Introduction to Progent's Security and Compliance Consulting Services
Progent's certified network security professionals offer a wide selection of services intended to assist companies of all sizes to uncover and eliminate security weaknesses, block malicious attacks, remediate any problems caused by a breach of protection, and comply with government mandates for guarding information and reporting incidents. Progent can provide a choice of service models:
On-demand Security Support Services
- On-demand remote and on-premises assistance billed to the nearest minute
- Continual managed services invoiced at an affordable flat monthly rate
- Set-price service bundles for a one-time security assessment
Once you register for Progent's services (registration is free), you can receive on-demand online or onsite assistance from a Progent security expert. This classic support model is essentially reactive and geared toward quickly resolving IT issues that are affecting your network or that are beyond the scope of your own support personnel. Common scenarios are replacing a firewall or VPN connection, installing a vital security update for a Cisco switch or router, setting up compliant access to a public cloud, or restoring data after a ransomware assault. These security services are billed to the nearest minute, which avoids the frustrating situation of getting large invoices for fast fixes.
Delivery alternatives for Progent's on-demand support services include:
Progent's accredited security engineers are qualified to support environments powered by Microsoft, Linux, Apple Mac, Solaris, and major versions of UNIX. Progent's broad range of services addresses firewall configuration, email and messaging systems, secure network design, and information restoration. Progent's technical support team has earned the world's most advanced security certifications including Certified Information Security Manager (CISM) and CISSP. Progent also can provide fast access to online Cisco CCIE network consultants who can deliver advanced support with complex network technology issues.
- Remote Security Services
The majority security problems can be handled online via a mix of phone-based help and an Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can deliver online security help by offering efficient access to consultants who have the experience and resources to fix some of the most challenging issues quickly, keeping your support costs affordable and reducing lost productivity.
- On-premises Security Support Services
For cases where on-premises support is necessary, Progent can send a technical expert to major metropolitan areas throughout the U.S. Progent can also dispatch a security specialist with high-level certifications and world-class skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-based anti-virus products. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to manage the complete threat progression including protection, identification, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that meets your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent's consultants can also assist you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital data, applications and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite gateway device adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Exchange Server to track and protect internal email that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data loss prevention.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized organizations to diagram, monitor, reconfigure and debug their connectivity appliances like routers, firewalls, and load balancers plus servers, printers, endpoints and other devices. Incorporating cutting-edge Remote Monitoring and Management (RMM) technology, ProSight WAN Watch ensures that network maps are kept updated, copies and manages the configuration information of virtually all devices connected to your network, tracks performance, and sends notices when potential issues are discovered. By automating complex management activities, WAN Watch can knock hours off ordinary chores like making network diagrams, expanding your network, locating devices that need critical software patches, or resolving performance problems. Find out more details about ProSight WAN Watch network infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management technology to keep your network running efficiently by checking the health of critical assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted automatically to your specified IT staff and your assigned Progent consultant so that all potential issues can be addressed before they can disrupt productivity Find out more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about impending expirations of SSL certificates or domains. By updating and organizing your network documentation, you can save as much as half of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Find out more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a quick and low-cost alternative for small and mid-size businesses to obtain an objective evaluation of the health of their network. Powered by some of the top remote monitoring and management (RMM) platforms available, and overseen by Progent's certified group of information technology professionals, ProSight Network Audits help you see how closely the configuration of your essential network devices adhere to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate ROI such as a more manageable Active Directory (AD) environment. Both also come with one year of cutting-edge remote network monitoring and management (RMM). Advantages can include easier network management, better compliance with data security requirements, higher utilization of network assets, faster troubleshooting, more dependable backup and restore, and higher availability. See more about Progent's ProSight Network Audits network infrastructure assessment.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is an affordable service based on a phone discussion with a Progent information assurance expert. The interview is designed to assess your organization's preparedness to block or recover rapidly after an assault by a ransomware strain such as Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you personally to gather information about your current AV defense and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report describing how you can follow best practices to deploy a cost-effective security and backup environment that meets your business requirements. For more information, see The ProSight Ransomware Preparedness Report.
Set-price Security Evaluation and Verification Packages
Progent has put together a portfolio of flat-rate security and compliance evaluation packages that deliver exceptional value by deploying Progent's advanced network monitoring tools plus Progent's consulting experience to produce an unbiased and comprehensive assessment of your IT environment security posture.
Our Network Has Been Hacked: What Do We Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory scanning service packages designed to allow small businesses to get a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your IT system from outside your firewalled perimeter to identify possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security consultant executes a network scan using an authorized machine inside your company firewall to assess your vulnerability to inside attacks. The two security inventory scans are set up and run from a secured external site. The project is managed by an engineer who has earned high-level security certifications and who produces a report that details and interprets the data captured by the scan and recommend practical enhancements where required.
- Security Vulnerability Evaluation Packages for Enterprises
Progent offers three levels of fixed-price security evaluation service packages intended for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security evaluation service packages offer larger organizations an opportunity to get an objective assessment at the viability of their security profile. For every security evaluation package, Progent consultants with top security credentials study and report on collected data and offer recommendations for efficient remediation. All the network security assessment bundles include an added-cost option for on-premises consultants anywhere in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is an accepted technique for helping organizations to find out how vulnerable their IT environments are to current-generation threats. Progent's stealth penetration testing services check how effectively your corporate security policies and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's certified security experts using cutting-edge hacking methods. Read about Progent's stealth penetration testing services.
If you are now fighting a network security crisis and you have not prepared a detailed recovery plan, refer to Progent's Remote Technical Support to find out how to receive immediate help. Progent provides remote technical support from experienced network technicians and can escalate problems to high-level security experts if required. Your company does not need to be a current Progent customer to get emergency help for a security problem, but you can sign up as a Progent client ahead of time at no cost and your status as a current client could save valuable time when there is an emergency.
