Overview of Progent's Security Support Services
Progent's industry certified network security and compliance professionals can provide a broad selection of support services intended to assist companies of all sizes to identify and correct security weaknesses, block malicious attacks, remediate any issues resulting from a breakdown of protection, and comply with regulatory requirements for protecting data and reporting incidents. Progent can provide a selection of service delivery modes:
- On-demand remote and on-site support billed by the minute
- On-going managed services billed at a low fixed monthly rate
- Set-price service bundles for a single security evaluation
As-needed Security and Compliance Consulting Services
Once you sign up for Progent's services (registration is free), you can receive as-needed online or on-premises support from one of Progent security and compliance expert. This traditional support model is primarily reactive and geared toward quickly resolving technical problems that are affecting your network or that are beyond the scope of your own support personnel. Common examples are replacing a firewall or VPN connection, installing a critical security patch for a Cisco switch, designing compliant access to a public cloud, or restoring data after a ransomware attack. These security services are invoiced by the minute, which avoids the frustrating case of receiving large bills for quick fixes.
Delivery alternatives for Progent's on-demand support services include:
- Remote Security Support
The majority security issues can be handled remotely via a mix of phone support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide online security help by offering easy access to consultants with the background and technical resources to fix some of the most challenging problems quickly, keeping your support costs low and reducing downtime.
- Onsite Security Support Services
For cases where on-premises support is required, Progent can send a technical expert to major metropolitan areas across the United States. Progent can also send a security specialist with top certifications and world-class skills to any location in the U.S.
Progent's accredited security consultants are certified to support systems based on Microsoft, Linux, macOS and OS X, Sun Solaris, and major versions of UNIX. Progent's wide selection of services covers firewall technology, email security, protected network design, and information restoration. Progent's technical support staff has earned the world's most advanced security accreditations including Certified Information Security Manager (CISM) and ISSAP. Progent also offers fast access to online Cisco CCIE network engineers who can provide advanced assistance with complex network technology issues.
ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily get by legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to manage the entire malware attack lifecycle including protection, infiltration detection, containment, remediation, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer economical in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge tools packaged within a single agent managed from a single control. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with legal and industry information protection standards. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require urgent attention. Progent can also assist you to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and enables fast restoration of vital files, applications and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight DPS to be compliant with regulatory requirements such as HIPAA, FINRA, and PCI and, whenever needed, can assist you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security companies to provide web-based control and world-class security for all your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and affordable for small and mid-sized organizations to diagram, monitor, reconfigure and troubleshoot their networking appliances such as routers, firewalls, and wireless controllers as well as servers, printers, endpoints and other devices. Incorporating cutting-edge RMM technology, WAN Watch ensures that network maps are kept updated, captures and manages the configuration of almost all devices on your network, monitors performance, and generates alerts when issues are discovered. By automating complex management activities, ProSight WAN Watch can knock hours off ordinary chores such as making network diagrams, expanding your network, finding appliances that need critical software patches, or resolving performance issues. Find out more about ProSight WAN Watch infrastructure monitoring and management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progent’s server and desktop monitoring service that uses state-of-the-art remote monitoring and management (RMM) techniques to keep your network running efficiently by checking the health of critical computers that power your business network. When ProSight LAN Watch detects a problem, an alarm is sent automatically to your designated IT personnel and your Progent engineering consultant so all looming issues can be addressed before they have a chance to disrupt your network Find out more about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hosting solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether you’re planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits offer a quick and affordable alternative for small and medium-size businesses to obtain an unbiased evaluation of the overall health of their information system. Based on some of the leading remote monitoring and management (RMM) platforms available, and overseen by Progent's world-class team of information technology professionals, ProSight Network Audits show you how well the configuration of your essential infrastructure devices conform to industry leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide instant benefits such as a more manageable Active Directory (AD) system. Both also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include easier network management, better compliance with government and industry security standards, higher utilization of IT resources, quicker problem resolution, more reliable backup and recovery, and higher availability. Learn more about Progent's ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is a low-cost service built around a brief phone interview with a Progent information assurance consultant. The fact-finding interview is intended to help evaluate your company's ability to block or recover rapidly following an assault by a ransomware strain like Ryuk, WannaCry, NotPetya, or Hermes. Progent will consult with you personally to collect information about your existing AV defense and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report document describing how you can apply best practices to build an efficient AV and backup environment that aligns with your business requirements. For additional information, see Progent's ProSight Ransomware Preparedness Report Service.
