Overview of Progent's Security and Compliance Consulting Services
Progent's certified computer security and compliance professionals offer a broad range of support services designed to assist businesses of any size to detect and correct security weaknesses, defend against assaults, recover from the problems caused by a breach of security, and comply with regulatory mandates for protecting information and reporting incidents. Progent can provide a choice of service modes:
As-needed Security Support Services
- As-needed online and on-site assistance billed by the minute
- On-going managed services billed at a low flat monthly rate
- Set-price service bundles for a one-time security and compliance assessment
Once you register for Progent's services (signing up is free), you can get as-needed remote or onsite assistance from one of Progent security expert. This traditional support model is primarily reactive and geared toward rapidly taking care of technical issues that are disrupting your productivity or that are beyond the scope of your own support staff. Common examples are configuring a firewall or VPN tunnel, implementing a critical security update for a Cisco switch or router, designing secure access to a public cloud, or recovering from a ransomware assault. These security services are invoiced to the nearest minute, which eliminates the annoying situation of getting big invoices for fast repairs.
Delivery options for Progent's on-demand support include:
Progent's accredited engineers are premier to support systems powered by Microsoft, Linux, macOS and OS X, Sun, and major versions of UNIX. Progent's broad array of consulting services encompasses firewall expertise, e-mail security, protected system design, and information restoration. Progent's support staff has earned the industry's most advanced security certifications including Certified Information Systems Auditor and Information System Security Architecture Professional. Progent also offers fast access to remote Cisco CCIE network infrastructure consultants who can provide world-class support with complex network configuration issues.
- Online Security Services
Most security-related problems can be resolved remotely through a combination of phone-based support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's TRC group can deliver remote security support by offering easy access to consultants who have the experience and resources to fix many of the most difficult problems quickly, making your support costs low and reducing downtime.
- On-premises Security Support Services
For instances where onsite support is required, Progent can dispatch a technical expert to major cities throughout the U.S. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely evade legacy signature-based AV tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the entire threat progression including blocking, infiltration detection, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers firewall protection, intrusion alarms, device control, and web filtering via cutting-edge technologies packaged within a single agent managed from a single console. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP deployment that meets your company's unique requirements and that allows you prove compliance with legal and industry information protection regulations. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent's consultants can also help your company to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of critical files, applications and VMs that have become lost or damaged due to component failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPAA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Learn more about ProSight DPS Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to provide web-based control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper layer of inspection for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.
- ProSight WAN Watch: Infrastructure Management
Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for smaller organizations to map, track, enhance and troubleshoot their connectivity appliances such as switches, firewalls, and access points as well as servers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that infrastructure topology diagrams are always current, copies and manages the configuration information of almost all devices on your network, tracks performance, and sends notices when issues are detected. By automating time-consuming network management processes, ProSight WAN Watch can knock hours off common tasks such as making network diagrams, expanding your network, finding devices that require critical software patches, or resolving performance issues. Learn more details about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management techniques to help keep your IT system operating at peak levels by checking the state of vital assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is sent immediately to your specified IT personnel and your Progent consultant so any looming problems can be addressed before they can impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hosting solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your network documentation, you can save as much as half of time spent trying to find critical information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost way for small and mid-size organizations to obtain an unbiased evaluation of the overall health of their IT system. Based on a selection of the top remote monitoring and management (RMM) platforms available, and supervised by Progent's certified group of IT experts, ProSight Network Audits help you see how well the deployment of your essential infrastructure assets adhere to leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a low, one-time cost and provide instant ROI like a cleaner Active Directory system. Both also include a year of advanced remote network monitoring and management (RMM). Benefits can include lower-cost network management, improved compliance with government and industry security standards, more efficient utilization of IT assets, quicker problem resolution, more reliable backup and recovery, and higher availability. See more about Progent's ProSight Network Audits IT infrastructure review.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service centered on a phone interview with a Progent backup/recovery consultant. The interview is intended to help assess your organization's preparedness to stop or recover quickly after an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to collect information about your existing antivirus tools and backup/recovery platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to build a cost-effective AV and backup/recovery environment that aligns with your company's requirements. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Set-price Security Assessment and Validation Bundles
Progent offers a variety of set-price security and compliance assessment bundles that deliver exceptional value by utilizing Progent's advanced system monitoring tools plus Progent's technical experience to create an objective and comprehensive assessment of your IT environment security posture.
