Introduction to Progent's Security Consulting Services
Progent's industry certified computer security experts can provide a wide selection of support services designed to help businesses of any size to uncover and correct security vulnerabilities, block malicious attacks, remediate the issues caused by a breach of security, and comply with government requirements for protecting information and reporting incidents. Progent can provide a selection of service modes:
As-needed Security and Compliance Consulting Services
- As-needed online and on-premises support invoiced to the nearest minute
- On-going fully managed services invoiced at a low flat monthly rate
- Value-priced service packages for a single security evaluation
After you sign up for Progent's services (signing up is free), you can get on-demand remote or onsite support from a Progent security consultant. This traditional service model is essentially reactive and optimized for rapidly resolving IT issues that are impacting your productivity or that are beyond the scope of your in-house support personnel. Typical scenarios include configuring a firewall appliance or VPN connection, installing a critical security patch for a Cisco switch or router, designing compliant access to cloud-based resources, or recovering from a ransomware assault. These security services are invoiced to the nearest minute, which avoids the annoying situation of getting big invoices for fast fixes.
Delivery alternatives for Progent's on-demand support include:
Progent's accredited consultants are premier to provide help for systems based on Microsoft Windows, Linux, Mac, Sun, and major derivatives of UNIX. Progent's broad array of consulting services addresses firewall configuration, email systems, secure system design, and information restoration. Progent's support staff has earned the industry's top security certifications including Certified Information Systems Auditor (CISA) and CISSP. Progent also offers immediate access to online Cisco CCIE network infrastructure consultants who can provide world-class support with complex network integration issues.
- Remote Security Support
Most security-related issues can be handled remotely through a combination of phone support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants who have the experience and technical resources to fix some of the most difficult problems quickly, making your support expenses affordable and reducing lost productivity.
- Onsite Security Support Services
For instances where on-premises support is required, Progent can send a technical expert to major metropolitan areas throughout the U.S. Progent can also send a security specialist with top certifications and advanced skills to any site in the U.S.
ProSight Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning tools to defend endpoints and physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to manage the entire threat progression including blocking, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your organization's specific needs and that allows you prove compliance with legal and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
- ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup processes and allows fast recovery of critical data, apps and VMs that have become unavailable or damaged due to component failures, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery specialists can deliver world-class support to configure ProSight DPS to to comply with regulatory standards such as HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to deliver centralized control and world-class protection for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and encryption. The local gateway can also assist Exchange Server to monitor and protect internal email that stays inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage prevention.
- ProSight WAN Watch: Infrastructure Management
Progentís ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for smaller businesses to map out, track, enhance and debug their networking appliances such as switches, firewalls, and wireless controllers plus servers, printers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch makes sure that infrastructure topology diagrams are kept updated, copies and displays the configuration information of almost all devices on your network, tracks performance, and sends notices when problems are detected. By automating complex management and troubleshooting activities, ProSight WAN Watch can knock hours off common tasks such as network mapping, expanding your network, locating appliances that require critical software patches, or resolving performance problems. Find out more about ProSight WAN Watch network infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring managed service that incorporates advanced remote monitoring and management (RMM) techniques to help keep your IT system operating efficiently by checking the health of critical computers that drive your business network. When ProSight LAN Watch detects a problem, an alarm is transmitted immediately to your designated IT management staff and your assigned Progent engineering consultant so any potential issues can be resolved before they have a chance to impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved easily to an alternate hardware environment without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data related to your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as half of time spent searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost way for small and medium-size organizations to get an unbiased assessment of the overall health of their IT system. Powered by a selection of the leading remote monitoring and management tools in the industry, and supervised by Progent's certified group of IT experts, ProSight Network Audits help you see how well the deployment of your core infrastructure assets conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant ROI like a more manageable Active Directory environment. Both versions also include a year of state-of-the-art remote network monitoring and management. Advantages can include easier management, improved compliance with data security requirements, more efficient utilization of network resources, faster problem resolution, more dependable backup and recovery, and increased uptime. See more about Progent's ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service based on a phone discussion with a Progent information assurance expert. The interview is intended to help evaluate your organization's ability either to block or recover rapidly following an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to collect information about your existing security profile and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can follow best practices to create a cost-effective security and backup/recovery environment that aligns with your business needs. For more information, visit Progent's ProSight Ransomware Preparedness Report Service.
