Introduction to Progent's Security Consulting Services
Progent's certified network security professionals offer a broad selection of services designed to assist companies of any size to identify and eliminate security weaknesses, defend against attacks, recover from the issues resulting from a breakdown of protection, and meet regulatory mandates for protecting information and reporting security incidents. Progent can provide a choice of service delivery models:
On-demand Security Support Services
- As-needed remote and on-premises assistance invoiced to the nearest minute
- Continual fully managed services invoiced at a low flat monthly rate
- Value-priced service bundles for a one-time security assessment
After you sign up for Progent's services (registration is free), you can receive as-needed remote or on-premises support from one of Progent security and compliance expert. This traditional service model is primarily reactive and optimized for quickly resolving IT problems that are affecting your network or that have stymied your own support personnel. Typical scenarios are replacing a firewall or VPN tunnel, implementing a vital security patch for a Cisco switch or router, setting up secure access to cloud-based resources, or recovering from a ransomware assault. These security services are invoiced by the minute, which avoids the annoying situation of getting big bills for fast repairs.
Delivery options for Progent's on-demand support services include:
Progent's accredited engineers are certified to support environments based on Microsoft Windows, Linux, Mac, Sun Solaris, and major versions of UNIX. Progent's broad array of services addresses firewall expertise, email and messaging systems, secure system design, and information recovery. Progent's support team has earned the world's top security certifications including Certified Information Security Manager and Information System Security Architecture Professional (ISSAP). Progent also can provide fast access to online Cisco CCIE network consultants who can provide world-class support with complex network technology problems.
- Remote Security Support
Most security problems can be resolved online through a mix of phone support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can deliver online security support by offering efficient access to consultants with the background and technical resources to fix many of the most difficult issues quickly, keeping your support costs low and minimizing lost productivity.
- Onsite Security Support
For instances where onsite assistance is required, Progent can send a technical expert to major metropolitan areas throughout the U.S. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any location in the U.S.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to automate the complete malware attack lifecycle including filtering, identification, mitigation, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint control, and web filtering via leading-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that meets your company's unique requirements and that helps you prove compliance with government and industry information protection standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent action. Progent can also assist your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.
- ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital files, apps and VMs that have become unavailable or damaged as a result of hardware breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to restore your critical data. Find out more about ProSight DPS Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security companies to provide web-based control and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper layer of inspection for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure management service that makes it simple and inexpensive for small and mid-sized businesses to map out, monitor, optimize and debug their networking appliances like switches, firewalls, and load balancers plus servers, client computers and other networked devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are always updated, captures and displays the configuration information of almost all devices on your network, tracks performance, and sends alerts when problems are discovered. By automating complex management processes, ProSight WAN Watch can cut hours off common chores like making network diagrams, reconfiguring your network, locating devices that need critical updates, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses advanced remote monitoring and management (RMM) technology to help keep your IT system running at peak levels by tracking the state of vital computers that power your information system. When ProSight LAN Watch uncovers a problem, an alarm is transmitted immediately to your specified IT personnel and your Progent consultant so that all looming issues can be resolved before they have a chance to disrupt your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be ported easily to a different hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard information about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can save up to 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Progent's ProSight Network Audits are a fast and low-cost alternative for small and medium-size businesses to obtain an unbiased evaluation of the overall health of their information system. Based on a selection of the top remote monitoring and management platforms in the industry, and supervised by Progent's certified group of IT professionals, ProSight Network Audits show you how closely the deployment of your core network assets conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and deliver instant benefits such as a more manageable Active Directory system. Both versions also come with one year of state-of-the-art remote network monitoring and management. Advantages can include simpler management, improved compliance with data security regulations, higher utilization of IT resources, quicker troubleshooting, more reliable backup and restore, and higher availability. Learn more about ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service based on a phone discussion with a Progent backup/recovery expert. The interview is intended to help evaluate your company's ability to stop or recover quickly after an attack by a ransomware variant like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you directly to gather information about your current AV defense and backup/recovery platform, and Progent will then produce a custom Basic Security and Best Practices Report detailing how you can apply best practices to build an efficient security and backup/recovery system that meets your company's needs. For additional information, see Progent's ProSight Ransomware Preparedness Report.