Flat-rate Security Assessment and Validation Packages
Progent offers a selection of set-price security and compliance assessment bundles that provide exceptional value by utilizing Progent's advanced network monitoring tools plus Progent's consulting skills to produce an unbiased and comprehensive evaluation of your network security posture.
- Security Assessment Service Packages for Small Organizations
Progent offers two value-priced security inventory scanning service packages designed to allow small businesses to obtain an objective security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer manages an extensive examination of your network from beyond your corporate firewall to identify possible gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security consultant runs a network scan from an authorized computer inside your company firewall to evaluate your vulnerability to inside assaults. The two security inventory scans are configured and run from a secured offsite location. The project is managed by a consultant who has earned high-level security certifications and who creates a document that details and interprets the data collected by the scan and suggests various improvements where required.
- Security Vulnerability Assessment Bundles for Enterprises
Progent has developed three levels of flat-rate security assessment service bundles intended for large organizations who want to meet security standards required by government or industry agencies. Progent's security assessment service bundles offer larger organizations an opportunity to get a professional look at the strength of their security profile. For every security evaluation package, Progent consultants with top security credentials study and report on collected data and provide suggestions for cost-effective remediation. Each of the network security assessment bundles include an added-cost option for onsite engineers at any location in the United States.
- Stealth Penetration Testing
Stealth penetration testing, often called PEN testing, is a critical tool for helping organizations to find out how vulnerable their network environments are to modern threats. Progent's stealth penetration testing check how well your existing security policies and technologies resist authorized but unannounced penetration attempts managed by Progent's veteran security specialists using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing services.
Our Network Has Been Hacked: What Should We Do?
If you are currently faced with a security crisis and you have not prepared a detailed response plan, go to Progent's Remote Technical Help to see how to get fast assistance. Progent provides remote assistance from experienced engineers and can refer problems to high-level security experts if necessary. Your business does not have to be a current Progent client to get urgent help for a security breach, but you can register as a Progent customer in advance for free and your standing as a current customer can save valuable time during a crisis.
Typically, smaller companies have not documented a response procedure in the event of a damaging attack. This is not good, since the cost of a successful security assault can be even more catastrophic for a small company than for a large enterprise. Progent's security consultants can assist your company to create an effective recovery and event reporting procedure that reduces the network downtime following an attack. The step-by-step post-attack handling model promoted by GIAC (Global Information Assurance Certification) is Progent's recommended procedure for reacting to a serious security incident.
High-value Security Expertise Offered by Progent
Progent's certified security engineers offer advanced support in key facets of network protection including:
- Security Vulnerability Audits and Compliance Assessment
Progent provides expertise with security evaluation utilities like MS Baseline Security Analyzer or LANguard from GFI for conducting a set of comprehensive network scans to identify possible security gaps. Progent has extensive skills with these tools and can assist your company to understand assessment reports and respond appropriately. Progent's security consultants also offer web application validation and can conduct thorough evaluation of corporate-wide security to determine your organization's compliance with important worldwide security standards such as HIPAA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection including fixed wireless appliances as well as mobile handsets. Read additional information about Progent's Information Risk Audits and Security Compliance Assessment.
- Designing, Implementing, and Testing Protected Networks
Every company ought to have a carefully thought out security strategy that incorporates both preventive and responsive elements. The proactive strategy is a collection of steps that helps to minimize vulnerabilities. The post-attack plan defines activities to help security personnel to evaluate the losses resulting from a breach, remediate the damage, document the event, and revive business functions as quickly as possible. Progent can advise you how to design protection into your company operations, set up scanning utilities, define and execute a safe computer architecture, and propose procedures and policies to optimize the safety of your network. Progent's security professionals are ready to help you to configure a firewall, design safe offsite access to e-mail and files, and configure an efficient virtual private network. If you are interested in an economical option for outsourcing your security administration, Progent's 24x7 Network Support Packages include continual online server tracking and quick response to problems.
