Overview of Progent's Security Support Services
Progent's industry certified computer security consultants offer a broad range of support services designed to help businesses of all sizes to identify and eliminate security vulnerabilities, defend against malicious attacks, remediate the damage caused by a breach of security, and comply with government mandates for guarding data and reporting incidents. Progent can provide a selection of service delivery modes:
As-needed Security and Compliance Consulting Services
- As-needed online and on-premises assistance billed to the nearest minute
- On-going managed services billed at a low fixed monthly fee
- Value-priced service packages for a one-time security and compliance assessment
After you register for Progent's services (signing up is free), you can get on-demand online or onsite assistance from a Progent security and compliance consultant. This classic support model is primarily reactive and geared toward rapidly resolving technical issues that are disrupting your productivity or that have stumped your own support staff. Common scenarios include configuring a firewall or VPN tunnel, installing a critical security patch for a Cisco switch or router, designing secure access to cloud-based resources, or recovering from a ransomware attack. These services are billed to the nearest minute, which eliminates the annoying case of getting big bills for quick fixes.
Delivery options for Progent's as-needed support include:
Progent's security consultants are certified to provide help for environments based on Microsoft Windows, Linux, Apple Mac, Sun, and major derivatives of UNIX. Progent's broad selection of consulting services covers firewall configuration, email and messaging systems, protected system architecture, and information recovery. Progent's technical support team has earned the world's top security credentials including CISA and Information System Security Architecture Professional. Progent also can provide fast access to remote Cisco CCIE network engineers who can provide world-class assistance with tough network integration issues.
- Remote Security Support Services
The majority security problems can be handled online via a mix of phone support and an connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's Technical Response Center can provide remote security help by offering easy access to consultants with the experience and resources to fix many of the most challenging problems quickly, keeping your service expenses low and reducing downtime.
- Onsite Security Services
For cases where on-premises assistance is necessary, Progent can send a technical expert to major cities across the U.S. Progent can also send a security consultant with high-level certifications and world-class skills to any site in the U.S.
ProSight Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight suite of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely escape legacy signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to manage the entire threat lifecycle including protection, identification, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools incorporated within a single agent managed from a single control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP environment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent can also assist your company to install and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
- ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates your backup processes and enables rapid restoration of vital data, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, as well as Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map out, monitor, optimize and debug their connectivity appliances such as routers and switches, firewalls, and wireless controllers plus servers, client computers and other devices. Using cutting-edge Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that infrastructure topology maps are always updated, captures and manages the configuration information of virtually all devices connected to your network, tracks performance, and generates alerts when problems are detected. By automating complex management activities, ProSight WAN Watch can cut hours off ordinary chores such as making network diagrams, reconfiguring your network, finding devices that need critical software patches, or resolving performance problems. Find out more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management technology to help keep your network operating at peak levels by checking the health of vital assets that drive your business network. When ProSight LAN Watch detects a problem, an alert is transmitted immediately to your designated IT management personnel and your assigned Progent consultant so all looming issues can be addressed before they have a chance to impact your network Learn more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported easily to a different hardware environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard data about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time spent searching for vital information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and medium-size organizations to obtain an unbiased assessment of the overall health of their IT system. Powered by a selection of the top remote monitoring and management tools available, and overseen by Progent's certified group of IT professionals, ProSight Network Audits help you see how closely the configuration of your core network devices adhere to industry leading practices. The Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver instant benefits such as a cleaner Active Directory (AD) system. Both versions also include one year of advanced remote network monitoring and management (RMM). Benefits can include simpler network management, better compliance with government and industry security standards, higher utilization of IT assets, quicker problem resolution, more dependable backup and restore, and increased uptime. Read more information about Progent's ProSight Network Audits IT infrastructure review.
Progent's ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report is an affordable service centered on a brief interview with a Progent information assurance consultant. The interview is designed to evaluate your company's preparedness either to stop or recover quickly following an assault by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you personally to gather information concerning your current antivirus tools and backup/recovery system, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can apply industry best practices to deploy an efficient security and backup/recovery environment that aligns with your business requirements. For details, see The ProSight Ransomware Preparedness Report.
Set-price Security Evaluation and Verification Packages
Progent has put together a variety of fixed-price security and compliance evaluation packages that deliver exceptional value by deploying Progent's enterprise-class system monitoring and analysis tools plus Progent's consulting skills to create an unbiased and comprehensive evaluation of your IT environment security profile.
We've Been Hacked: What Do We Do?
- Security Assessment Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory scanning service packages intended to enable small businesses to obtain an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant administers an extensive examination of your network from beyond your firewalled perimeter to determine potential gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant runs a system scan from an authorized computer inside your firewalled perimeter to assess your vulnerability to inside threats. These two security inventory services are set up and run from a secured external site. The scan is managed by a consultant who has been awarded high-level security certifications and who produces a document that describes and interprets the information collected by the scan and recommend various improvements where appropriate.
- Security Vulnerability Assessment Packages for Large Organizations
Progent offers three levels of fixed-price security evaluation service bundles intended for enterprises who need to meet security standards required by state or industry agencies. Progent's security assessment service packages offer larger businesses an opportunity to get an objective assessment at the strength of their security posture. For each security evaluation bundle, Progent consultants with advanced security credentials study and report on captured data and provide suggestions for efficient remediation. Each of the network security audit bundles include an added-cost option for onsite consultants anywhere in the U.S.
