Introduction to Progent's Security and Compliance Consulting Services
Progent's certified network security professionals offer a wide range of support services designed to assist organizations of any size to detect and correct security weaknesses, block assaults, remediate the problems resulting from a breakdown of security, and meet regulatory requirements for guarding information and reporting incidents. Progent can provide a selection of service delivery models:

  • As-needed online and on-site assistance invoiced to the nearest minute
  • On-going managed services invoiced at a low flat monthly rate
  • Set-price service packages for a single security evaluation
On-demand Security and Compliance Consulting Services
Once you sign up for Progent's services (registration is free), you can get on-demand remote or on-premises assistance from a Progent security consultant. This traditional support model is essentially reactive and optimized for rapidly resolving IT problems that are impacting your productivity or that have stymied your own support staff. Typical examples include replacing a firewall appliance or VPN connection, implementing a critical security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or recovering from a ransomware attack. These services are billed by the minute, which avoids the frustrating case of getting large bills for fast fixes.

Delivery alternatives for Progent's as-needed support include:

  • Online Security Support
    The majority security problems can be handled remotely via a mix of phone help and an connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide online security help by offering easy access to consultants with the background and technical resources to fix some of the most challenging problems quickly, making your service costs affordable and reducing lost productivity.
  • Onsite Security Services
    For cases where onsite assistance is required, Progent can dispatch a technical professional to major metropolitan areas throughout the United States. Progent can also dispatch a security consultant with high-level certifications and world-class skills to any site in the country.
Progent's security engineers are certified to provide help for environments powered by Microsoft, Linux, Apple Mac, Solaris, and major versions of UNIX. Progent's broad range of consulting services covers firewall configuration, email and messaging systems, secure network design, and information recovery. Progent's technical support team has earned the world's top security accreditations including CISM and Information System Security Architecture Professional. Progent also offers immediate access to remote Cisco-certified CCIE network engineers who can deliver advanced assistance with tough network integration issues.

ProSight Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:

  • ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis technology to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely escape traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a unified platform to automate the entire malware attack lifecycle including protection, identification, containment, remediation, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Unified Endpoint Protection
    Progent's ProSight Enhanced Security Protection services offer affordable in-depth security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge tools packaged within a single agent managed from a single console. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP environment that meets your organization's specific needs and that helps you demonstrate compliance with government and industry information security regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent attention. Progent can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

  • ProSight Data Protection Services: Managed Backup
    ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates and monitors your backup activities and allows fast restoration of vital files, apps and virtual machines that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can provide world-class expertise to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.

  • ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
    ProSight Email Guard is Progent's email security platform that uses the technology of top information security companies to deliver centralized control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for smaller organizations to diagram, monitor, reconfigure and debug their connectivity hardware such as routers, firewalls, and access points plus servers, printers, endpoints and other networked devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that infrastructure topology diagrams are kept updated, captures and displays the configuration of almost all devices connected to your network, monitors performance, and sends alerts when potential issues are detected. By automating complex management and troubleshooting processes, ProSight WAN Watch can cut hours off ordinary chores such as making network diagrams, reconfiguring your network, finding appliances that need critical updates, or resolving performance issues. Find out more about ProSight WAN Watch network infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to keep your network operating efficiently by checking the health of critical computers that power your information system. When ProSight LAN Watch uncovers a problem, an alarm is transmitted immediately to your designated IT management staff and your Progent engineering consultant so that all looming problems can be resolved before they have a chance to disrupt productivity Find out more details about ProSight LAN Watch server and desktop remote monitoring consulting.

  • ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
    With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved immediately to a different hosting environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Infrastructure Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By updating and managing your network documentation, you can save up to 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a fast and low-cost way for small and mid-size businesses to get an objective assessment of the overall health of their IT system. Powered by a selection of the top remote monitoring and management tools available, and supervised by Progent's world-class group of IT professionals, ProSight Network Audits help you see how well the deployment of your essential infrastructure assets adhere to industry best practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide instant benefits such as a cleaner Active Directory (AD) environment. Both also come with a year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, improved compliance with information security regulations, higher utilization of IT assets, faster problem resolution, more reliable backup and recovery, and less downtime. Read more about ProSight Network Audits network infrastructure review.