- System Recovery and Failure Analysis
Progent offers expertise in recovering networks and servers that have been hacked, are quarantined, or have failed as a result of a security breakdown. Progent can show you how to evaluate the damage resulting from the assault, restore ordinary business operations, and retrieve information compromised as a result of the breach. Progent's certified engineers can also oversee a thorough forensic analysis by examining activity logs and using other proven forensics techniques. Progent's experience with security problems minimizes your downtime and allows Progent to suggest effective ways to avoid or mitigate future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your existing PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
- Other Firewall and Virtual Private Network Consulting Services Provided by Progent
In addition to supporting a wide array of protection solutions available from Microsoft and Cisco, Progent can provide small companies top-level engineering services for security products from other popular firewall and Virtual Private Network (VPN) vendors by offering services including:
- SIEM Solutions
Security information and event management (SIEM) software and services are designed to make sense the enormous amounts of information represented by security incident records created by a wide range of sources such as network appliances, servers, and application software and tools. SIEM applications analyzes the security event records from these diverse sources and creates summary reports of security events as mandated by state regulations and industry compliance guidelines. Progent's GIAC-certified information assurance consultants and Cisco CCIE certified network infrastructure consultants can assist businesses to plan, install and operate a SIEM system that enables them to understand the behavior of security incidents and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned the most prestigious accreditations offered in the industry. All of these certifications require exhaustive examinations and demonstrated work background to ensure that recipients have acquired expertise with a significant body of security information and techniques and can provide high-level security solutions to computer networks of any size.
- Certified Information Security Manager (CISM) Security Support Expertise
Certified Information Security Manager (CISM) identifies the core skills and worldwide standards of performance that computer security managers are expected to achieve. It provides executive management the confidence that those who have been awarded their certification have the background and skill to offer effective security management and engineering services. Progent can offer a CISM-certified support professional to assist your enterprise in critical security disciplines such as information protection governance, risk management, information protection program management, and incident response support. Find out the details concerning Progent's CISM Security Consulting Services.
- Certified Information Systems Security Professionals (CISSP) Security Support Expertise
Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of demonstrated professional work, extensive study, and formal examination. CISSP qualification recognizes expertise in an international standard for IT security. ANSI has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge included within CISSP include security management practices, security architecture and models, connection control methodology, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning. Find out more information about Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Security Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier cybersecurity architecture consultants have earned ISSAP certification as a result of rigorous testing and extensive hands-on work with network security design. ISSAP consultants possess comprehensive knowledge of access control mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security integration. Progent's CISSP-ISSAP-certified security experts can assist your company with all aspects of secure network architecture. Get the details about Progent's ISSAP Accredited Secure System Architecture Consulting Services.
- CISA Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that represents expertise in information system security audit and control. Certified by ANSI, the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA international professional association. Progent can provide the expertise of a CISA-Certified security engineer able to help businesses in the fields of information systems audit process, IT enforcement, network assets and architecture lifecycle, information technology support, protecting information resources, and business continuity planning. Find out the details about Progent's Certified Information Systems Auditor (CISA) Professional Assistance.
- CRISC-certified Network Risk Mitigation Specialists
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's skills to plan, implement, and support information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and carry out a workplace continuity strategy based on industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's risk mitigation expertise is a good fit the support available from Progent's CISA-Certified consultants for impartially auditing your IT control design and with the expertise of Progent's CISM-certified consultants for designing security policies. Get the details concerning Progent's CRISC-certified Risk Management Consulting.
- Global Information Assurance Certification Consulting Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to assure that an accredited professional possesses the skills necessary to deliver support in key areas of network, data, and software security. GIAC accreditations are acknowledged by companies and institutions around the world including and the United States National Security Agency (NSA). Progent offers the help of GIAC certified consultants for all of the security services addressed within GIAC certification programs including auditing IT infrastructure, incident response, traffic analysis, and web-based application security. Find out the details about Progent's GIAC Professional Assistance.
Get in Touch with Progent for Network Security Support
If you need computer security consulting expertise, call Progent at 800-993-9400 or see Contact Progent.