited consultants are certified to support systems based on Windows, Linux, Apple Mac, Sun, and major derivatives of UNIX. Progent's wide range of consulting services encompasses firewall configuration, email systems, secure network design, and data recovery. Progent's technical support staff has earned the world's top security certifications including CISM and CISSP. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can provide world-class support with complex network configuration problems.
- Online Security Services
Most security issues can be handled online via a mix of phone-based support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security support by offering efficient access to consultants with the experience and resources to fix many of the most challenging problems quickly, making your service costs low and reducing lost productivity.
- On-premises Security Support Services
For cases where on-premises support is necessary, Progent can dispatch a technical expert to major cities throughout the United States. Progent can also send a security specialist with top certifications and world-class skills to any site in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior analysis technology to defend endpoint devices and servers and VMs against new malware attacks like ransomware and email phishing, which easily evade traditional signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to address the entire malware attack progression including filtering, detection, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering through leading-edge technologies packaged within one agent managed from a single control. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP environment that meets your organization's specific needs and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent's consultants can also help your company to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical files, apps and VMs that have become unavailable or damaged due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Find out more about ProSight DPS Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security vendors to deliver web-based control and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper level of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage prevention.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
ProSight WAN Watch is an infrastructure management service that makes it easy and affordable for small and mid-sized businesses to map, monitor, enhance and troubleshoot their networking hardware such as switches, firewalls, and load balancers as well as servers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, ProSight WAN Watch makes sure that network diagrams are always current, captures and displays the configuration of almost all devices connected to your network, tracks performance, and sends alerts when potential issues are detected. By automating time-consuming management processes, ProSight WAN Watch can cut hours off ordinary chores such as network mapping, expanding your network, locating devices that require important updates, or resolving performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) techniques to keep your network running at peak levels by tracking the health of critical computers that drive your information system. When ProSight LAN Watch uncovers a problem, an alarm is sent automatically to your designated IT personnel and your assigned Progent consultant so all looming issues can be resolved before they have a chance to impact productivity Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hosting solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or domains. By updating and managing your IT documentation, you can save up to 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost way for small and mid-size businesses to get an objective evaluation of the overall health of their network. Powered by a selection of the leading remote monitoring and management (RMM) platforms available, and overseen by Progent's certified group of IT professionals, ProSight Network Audits show you how closely the deployment of your essential network devices conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI like a more manageable Active Directory system. Both versions also come with a year of cutting-edge remote network monitoring and management. Advantages can include easier network management, improved compliance with information security requirements, higher utilization of IT resources, quicker problem resolution, more dependable backup and restore, and higher availability. Learn more information about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is an affordable service built around a brief discussion with a Progent backup/recovery consultant. The fact-finding interview is designed to assess your company's preparedness either to stop or recover rapidly following an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will consult with you personally to gather information about your current security profile and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can apply industry best practices to create an efficient AV and backup system that meets your company's needs. For details, refer to The ProSight Ransomware Preparedness Report.
Flat-rate Security Evaluation and Validation Bundles
Progent has put together a portfolio of flat-rate security evaluation bundles that provide exceptional value by deploying Progent's advanced system monitoring and analysis software as well as Progent's consulting experience to create an objective and thorough evaluation of your IT environment security posture.
Our System Has Been Hacked: What Are We Supposed to Do?
- Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages designed to enable small organizations to obtain a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your network from outside your firewalled perimeter to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan using an authorized machine inside your company firewall to evaluate your exposure to internal threats. The two security inventory services are set up and executed from a secured external site. The project is administered by an engineer who has been awarded advanced security certifications and who creates a document that details and interprets the data captured by the scan and suggests practical improvements where required.
- Security Vulnerability Evaluation Bundles for Large Businesses
Progent has developed three levels of fixed-price security assessment service bundles designed for enterprises who need to meet security standards required by state or industry agencies. Progent's security evaluation service bundles offer larger organizations a chance to obtain a professional look at the viability of their security posture. For every security evaluation bundle, Progent engineers with advanced security credentials analyze and report on captured data and offer recommendations for cost-effective remediation. All the network security assessment bundles include an added-cost option for on-premises engineers at any location in the United States.
- Stealth Penetration Testing
Stealth penetration testing, commonly called PEN testing, is a critical tool for helping organizations to determine how vulnerable their network systems are to current-generation threats. Progent's stealth penetration testing services test how effectively your existing security policies and technologies stand up to authorized but unannounced intrusion attempts managed by Progent's certified security experts utilizing advanced hacking methods. Find out about Progent's stealth penetration testing services.
If your company is currently fighting a network security emergency and you have not prepared a formal response procedure, refer to Progent's Remote Network Help to find out how to receive immediate assistance. Progent offers online help from experienced network technicians and can refer trouble tickets to certified security experts if required. Your company does not need to be a current Progent client to receive urgent help for a security problem, but you can sign up as a Progent client in advance for free and your status as a current client could save precious time when there is an emergency.
Typically, smaller companies have no response plan in the event of a damaging penetration. This is not good, because the cost of a successful security assault can be more devastating for a small business than for a big enterprise. Progent's security specialists can assist your business to design an efficient response and incident reporting procedure that minimizes the IT system disruption resulting from an attack. The step-by-step post-attack handling model outlined by GIAC is Progent's preferred method for reacting to a major security incident.