Our Network Has Been Hacked: What Are We Supposed to Do?
- Security Assessment Service Bundles for Small Organizations
Progent offers two ultra-affordable security inventory scanning packages intended to allow small organizations to obtain an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers a comprehensive assessment of your network from outside your firewalled perimeter to determine potential gaps in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan from an authorized machine within your corporate firewall to assess your exposure to internal attacks. These two security inventory scanning services are configured and run from a secured offsite location. The project is managed by a consultant who has been awarded advanced security certifications and who creates a document that describes and interprets the information collected by the security scan and suggests various enhancements where required.
- Security Vulnerability Evaluation Bundles for Large Organizations
Progent has developed three levels of set-price security assessment service bundles designed for large organizations who need to meet compliance standards required by state or industry regulators. Progent's security assessment service bundles offer enterprises an opportunity to get a professional look at the viability of their security profile. For every security assessment package, Progent engineers with top security credentials study and report on captured data and offer suggestions for efficient improvements. All the network security assessment packages include an extra-cost option for onsite engineers at any location in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, commonly known as PEN testing, is an accepted technique for allowing businesses to determine how open their IT systems are to current-generation threats. Progent's stealth penetration testing services test how effectively your existing security policies and technologies resist authorized but unannounced intrusion attempts launched by Progent's experienced security experts using advanced hacking techniques. Read about Progent's stealth penetration testing services.
If your company is currently fighting a security crisis and you have no detailed recovery procedure, visit Progent's Remote Network Help to learn how to receive immediate assistance. Progent provides online technical support from experienced network technicians and can escalate problems to high-level security experts if required. Your organization does not need to be a registered Progent customer to receive emergency help for a security problem, but you can register as a Progent customer in advance for free and your standing as a current client could save precious time in a crisis.
Typically, smaller businesses have not documented a recovery procedure in the event of a successful security breach. This is not good, since the damage from a serious security attack can be more catastrophic for a small business than for a big corporation. Progent's security engineers can help your you to create a practical recovery and incident reporting plan that reduces the network downtime resulting from an attack. The step-by-step incident response model promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method for responding to a major security penetration.
High-value Security Services Offered by Progent
Progent's veteran engineers can provide advanced support in vital facets of computer compliance such as:
Progent's Security Certifications
- Information Risk Audits and Compliance Assessment
Progent provides experience with information risk evaluation utilities like MS Baseline Security Analyzer or LANguard for conducting a variety of automatic network scans to reveal possible security gaps. Progent has broad skills with these utilities and can help you to understand audit reports and react appropriately. Progent's certified security consultants also can perform web software testing and can conduct expert evaluation of enterprise-wide security to determine your company's compliance with important global security standards including HIPAA, PCI, and ISO. In addition, Progent can assess the strength of your wireless security covering stationary wireless equipment as well as portable devices. Read the details concerning Progent's Security Vulnerability Audits and Security Compliance Testing.
- Designing, Building, and Validating Secure Environments
Any organization ought to develop a carefully considered security plan that includes both preventive and responsive steps. The proactive strategy is a set of precautions that helps to minimize vulnerabilities. The post-attack plan specifies procedures to assist security personnel to assess the losses resulting from an attack, repair the damage, document the experience, and revive business functions as soon as possible. Progent can show you how to build security into your business processes, set up scanning utilities, create and execute a secure IT architecture, and recommend processes and policies that will maximize the safety of your computing environment. Progent's security experts are ready to assist you to set up a firewall, design protected remote connectivity to e-mail and data, and configure an efficient virtual private network (VPN). If your company is looking for an economical option for jobbing out your security administration, Progent's 24x7 Monitoring Services include automated online system monitoring and immediate response to problems.