Typically, smaller businesses have not documented a response plan in the event of a damaging attack. This is risky, since the cost of a successful security attack can be even more devastating for a small business than for a large corporation. Progent's security consultants can help your company to design an efficient response and event reporting procedure that reduces the network downtime following an attack. The formal incident response procedure promoted by GIAC is Progent's suggested procedure for handling a major security attack.
High-value Security Services Available from Progent
Progent's certified security engineers offer advanced support in vital areas of computer compliance including:
Progent's Security Credentials
- Information Risk Audits and Compliance Testing
Progent offers experience with security evaluation tools like Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic network tests to identify possible security holes. Progent has broad experience with these and similar tools and can help your company to analyze assessment reports and respond efficiently. Progent's certified security consultants also can perform web application validation and can conduct expert assessments of enterprise-wide security to verify your company's compliance with important global security specifications including FISMA, NIST, and ISO 17799. Also, Progent can evaluate the strength of your wireless security covering fixed wireless appliances plus mobile handsets. Find out additional details concerning Progent's Security Vulnerability Evaluation and Security Compliance Testing.
- Designing, Building, and Testing Secure Environments
Every organization should have a thoroughly thought out security strategy that includes both proactive and reactive activity. The proactive plan is a set of precautions that helps to minimize vulnerabilities. The post-attack strategy defines activities to assist IT personnel to evaluate the damage caused by an attack, remediate the damage, document the event, and revive business activity as quickly as feasible. Progent can advise you how to build security into your company processes, set up scanning software, create and build a secure IT infrastructure, and recommend processes and policies that will enhance the safety of your network. Progent's security experts are available to assist you to configure a firewall, deploy protected online and mobile connectivity to e-mail and data, and install an efficient VPN. If your company is looking for an affordable option for jobbing out your security administration, Progent's 24x7 Network Support Packages include non-stop remote network monitoring and fast resolution of emergencies.
- System Restoration and Failure Analysis
Progent offers expertise in recovering networks and servers that have been hacked, are in question, or have failed following a security attack. Progent can show you how to determine the losses resulting from the assault, restore normal functions, and recover information lost owing to the attack. Progent's certified engineers can also perform a comprehensive forensic evaluation by going over event logs and utilizing other proven forensics tools. Progent's background with security problems minimizes your off-air time and permits Progent to propose efficient ways to avoid or contain future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower configuration and debugging support.
- Other Firewall and VPN Technologies
As well as supporting a wide range of network security solutions from Microsoft and Cisco, Progent offers small businesses expert consulting for technologies from other major firewall and Virtual Private Network (VPN) suppliers such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of information collected in security incident logs created by a wide range of sources such as network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM software analyzes the security event records from these various sources and produces summary reports of security incidents as required by state regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network experts can help businesses to plan, deploy and manage a SIEM system that enables them to see the progress of security incidents and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's security engineers have been awarded the most respected certifications available in the security industry. These accreditations demand extensive testing and demonstrated work background to ensure that recipients have acquired expertise with a significant body of security knowledge and methodologies and can provide high-level solutions to information networks of any size.
Depend on Progent for Computer Security Consulting Services
- Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager identifies the basic competencies and worldwide benchmarks of service that IT security professionals are expected to master. CISM provides executive management the confidence that those who have earned their accreditation possess the background and knowledge to offer effective security administration and engineering support. Progent can offer a CISM-certified support professional to assist your organization in vital security disciplines such as data protection governance, vulnerability management, information protection program control, and incident handling support. Read more details about Progent's Certified Information Security Manager (CISM) Security Support Services.
- Certified Information Systems Security Professionals (CISSP) Security Support Expertise
Progent's CISSP consultants are security specialists who have earned CISSP accreditation as a result of demonstrated experience, extensive study, and formal examination. CISSP qualification indicates expertise in an international standard for information security. ANSI has granted the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Areas of expertise included within CISSP include security management practices, security architecture and models, connection control systems, applications development security, operations security, physical security, cryptography, communications, Internet security, and disaster recovery planning. Find out more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP certified cybersecurity architecture experts have been awarded ISSAP status after thorough testing and extensive experience. field experience with information security architecture. ISSAP consultants have acquired in-depth understanding of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security. Progent's CISSP-ISSAP-certified security specialists can assist your business with all phases of architecture security. Learn the details concerning Progent's ISSAP Accredited Secure Network Infrastructure Consulting Services.
- CISA Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies expertise in IS security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass an extensive test administered by the ISACA professional association. Progent offers the services of a CISA-certified security audit consultant able to assist companies in the fields of information systems audit services, information technology enforcement, systems and architecture lifecycle, information technology service delivery, safeguarding information resources, and business continuity preparedness. Read more information concerning Progent's Certified Information Systems Auditor (CISA) Consulting Services.
- CRISC-certified IT Risk Management Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to plan, deploy, and support information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and execute a workplace continuity plan that follows leading practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's network risk management services are complementary to the services provided by Progent's CISA-qualified security engineers for objectively auditing your IS control design and with the services of Progent's CISM consultants for designing security policies. Learn additional details about Progent's CRISC-certified Risk Management Expertise.
- GIAC Professional Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security experts. GIAC's mission is to make sure that an accredited security consultant possesses the skills needed to provide services in critical categories of system, information, and software security. GIAC certifications are recognized by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of GIAC certified professionals for any of the security services covered under GIAC certification topics such as auditing perimeters, incident handling, intrusion detection, and web-based services security. Get additional details about Progent's GIAC Professional Assistance.
If you need network security expertise, call Progent at 800-993-9400 or visit Contact Progent.