Progent's ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service centered on a brief phone discussion with a Progent information assurance expert. The fact-finding interview is designed to assess your organization's preparedness either to stop or recover quickly after an assault by a ransomware strain like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to collect information about your existing security profile and backup system, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can follow best practices to create an efficient security and backup/recovery environment that aligns with your business requirements. For additional information, refer to Progent's ProSight Ransomware Preparedness Report Service.

Fixed-price Security Evaluation and Validation Packages
Progent offers a selection of set-price security assessment bundles that provide exceptional value by utilizing Progent's advanced system monitoring software plus Progent's technical skills to produce an unbiased and thorough evaluation of your IT environment security profile.

  • Security Assessment Service Packages for Small Businesses
    Progent offers two ultra-affordable security inventory service packages intended to enable small organizations to get an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a consultant manages an extensive examination of your network from outside your firewalled perimeter to identify possible gaps in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert executes a system scan using an authorized machine inside your firewalled perimeter to assess your exposure to internal threats. The two security inventory scans are set up and executed from a secured external site. The scan is administered by a consultant who has been awarded high-level security certifications and who produces a document that details and interprets the information collected by the security scan and recommend various enhancements where required.
  • Security Vulnerability Assessment Packages for Large Businesses
    Progent offers three levels of fixed-price security evaluation service packages intended for enterprises who need to meet security standards required by government or industry agencies. Progent's security assessment service packages offer enterprises a chance to get an objective assessment at the strength of their security profile. For every security evaluation bundle, Progent consultants with advanced security credentials study and report on collected data and offer recommendations for efficient improvements. Each of the network security audit packages include an added-cost option for on-premises consultants anywhere in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly known as PEN testing, is an accepted tool for allowing businesses to find out how open their network environments are to current-generation threats. Progent's stealth penetration testing services test how effectively your existing security procedures and technologies stand up to authorized but unannounced penetration attempts managed by Progent's experienced security experts utilizing advanced hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
Our System Has Been Hacked: What Can We Do Now?
Network Security ConsultantsIf your business is now fighting a security emergency and you have not prepared a detailed recovery plan, go to Progent's Online Network Help to find out how to receive fast assistance. Progent provides online technical support from experienced engineers and can escalate problems to high-level security specialists if required. Your business does not have to be a current Progent client to get urgent help for a security problem, but you can sign up as a Progent client ahead of time at no cost and your status as a registered client could save precious time when there is a crisis.

Typically, smaller businesses have no response procedure in the event of a successful attack. This is risky, since the cost of a successful security assault can be even more devastating for a small company than for a large enterprise. Progent's security engineers can assist your business to design a practical recovery and event reporting plan that minimizes the IT system downtime resulting from an attack. The step-by-step post-attack response procedure promoted by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for reacting to a serious security attack.

Advanced Security Expertise Available from Progent
Progent's certified security consultants offer consulting support in key areas of computer compliance including:

  • Security Vulnerability Audits and Compliance Assessment
    Progent provides experience with security auditing software such as MS Baseline Security Analyzer and LANguard from GFI for performing a variety of comprehensive system scans to identify potential security problems. Progent has extensive skills with scanning utilities and can assist you to analyze assessment results and respond efficiently. Progent's certified security consultants also provide web software validation and can conduct thorough assessments of corporate-wide security to verify your company's compliance with major global security specifications such as HIPAA, PCI, and ISO 17799. Also, Progent can assess the strength of your wireless protection covering fixed wireless appliances as well as mobile handsets. Learn the details concerning Progent's Information Risk Audits and Compliance Testing.
  • Designing, Implementing, and Testing Secure Networks
    Any company ought to have a thoroughly thought out security plan that incorporates both proactive and reactive steps. The proactive strategy is a set of steps that works to reduce security holes. The post-attack plan specifies procedures to assist IT personnel to assess the damage resulting from a breach, repair the damage, record the experience, and revive network activity as quickly as possible. Progent can advise you how to build protection into your business processes, install auditing utilities, create and execute a safe IT infrastructure, and propose processes and policies that will enhance the safety of your information system. Progent's security experts are available to assist you to configure a firewall, deploy safe online and mobile connectivity to e-mail and data, and install an effective virtual private network (VPN). If your company is interested in an economical option for outsourcing your network security management, Progent's 24x7 Network Support Services feature continual online system tracking and immediate resolution of problems.
  • Data Recovery and Security Forensics
    Progent offers skill in recovering systems and devices that have been compromised, are quarantined, or have stopped working following a security breakdown. Progent can help assess the losses caused by the attack, restore ordinary functions, and recover information compromised as a result of the assault. Progent's security engineers can also perform a thorough failure evaluation by examining activity logs and utilizing other advanced forensics techniques. Progent's experience with security consulting minimizes your business disruption and permits Progent to suggest effective strategies to avoid or contain future attacks.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
    Cisco CCIE Security ExpertsThe latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, optimize, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower integration and debugging services.
  • Other Firewall and Virtual Private Network Solutions Provided by Progent
    In addition to offering support for a broad range of security solutions from Microsoft and Cisco, Progent can provide small businesses top-tier support for technologies from other important firewall and Virtual Private Network (VPN) suppliers by delivering services including:
  • SIEM Integration and Support
    Security information and event management (SIEM) software and services are designed to interpret the enormous quantity of data collected in security event records created by multiple sources such as network appliances, servers, and application software and monitoring tools. SIEM software organizes the security event records from these various sources and produces summary reports of security events as mandated by government regulations and industry compliance standards. Progent's GIAC-certified information assurance consultants and Cisco-certified network infrastructure experts can help businesses to plan, install and manage a SIEM solution that enables them to see the behavior of attacks and comply with security incident reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's Security Certifications
Progent's security specialists have been awarded the most respected certifications available in the security industry. All of these accreditations demand extensive testing and demonstrated work experience to ensure that candidates have acquired expertise with a significant amount of security knowledge and methodologies and can offer advanced consulting to computer environments of any complexity.
  • Certified Information Security Manager Security Support Expertise
    Certified Information Security Manager (CISM) defines the fundamental competencies and international benchmarks of service that computer security professionals are expected to master. It offers executive management the confidence that consultants who have earned their CISM possess the background and skill to provide effective security administration and engineering support. Progent can offer a CISM consultant to help your enterprise in critical security disciplines including information protection governance, risk assessment, data protection process management, and incident response support. Learn additional information about Progent's Certified Information Security Manager Security Support Assistance.

  • CISSP Security Support Services
    Progent's CISSP experts are security specialists who have been awarded CISSP status as a result of verified professional work, rigorous study, and formal examination. CISSP Certification indicates mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security management procedures, security design and models, access control methodology, software development security, operations security, hardware security, encryption, communications, network security, and business continuity planning. Find out more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.

  • CISSP-ISSAP} Security Architecture Consulting Services
    Progent's CISSP-ISSAP Premier cybersecurity architecture experts have been awarded ISSAP accreditation after rigorous testing and significant experience. field experience with information security design. ISSAP security experts have acquired comprehensive knowledge of access management systems and methodologies, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security experts can assist your business with all phases of architecture security. Read more information about Progent's ISSAP Accredited Protected Network Architecture Consulting Assistance.

  • CISA Professional Services
    The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that signifies expertise in IS security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo an extensive test administered by the ISACA professional group. Progent can provide the services of a CISA-Premier security audit professional able to assist companies in the fields of IS audit process, information technology governance, systems and architecture planned useful life, IT service delivery, protecting data resources, and disaster recovery preparedness. Read the details concerning Progent's Certified Information Systems Auditor Consulting Services.

  • CRISC Network Risk Management Experts
    The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and support information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to create and execute a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's network risk management services are a good fit the services available from Progent's CISA-Certified consultants for impartially assessing your IS control design and also with the expertise of Progent's CISM-certified experts for implementing company-wide security policies. Read the details concerning Progent's CRISC-certified Network Risk Management Services.

  • GIAC (Global Information Assurance Certification) Consulting Expertise
    GIAC was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to make sure that an accredited security consultant has the knowledge appropriate to provide services in important categories of network, data, and application program security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the United States National Security Agency. Progent can provide the expertise of GIAC certified security engineers for all of the network security capabilities addressed under GIAC certification topics such as assessing IT infrastructure, incident response, intrusion detection, and web-based services security. Get more information concerning Progent's Global Information Assurance Certification Consulting Services.
Depend on Progent for Computer Security Expertise
If you're looking for computer security engineering help, call Progent at 800-993-9400 or visit Contact Progent.