Set-price Security Evaluation and Validation Packages
Progent offers a portfolio of flat-rate security and compliance assessment bundles that deliver high value by deploying Progent's enterprise-class network monitoring and analysis software plus Progent's consulting experience to produce an objective and thorough evaluation of your IT environment security posture.
Our System Has Been Hacked: What Do We Do Now?
- Security Inventory Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory service packages designed to allow small organizations to obtain an objective security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your network from outside your firewalled perimeter to determine possible gaps in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan using an authorized computer within your firewalled perimeter to assess your vulnerability to internal assaults. These two security inventory scanning services are configured and run from a secured external site. The project is managed by a consultant who has been awarded advanced security certifications and who creates a document that describes and evaluates the information collected by the scan and recommend practical enhancements where required.
- Security Vulnerability Assessment Bundles for Large Organizations
Progent has developed three levels of flat-rate security evaluation service packages designed for enterprises who want to meet compliance standards required by government or industry regulators. Progent's security assessment service packages offer larger organizations an opportunity to obtain a professional assessment at the strength of their security profile. For every security evaluation package, Progent engineers with advanced security credentials study and report on collected data and offer recommendations for cost-effective remediation. Each of the network security audit packages include an added-cost option for on-premises engineers anywhere in the United States.
- Stealth Penetration Testing
Stealth penetration testing, commonly called PEN testing, is a critical tool for helping organizations to determine how vulnerable their IT environments are to current-generation attacks. Progent's stealth penetration testing services test how effectively your existing security policies and platforms resist authorized but unannounced intrusion attempts launched by Progent's veteran security specialists utilizing advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If your company is now fighting a network security crisis and you do not have a detailed recovery procedure, visit Progent's Online Computer Support to see how to receive fast assistance. Progent provides remote technical support from skilled network technicians and can escalate trouble tickets to certified security experts if necessary. Your organization does not have to be a registered Progent client to receive urgent help for a security problem, but you can register as a Progent client ahead of time for free and your standing as a current customer could save precious time during a crisis.
Usually, smaller organizations do not have a response plan in the event of a damaging penetration. This is risky, since the damage from a successful security assault can be even more devastating for a small business than for a large corporation. Progent's security engineers can help your company to create a sensible response and incident reporting procedure that reduces the network downtime following a security breach. The step-by-step post-attack response model outlined by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for reacting to a major security penetration.
Advanced Security Expertise Offered by Progent
Progent's seasoned engineers can provide expertise in key areas of computer protection such as:
Progent's Security Credentials
- Security Vulnerability Audits and Compliance Assessment
Progent provides expertise with information risk auditing software like MS Baseline Security Analyzer and LANguard from GFI for performing a set of automatic network tests to identify possible security holes. Progent has extensive experience with monitoring tools and can assist your company to understand assessment results and react efficiently. Progent's security consultants also offer web software validation and can conduct thorough assessments of enterprise-wide security to verify your company's compliance with key global security standards including HIPAA, NIST, and ISO. Also, Progent can evaluate the strength of your wireless protection including fixed wireless appliances plus portable handsets. Read more details about Progent's Information Risk Evaluation and Security Compliance Assessment.
- Designing, Implementing, and Validating Secure Networks
Every company should have a carefully considered security plan that includes both proactive and reactive steps. The pre-attack plan is a set of steps that works to reduce security holes. The reactive plan defines activities to assist security personnel to evaluate the losses caused by a breach, remediate the damage, record the experience, and restore business functions as quickly as feasible. Progent can advise you how to incorporate protection into your company processes, set up auditing software, create and execute a safe network infrastructure, and propose processes and policies that will maximize the protection of your computing environment. Progent's security professionals are available to help you to set up a firewall, design protected offsite connectivity to e-mail and data, and configure an effective VPN. If you are looking for an affordable option for outsourcing your network security management, Progent's 24x7 Network Support Options include continual remote server monitoring and quick response to emergencies.