Set-price Security Evaluation and Validation Bundles
Progent has put together a variety of set-price security evaluation bundles that deliver exceptional value by deploying Progent's enterprise-class system monitoring software as well as Progent's technical skills to create an objective and thorough assessment of your IT environment security profile.
We've Been Hacked: What Can We Do?
- Security Assessment Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory packages designed to enable small organizations to obtain an objective security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive assessment of your IT system from beyond your firewalled perimeter to identify possible risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized computer within your corporate firewall to evaluate your vulnerability to inside assaults. The two security inventory services are configured and run from a secured offsite location. The scan is administered by a consultant who has earned high-level security certifications and who produces a report that describes and evaluates the information collected by the security scan and recommend various enhancements where required.
- Security Vulnerability Evaluation Packages for Large Organizations
Progent offers three levels of set-price security assessment service packages intended for enterprises who need to meet security standards required by government or industry agencies. Progent's security assessment service bundles offer enterprises an opportunity to obtain an objective assessment at the strength of their security profile. For every security evaluation package, Progent engineers with advanced security credentials study and report on collected data and provide recommendations for efficient remediation. All the network security assessment packages include an added-cost option for on-premises engineers at any location in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is an accepted tool for allowing organizations to determine how vulnerable their IT systems are to modern attacks. Progent's stealth penetration testing services test how well your corporate security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by Progent's experienced security experts using cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
If you are now fighting a security crisis and you do not have a formal recovery procedure, go to Progent's Remote Technical Help to learn how to receive immediate help. Progent offers remote technical support from experienced engineers and can refer problems to certified security experts if necessary. Your company does not have to be a registered Progent customer to receive emergency help for a security problem, but you can register as a Progent client ahead of time for free and your status as a registered client could save valuable time during an emergency.
Typically, smaller companies do not have a response plan in case of a successful penetration. This is not good, because the damage from a serious security attack can be even more catastrophic for a small business than for a big corporation. Progent's security consultants can assist your business to create an effective recovery and event reporting plan that minimizes the network disruption following a security breach. The step-by-step post-attack handling model promoted by GIAC is Progent's preferred procedure for handling a serious security incident.
High-value Security Services Available from Progent
Progent's certified security consultants can provide advanced support in key facets of computer compliance including:
Progent's Security Accreditations
- Vulnerability Evaluation and Compliance Assessment
Progent provides experience with security evaluation tools such as MS Baseline Security Analyzer and LANguard from GFI for conducting a set of automatic system scans to identify potential security problems. Progent has broad experience with monitoring utilities and can assist your company to analyze audit reports and react efficiently. Progent's certified security consultants also offer web application testing and can conduct thorough assessments of enterprise-wide security to validate your organization's compliance with key industry security standards such as FISMA, NIST, and ISO 17799. In addition, Progent can evaluate the strength of your wireless protection including fixed wireless appliances as well as mobile handsets. Learn the details about Progent's Vulnerability Audits and Compliance Assessment.
- Designing, Building, and Testing Protected Environments
Any organization ought to have a carefully considered security strategy that incorporates both proactive and reactive elements. The pre-attack strategy is a collection of precautions that helps to reduce security holes. The post-attack strategy specifies activities to assist security staff to assess the damage caused by a breach, remediate the damage, document the event, and restore business functions as soon as feasible. Progent can show you how to build security into your company processes, set up auditing software, define and build a safe computer architecture, and recommend procedures and policies to maximize the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, design protected online and mobile connectivity to e-mail and files, and configure an efficient VPN. If you are interested in an affordable way for jobbing out your network security administration, Progent's 24x7 Monitoring Services include non-stop online system monitoring and immediate response to emergencies.