- System Recovery and Failure Analysis
Progent offers expertise in recovering networks and devices that have been hacked, are suspect, or have failed following a security attack. Progent can show you how to assess the losses resulting from the attack, restore normal functions, and recover data compromised owing to the attack. Progent's certified engineers can also perform a thorough forensic analysis by examining event logs and using a variety of advanced forensics techniques. Progent's experience with security consulting reduces your downtime and allows Progent to propose efficient ways to avoid or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
- Other Firewall and VPN Solutions Offered by Progent
In addition to supporting a broad range of security solutions available from Microsoft and Cisco, Progent offers small and mid-size companies expert consulting for security products from other important firewall and VPN suppliers by providing services such as:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) software and services are designed to make sense the enormous amounts of data collected in security incident logs created by a wide range of sources including network appliances, servers, and application software and tools. SIEM applications organizes the security event records from these various sources and creates summary reports of security events as mandated by government regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network infrastructure experts can help organizations to plan, install and operate a SIEM system that helps them to see the behavior of security incidents and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's security specialists have been awarded the most respected certifications offered in the industry. All of these accreditations demand extensive examinations and proven field background to guarantee that candidates have acquired expertise with a substantial body of security information and techniques and can offer advanced security solutions to information networks of any size.
Contact Progent for Computer Security Expertise
- CISM Security Consulting Services
Certified Information Security Manager (CISM) identifies the basic skills and international benchmarks of performance that computer security managers are expected to achieve. It offers business management the assurance that consultants who have been awarded their CISM possess the experience and skill to offer efficient security management and consulting support. Progent can provide a CISM-certified expert to assist your enterprise in key security areas such as data protection governance, risk assessment, data security process control, and crisis response support. Get additional details about Progent's Certified Information Security Manager Security Consulting Services.
- CISSP Security Support Expertise
Progent's CISSP experts are security specialists who have earned CISSP certification through verified professional work, extensive study, and formal examination. CISSP qualification recognizes mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration practices, security architecture and test systems, connection permission systems, software development security, business processes security, hardware security, cryptography, communications, Internet security, and business continuity planning. Read more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Security Architecture Consulting Support Services
Progent's CISSP-ISSAP Certified security architecture consultants have earned ISSAP accreditation as a result of thorough testing and extensive experience. field experience with network security design. ISSAP consultants possess in-depth knowledge of access control systems and techniques, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and DRP, and physical security. Progent's CISSP-ISSAP-certified security specialists can assist your company with all phases of secure network architecture. Learn additional information concerning Progent's ISSAP Certified Protected IT Architecture Consulting Services.
- Certified Information Systems Auditor (CISA) Support Services
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that indicates expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo an extensive examination given by the ISACA professional association. Progent can provide the expertise of a CISA-Premier security audit professional trained to assist businesses in the areas of IS audit process, IT governance, systems and infrastructure planned useful life, information technology service delivery, safeguarding data assets, and disaster recovery preparedness. Find out additional information concerning Progent's CISA Support Expertise.
- CRISC-certified IT Risk Mitigation Specialists
The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's network risk management services are a good fit the services available from Progent's CISA-Certified security engineers for impartially evaluating your IS control design and with the expertise of Progent's CISM experts for designing security policies. Find out more details about Progent's CRISC-certified Risk Management Consulting.
- GIAC Consulting Services
Global Information Assurance Certification was established in 1999 to validate the skill of network security professionals. GIAC's mission is to ensure that an accredited professional possesses the knowledge necessary to deliver support in important areas of network, information, and software security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency. Progent offers the help of GIAC certified security engineers for any of the network security services addressed under GIAC accreditation programs including auditing security systems, incident response, traffic analysis, and web-based services security. Get additional information about Progent's Global Information Assurance Certification Consulting Services.
If you want computer security consulting, telephone Progent at 800-993-9400 or visit Contact Progent.