Overview of Progent's Security Consulting Services
Progent's certified network security professionals can provide a broad range of services designed to assist companies of all sizes to identify and eliminate security weaknesses, block assaults, recover from the problems resulting from a breakdown of security, and meet regulatory requirements for guarding information and reporting incidents. Progent offers a selection of service delivery models:
On-demand Security and Compliance Consulting Services
- As-needed remote and on-site support billed to the nearest minute
- On-going fully managed services invoiced at a low fixed monthly rate
- Value-priced service bundles for a one-time security assessment
Once you sign up for Progent's services (signing up is free), you can receive on-demand remote or onsite assistance from a Progent security and compliance expert. This traditional support model is essentially reactive and optimized for quickly taking care of technical issues that are impacting your productivity or that have stumped your in-house support personnel. Common scenarios are replacing a firewall or VPN connection, installing a critical security patch for a Cisco switch, setting up compliant access to cloud-based resources, or recovering from a ransomware attack. These security services are billed to the nearest minute, which eliminates the frustrating case of receiving big bills for fast fixes.
Delivery alternatives for Progent's as-needed support include:
Progent's security consultants are premier to support systems powered by Microsoft, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's wide selection of services addresses firewall configuration, e-mail systems, protected network design, and data restoration. Progent's technical support team has earned the world's top security credentials including Global Information Assurance Certification and Information System Security Architecture Professional (ISSAP). Progent also offers immediate access to remote Cisco CCIE network engineers who can deliver world-class support with tough network integration issues.
- Remote Security Support
Most security-related issues can be resolved online via a mix of phone support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide online security support by offering efficient access to consultants with the background and technical resources to fix many of the most difficult problems quickly, making your support costs affordable and minimizing lost productivity.
- On-premises Security Services
For instances where on-premises support is necessary, Progent can dispatch a technical professional to major cities across the United States. Progent can also dispatch a security consultant with top certifications and world-class skills to any site in the U.S.
ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis tools to guard endpoints as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to automate the complete threat lifecycle including blocking, identification, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering through leading-edge tools packaged within a single agent accessible from a unified control. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that addresses your organization's specific requirements and that allows you achieve and demonstrate compliance with government and industry information protection regulations. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate action. Progent's consultants can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of vital data, apps and VMs that have become unavailable or damaged as a result of hardware failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR consultants can deliver world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can help you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to provide centralized management and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and affordable for small and mid-sized businesses to diagram, track, reconfigure and troubleshoot their networking hardware like switches, firewalls, and load balancers as well as servers, endpoints and other networked devices. Using cutting-edge RMM technology, WAN Watch makes sure that network maps are always current, captures and manages the configuration information of virtually all devices on your network, tracks performance, and sends alerts when problems are discovered. By automating time-consuming management processes, WAN Watch can knock hours off ordinary tasks like making network diagrams, expanding your network, finding appliances that need critical software patches, or isolating performance bottlenecks. Learn more details about ProSight WAN Watch infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates state-of-the-art remote monitoring and management (RMM) technology to help keep your network running at peak levels by tracking the health of critical computers that power your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT management staff and your Progent consultant so that any looming problems can be addressed before they can disrupt your network Learn more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's IT support experts. Under the ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data about your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can eliminate up to half of time wasted searching for critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and affordable way for small and medium-size businesses to obtain an unbiased assessment of the health of their IT system. Powered by some of the top remote monitoring and management (RMM) platforms in the industry, and overseen by Progent's certified team of IT experts, ProSight Network Audits help you see how well the deployment of your essential network assets adhere to leading practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and provide immediate ROI like a more manageable Active Directory environment. Both versions also include one year of cutting-edge remote network monitoring and management. Advantages can include lower-cost management, improved compliance with government and industry security requirements, more efficient utilization of network assets, faster problem resolution, more dependable backup and recovery, and increased uptime. Read more information about ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report service is an affordable service built around a brief interview with a Progent information assurance expert. The interview is intended to help assess your organization's preparedness to block or recover quickly after an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to collect information about your current security profile and backup system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can apply best practices to create a cost-effective security and backup environment that meets your company's requirements. For more information, refer to The ProSight Ransomware Preparedness Report.