High-value Security Services Available from Progent
Progent's seasoned consultants can provide advanced support in vital areas of network protection such as:
Progent's Security Certifications
- Vulnerability Audits and Security Compliance Assessment
Progent provides experience with security evaluation software like MS Baseline Security Analyzer or LANguard for performing a variety of comprehensive system tests to identify potential security problems. Progent has broad experience with these and similar tools and can assist your company to analyze assessment results and react efficiently. Progent's security engineers also provide web application testing and can perform expert evaluation of corporate-wide security to validate your organization's compliance with major worldwide security specifications such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless protection including fixed wireless appliances as well as mobile handsets. Find out additional information concerning Progent's Information Risk Audits and Compliance Assessment.
- Planning, Implementing, and Testing Protected Networks
Every company should have a carefully considered security plan that incorporates both preventive and responsive activity. The pre-attack strategy is a collection of precautions that helps to minimize security holes. The reactive plan specifies procedures to assist IT staff to evaluate the losses caused by a breach, remediate the damage, record the experience, and restore business functions as soon as possible. Progent can show you how to incorporate security into your company operations, set up auditing software, define and implement a safe IT architecture, and propose processes and policies that will optimize the safety of your information system. Progent's security experts are ready to assist you to configure a firewall, deploy safe remote connectivity to email and files, and configure an efficient virtual private network. If you are interested in an affordable option for outsourcing your network security management, Progent's 24x7 Monitoring Options feature non-stop remote server tracking and immediate response to emergencies.
- Data Recovery and Failure Analysis
Progent provides expertise in recovering systems and devices that have been compromised, are suspect, or have failed following a security penetration. Progent can show you how to evaluate the damage caused by the attack, restore ordinary business operations, and recover data lost owing to the event. Progent's certified engineers can also perform a thorough forensic evaluation by going over event logs and utilizing a variety of proven forensics techniques. Progent's experience with security issues reduces your off-air time and permits Progent to propose efficient ways to prevent or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and debugging services.
- Additional Firewall and VPN Solutions
As well as being expert in a wide array of security solutions from Microsoft and Cisco, Progent can provide small and mid-size businesses expert engineering services for solutions from other popular firewall and Virtual Private Network suppliers such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to digest the enormous quantity of data collected in security event records generated by multiple sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM software analyzes the security event records from these various sources and produces consolidated reports of security events as required by state regulations and industry compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network experts can assist businesses to plan, install and manage a SIEM solution that enables them to see the behavior of attacks and comply with security incident reporting regulations. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's security specialists have been awarded some of the most respected certifications available in the security industry. All of these certifications require exhaustive testing and demonstrated field experience to ensure that recipients have mastered a significant amount of security knowledge and techniques and can offer high-level consulting to computer environments of any complexity.
Get in Touch with Progent for Computer Security Expertise
- CISM Security Support Expertise
CISM defines the fundamental skills and worldwide standards of service that computer security managers are expected to achieve. CISM offers executive management the assurance that consultants who have been awarded their certification have the background and knowledge to provide effective security administration and consulting services. Progent can offer a CISM-certified consultant to help your organization in key security disciplines such as information security governance, risk management, data security process control, and crisis handling management. Learn more information about Progent's Certified Information Security Manager Security Consulting Expertise.
- CISSP Security Support Services
Progent's CISSP experts are security engineers who have been awarded CISSP certification through demonstrated professional work, extensive study, and exhaustive examination. CISSP Certification recognizes mastery of a worldwide standard for information security. ANSI has given the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management procedures, security design and test systems, connection control methodology, software development security, operations security, physical security, cryptography, telecommunications, network security, and business continuity planning. Get the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
- CISSP-ISSAP} Security Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier security architecture consultants have earned ISSAP accreditation following rigorous examination and significant hands-on work with network security design. ISSAP consultants have acquired in-depth understanding of access management mechanisms and techniques, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security. Progent's CISSP-ISSAP-premier security experts can help your business with all aspects of architecture security. Learn additional details about Progent's ISSAP Certified Protected System Architecture Consulting Support.
- Certified Information Systems Auditor Support Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that signifies expertise in network security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that candidates pass an exhaustive test given by the ISACA international professional group. Progent offers the expertise of a CISA-Certified security audit engineer able to help businesses in the fields of information systems audit services, IT administration, network assets and architecture lifecycle, IT service delivery, protecting data resources, and business continuity preparedness. Learn more information about Progent's Certified Information Systems Auditor (CISA) Consulting Services.
- CRISC-certified Network Risk Management Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's network risk mitigation expertise is complementary to the services available from Progent's CISA-Certified security engineers for impartially evaluating your IT management design and also with the services of Progent's CISM consultants for implementing security policies and procedures. Find out more details about Progent's CRISC-certified IT Risk Management Support.
- GIAC (Global Information Assurance Certification) Consulting Expertise
GIAC was established in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to make sure that a certified professional has the knowledge needed to deliver support in vital areas of system, information, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent offers the expertise of GIAC certified security engineers for any of the security capabilities covered within GIAC certification programs including auditing networks, security incident response, traffic analysis, and web services security. Read more details about Progent's GIAC Consulting Assistance.
If you need security engineering help, call Progent at 800-993-9400 or see Contact Progent.