- Data Restoration and Security Forensics
Progent provides skill in recovering systems and computers that have been hacked, are in question, or have failed as a result of a security attack. Progent can show you how to determine the losses caused by the assault, return your company to ordinary functions, and recover information lost owing to the event. Progent's security engineers can also manage a thorough failure evaluation by going over event logs and using a variety of advanced forensics techniques. Progent's background with security issues reduces your business disruption and allows Progent to propose efficient strategies to prevent or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your legacy PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower Services integration and troubleshooting support.
- Other Firewall and VPN Consulting Services Provided by Progent
In addition to supporting a wide array of network security technologies from Microsoft and Cisco, Progent offers small companies expert consulting for products from other popular firewall and VPN suppliers by offering services including:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are designed to digest the massive amounts of information collected in security incident logs generated by multiple sources such as network infrastructure appliances, operating systems, and application software and tools. SIEM applications organizes the security logs from these various sources and creates consolidated reports of security incidents as required by state regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco-certified network consultants can assist organizations to design, install and operate a SIEM solution that enables them to see the progress of security incidents and comply with security incident reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's security consultants have earned some of the most respected certifications available in the security industry. These certifications require exhaustive testing and demonstrated field experience to ensure that candidates have acquired expertise with a substantial amount of security knowledge and methodologies and can provide advanced consulting to information networks of any size.
Depend on Progent for Computer Security Expertise
- CISM Security Consulting Expertise
CISM identifies the basic competencies and international benchmarks of performance that information security managers are expected to master. CISM provides business management the confidence that those who have earned their CISM have the background and skill to provide efficient security administration and consulting support. Progent can provide a CISM-certified support professional to help your organization in critical security areas such as information protection governance, risk assessment, information security process management, and incident response management. Find out more details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
- CISSP Security Support Services
Progent's CISSP consultants are security specialists who have been awarded CISSP status through verified experience, extensive study, and exhaustive examination. CISSP qualification recognizes expertise in an international standard for information security. ANSI has given the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration procedures, security architecture and test systems, connection control methodology, applications development security, business processes security, hardware security, cryptography, communications, Internet security, and business continuity planning. Find out more details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
Progent's CISSP-ISSAP Certified security architecture consultants have earned ISSAP certification after thorough examination and extensive hands-on work with network security architecture. ISSAP security experts have comprehensive understanding of access management mechanisms and techniques, telecommunications and network security, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's CISSP-ISSAP-certified security experts can help your company with all aspects of secure network architecture. Read additional details concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Services.
- CISA Professional Services
The Certified Information Systems Auditor accreditation is a recognized achievement that represents mastery in IS security auditing. Certified by ANSI, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA professional group. Progent offers the expertise of a CISA-Certified security audit engineer trained to assist businesses in the fields of information systems audit services, IT administration, systems and infrastructure lifecycle, information technology service delivery, protecting information assets, and business continuity preparedness. Find out the details about Progent's Certified Information Systems Auditor (CISA) Support Services.
- CRISC-certified IT Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's ability to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk mitigation services are a good fit the support provided by Progent's CISA-Certified consultants for impartially assessing your IS control design and with the services of Progent's CISM experts for designing company-wide security policies. Find out the details about Progent's CRISC IT Risk Management Expertise.
- GIAC Consulting Expertise
GIAC was established in 1999 to validate the skill of network security engineers. GIAC's goal is to ensure that a certified security consultant has the knowledge needed to provide support in important categories of network, information, and application security. GIAC certifications are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent offers the assistance of certified consultants for any of the network security services addressed under GIAC accreditation topics including auditing perimeters, security incident handling, traffic analysis, and web-based services security. Learn more information concerning Progent's Global Information Assurance Certification Consulting Services.
If you're looking for computer security consulting expertise, call Progent at 800-993-9400 or refer to Contact Progent.