Set-price Security Evaluation and Validation Packages
Progent has put together a variety of fixed-price security assessment packages that deliver exceptional value by utilizing Progent's advanced network monitoring and analysis tools as well as Progent's consulting skills to create an unbiased and comprehensive evaluation of your IT environment security posture.
Our Network Has Been Hacked: What Do We Do?
- Security Assessment Service Packages for Small Businesses
Progent offers two value-priced security inventory packages intended to allow small organizations to obtain a professional security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your network from beyond your firewalled perimeter to identify potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security expert runs a network scan using an authorized computer within your company firewall to assess your exposure to inside threats. The two security inventory scanning services are configured and run from a secured offsite location. The scan is managed by a consultant who has been awarded high-level security certifications and who creates a report that describes and interprets the information captured by the scan and suggests various enhancements where appropriate.
- Security Vulnerability Assessment Bundles for Large Organizations
Progent has developed three levels of flat-rate security assessment service bundles designed for enterprises who want to meet security standards required by state or industry agencies. Progent's security assessment service packages offer enterprises an opportunity to get an objective assessment at the viability of their security posture. For every security evaluation package, Progent consultants with advanced security credentials study and report on captured data and offer recommendations for efficient improvements. All the network security assessment bundles include an extra-cost option for onsite engineers at any location in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, often known as PEN testing, is a critical technique for helping businesses to find out how vulnerable their IT systems are to modern threats. Progent's stealth penetration testing services test how effectively your corporate security policies and technologies resist authorized but unannounced intrusion attempts launched by Progent's certified security experts using advanced hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
If your business is currently experiencing a security emergency and you have no detailed recovery plan, refer to Progent's Online Network Support to learn how to receive fast assistance. Progent provides remote technical support from experienced engineers and can refer problems to certified security experts if required. Your organization does not need to be a registered Progent client to get emergency help for a security problem, but you can register as a Progent customer in advance for free and your standing as a registered client could save valuable time during a crisis.
Typically, smaller businesses have no response plan in the event of a damaging attack. This is not good, since the cost of a successful security attack can be even more catastrophic for a small business than for a big corporation. Progent's security consultants can help your you to design a practical response and incident reporting procedure that minimizes the network disruption resulting from a security breach. The step-by-step incident handling model outlined by Global Information Assurance Certification is Progent's suggested procedure for responding to a serious security incident.
High-value Security Services Offered by Progent
Progent's seasoned consultants offer consulting support in vital facets of network protection such as:
Progent's Security Credentials
- Security Vulnerability Evaluation and Security Compliance Testing
Progent offers expertise with security auditing software like Microsoft Baseline Security Analyzer and LANguard for conducting a variety of comprehensive network scans to uncover potential security gaps. Progent has extensive skills with scanning tools and can help you to understand assessment results and react efficiently. Progent's security engineers also provide web application validation and can conduct expert evaluation of enterprise-wide security to determine your company's compliance with important worldwide security standards such as FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security covering fixed wireless equipment plus portable devices. Get more information concerning Progent's Vulnerability Evaluation and Compliance Testing.
- Planning, Implementing, and Testing Secure Environments
Any organization should develop a thoroughly thought out security strategy that incorporates both proactive and reactive activity. The proactive plan is a set of precautions that works to reduce vulnerabilities. The post-attack plan defines activities to help security staff to assess the damage caused by an attack, remediate the damage, document the event, and restore business functions as soon as feasible. Progent can advise you how to incorporate security into your business processes, configure auditing software, define and execute a safe network architecture, and recommend procedures and policies that will maximize the protection of your computing environment. Progent's security professionals are ready to help you to set up a firewall, deploy safe remote connectivity to email and files, and install an effective virtual private network. If you are looking for an economical way for outsourcing your network security administration, Progent's 24x7 Monitoring Options feature automated online system monitoring and quick resolution of emergencies.