- Data Recovery and Security Forensics
Progent has skill in restoring networks and computers that have been hacked, are in question, or have failed because of a security breakdown. Progent can help evaluate the damage caused by the breach, restore normal business operations, and retrieve data lost as a result of the assault. Progent's security specialists can also perform a comprehensive forensic evaluation by going over activity logs and using a variety of proven forensics tools. Progent's experience with security consulting minimizes your business disruption and permits Progent to suggest effective strategies to prevent or contain future assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower Services integration and debugging support.
- Additional Firewall and VPN Solutions
As well as supporting a wide array of network security solutions available from Microsoft and Cisco, Progent offers small and mid-size organizations top-level consulting for solutions from other important firewall and VPN vendors including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of information represented by security incident records created by multiple sources including network appliances, servers, and applications and tools. SIEM software organizes the security event records from these various sources and creates consolidated reports of security events as mandated by state regulations and business compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network consultants can help businesses to design, install and operate a SIEM solution that enables them to see the progress of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management (SIEM) solutions.)
Progent's security consultants have been awarded some of the most prestigious accreditations offered in the industry. All of these accreditations demand extensive testing and demonstrated work background to guarantee that candidates have acquired expertise with a substantial amount of security knowledge and techniques and can provide advanced solutions to information environments of any complexity.
Contact Progent for Network Security Support
- Certified Information Security Manager Security Support Expertise
Certified Information Security Manager (CISM) defines the basic skills and international standards of service that computer security managers are expected to achieve. It provides executive management the confidence that those who have been awarded their certification possess the experience and skill to offer effective security management and engineering support. Progent can provide a CISM-certified expert to help your enterprise in vital security disciplines such as information security governance, risk assessment, information protection process management, and crisis handling management. Learn the details concerning Progent's Certified Information Security Manager Security Consulting Services.
- CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification as a result of verified professional work, rigorous study, and exhaustive examination. CISSP Certification indicates expertise in an international standard for information security. ANSI has granted the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security management procedures, security design and models, access control systems, applications development security, business processes security, hardware security, cryptography, telecommunications, network security, and business continuity planning. Learn more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Assistance.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support
Progent's CISSP-ISSAP qualified security architecture experts have earned ISSAP status following thorough examination and significant hands-on work with network security architecture. ISSAP security experts possess comprehensive knowledge of access management systems and methodologies, telecommunications and network security, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security consultants can help your company with all phases of architecture security. Get additional details about Progent's ISSAP Accredited Protected IT Infrastructure Consulting Assistance.
- CISA Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that signifies expertise in network security auditing. Accredited by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive test given by the ISACA international professional group. Progent offers the services of a CISA-certified security audit professional trained to assist companies in the fields of IS audit services, IT governance, network assets and infrastructure planned useful life, IT service delivery, safeguarding data resources, and disaster recovery preparedness. Find out the details concerning Progent's Certified Information Systems Auditor Support Expertise.
- CRISC Network Risk Management Consultants
The CRISC certification program was established by ISACA to verify an IT professional's ability to plan, deploy, and maintain information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk management expertise is complementary to the services available from Progent's CISA-certified consultants for objectively auditing your IS control design and with the expertise of Progent's CISM experts for defining company-wide security policies and procedures. Get more details concerning Progent's CRISC Risk Management Support.
- GIAC Professional Services
GIAC was founded in 1999 to validate the skill of computer security experts. GIAC's goal is to make sure that an accredited professional possesses the skills appropriate to provide support in key categories of network, information, and software security. GIAC certifications are recognized by businesses and institutions around the world including and the United States NSA. Progent offers the support of GIAC certified professionals for any of the security services addressed under GIAC accreditation topics such as auditing security systems, incident response, traffic analysis, and web-based services security. Get additional details concerning Progent's GIAC (Global Information Assurance Certification) Consulting Services.
If you're trying to find computer security expertise, call Progent at 800-993-9400 or go to Contact Progent.