- System Recovery and Failure Analysis
Progent provides skill in recovering systems and computers that have been compromised, are suspect, or have stopped working as a result of a security breakdown. Progent can help assess the losses resulting from the attack, restore ordinary functions, and recover information compromised owing to the attack. Progent's certified specialists can also manage a thorough forensic evaluation by examining event logs and using other advanced forensics techniques. Progent's background with security problems minimizes your off-air time and permits Progent to suggest effective measures to avoid or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
- Additional Firewall and Virtual Private Network (VPN) Solutions
As well as being expert in a broad range of protection solutions available from Microsoft and Cisco, Progent offers small and mid-size organizations top-level engineering services for technologies from other major firewall and VPN suppliers such as:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are intended to interpret the enormous quantity of information collected in security event records created by multiple sources including network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM software analyzes the security logs from these diverse sources and produces summary reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network experts can help organizations to plan, install and operate a SIEM solution that helps them to see the behavior of security incidents and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's security consultants have been awarded some of the most respected accreditations offered in the security industry. All of these accreditations require extensive testing and demonstrated work background to ensure that recipients have mastered a significant body of security knowledge and techniques and can offer advanced consulting to computer networks of any size.
Depend on Progent for Network Security Support
- Certified Information Security Manager Security Support Services
Certified Information Security Manager identifies the fundamental skills and international benchmarks of service that IT security professionals are expected to master. It provides executive management the assurance that those who have earned their CISM have the background and knowledge to provide effective security management and consulting services. Progent can offer a CISM-certified support professional to help your organization in vital security areas including data protection governance, risk assessment, data security program management, and crisis handling support. Read more information concerning Progent's Certified Information Security Manager Security Support Assistance.
- CISSP Security Support Expertise
Progent's CISSP consultants are security engineers who have earned CISSP status as a result of demonstrated experience, extensive study, and formal examination. CISSP qualification recognizes mastery of a worldwide standard for IT security. ANSI has granted the CISSP status accreditation in the area of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration practices, security design and models, access control systems, software development security, business processes security, physical security, cryptography, communications, network security, and disaster recovery planning. Learn additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Assistance.
- CISSP-ISSAP} Security Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP accreditation following rigorous examination and significant experience. field experience with network security design. ISSAP security experts possess in-depth understanding of access control mechanisms and techniques, telecommunications and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security. Progent's CISSP-ISSAP-premier security specialists can assist your business with all aspects of secure network architecture. Learn the details concerning Progent's ISSAP Certified Secure Network Architecture Consulting Services.
- CISA Professional Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that represents expertise in information system security auditing. Certified by the American National Standards Institute, the CISA credential has candidates undergo an exhaustive examination administered by the ISACA international professional association. Progent can provide the expertise of a CISA-Certified security engineer able to help companies in the areas of IS audit services, information technology enforcement, systems and infrastructure lifecycle, information technology service delivery, protecting data resources, and disaster recovery planning. Read additional details concerning Progent's CISA Consulting Assistance.
- CRISC-certified Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's skills to design, implement, and support information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's risk mitigation expertise is complementary to the support available from Progent's CISA-Certified security engineers for impartially auditing your IT management mechanisms and also with the services of Progent's CISM support professionals for defining security policies. Find out additional details about Progent's CRISC-certified Network Risk Management Support.
- Global Information Assurance Certification Support Services
GIAC was established in 1999 to certify the knowledge of network security experts. GIAC's goal is to make sure that an accredited security consultant possesses the skills needed to deliver services in important categories of system, data, and application security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. NSA. Progent can provide the help of GIAC certified security engineers for all of the security capabilities covered within GIAC accreditation programs such as assessing networks, incident response, traffic analysis, and web application security. Learn additional information about Progent's GIAC Support Expertise.
If you need computer security help, telephone Progent at 800-993-9400 or refer to Contact Progent.