- Stealth Penetration Testing Services
Stealth penetration testing, often called PEN testing, is a critical tool for helping organizations to find out how vulnerable their network systems are to modern attacks. Progent's stealth penetration testing test how effectively your existing security policies and platforms stand up to authorized but unannounced penetration attempts launched by Progent's veteran security experts utilizing advanced hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If your company is currently faced with a network security emergency and you have no formal recovery plan, visit Progent's Online Technical Support to see how to receive immediate help. Progent offers online technical support from skilled engineers and can escalate problems to certified security experts if necessary. Your organization does not need to be a current Progent customer to receive emergency help for a security breakdown, but you can sign up as a Progent customer ahead of time at no cost and your status as a current client can save precious time in a crisis.
Usually, smaller organizations do not have a recovery procedure in the event of a damaging attack. This is risky, because the cost of a successful security attack can be more devastating for a small business than for a big enterprise. Progent's security specialists can assist your you to create a sensible response and incident reporting plan that minimizes the IT system disruption resulting from an attack. The formal post-attack response procedure promoted by GIAC is Progent's preferred method for responding to a serious security incident.
High-value Security Expertise Available from Progent
Progent's certified consultants offer advanced support in vital facets of network compliance including:
Progent's Security Credentials
- Information Risk Evaluation and Compliance Testing
Progent offers expertise with security auditing utilities such as MS Baseline Security Analyzer and LANguard for performing a set of automatic system scans to reveal possible security gaps. Progent has extensive skills with these tools and can help your company to understand assessment results and respond efficiently. Progent's certified security engineers also can perform web software testing and can conduct thorough evaluation of enterprise-wide security to determine your organization's compliance with key worldwide security specifications such as HIPAA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering stationary wireless appliances plus portable devices. Learn additional information concerning Progent's Security Vulnerability Evaluation and Compliance Testing.
- Designing, Implementing, and Validating Protected Networks
Any company ought to develop a thoroughly thought out security plan that incorporates both proactive and reactive elements. The pre-attack strategy is a set of steps that works to minimize vulnerabilities. The post-attack strategy defines procedures to help IT personnel to inventory the losses resulting from a breach, repair the damage, document the event, and revive network activity as quickly as possible. Progent can show you how to design security into your business processes, configure scanning software, define and implement a safe network infrastructure, and propose procedures and policies that will maximize the protection of your network. Progent's security professionals are ready to help you to set up a firewall, deploy safe online and mobile connectivity to email and files, and install an efficient virtual private network. If your company is looking for an affordable option for jobbing out your security management, Progent's 24x7 Monitoring Options feature continual remote server monitoring and quick response to problems.
- Data Recovery and Failure Analysis
Progent offers skill in recovering systems and servers that have been hacked, are in question, or have failed because of a security attack. Progent can help evaluate the losses caused by the assault, restore ordinary business operations, and recover data lost as a result of the attack. Progent's security specialists can also oversee a thorough failure analysis by examining activity logs and utilizing a variety of advanced forensics techniques. Progent's background with security issues minimizes your business disruption and allows Progent to recommend effective ways to prevent or contain new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.
- Other Firewall and Virtual Private Network (VPN) Consulting Services
As well as supporting a wide array of protection solutions from Microsoft and Cisco, Progent can provide small and mid-size businesses top-level support for products from other major firewall and Virtual Private Network vendors including:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) applications and services are designed to interpret the enormous quantity of data collected in security event logs generated by multiple sources including network infrastructure appliances, servers, and application software and monitoring tools. SIEM software organizes the security logs from these diverse sources and creates consolidated reports of security incidents as required by state regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network experts can assist businesses to design, deploy and operate a SIEM solution that enables them to understand the progress of security incidents and comply with event reporting requirements. (See Progent's SIEM solutions.)
Progent's security professionals have been awarded the most prestigious accreditations available in the security industry. All of these accreditations demand exhaustive examinations and proven work background to guarantee that recipients have acquired expertise with a significant amount of security information and methodologies and can offer advanced consulting to computer environments of any complexity.
Contact Progent for Network Security Help
- Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager defines the basic skills and international standards of service that information technology security managers are expected to achieve. It provides business management the confidence that those who have earned their CISM possess the experience and skill to provide efficient security administration and engineering services. Progent can offer a CISM expert to assist your enterprise in vital security disciplines such as information protection governance, vulnerability assessment, information security process management, and incident response support. Learn additional information concerning Progent's CISM Security Support Assistance.
- Certified Information Systems Security Professionals (CISSP) Security Support Expertise
Progent's CISSP experts are security specialists who have been awarded CISSP certification through demonstrated professional work, extensive study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for information security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration procedures, security architecture and models, access permission systems, software development security, business processes security, hardware security, encryption, telecommunications, network security, and disaster recovery planning. Find out more information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP qualified security architecture consultants have earned ISSAP certification as a result of thorough examination and substantial experience. field experience with network security design. ISSAP security experts have in-depth knowledge of access management systems and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security consultants can help your business with all phases of architecture security. Read more information concerning Progent's ISSAP Accredited Protected Network Architecture Consulting Support.
- Certified Information Systems Auditor Professional Expertise
The CISA credential is a recognized qualification that signifies expertise in network security auditing. Accredited by ANSI, the CISA accreditation requires that candidates undergo an exhaustive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-certified security audit engineer trained to assist companies in the areas of IS audit process, IT administration, systems and architecture lifecycle, IT support, protecting information assets, and disaster recovery planning. Get additional information concerning Progent's Certified Information Systems Auditor Support Services.
- CRISC-certified Network Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's ability to design, implement, and support IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's risk management expertise is a good fit the support available from Progent's CISA-qualified consultants for impartially assessing your IT management design and also with the expertise of Progent's CISM experts for defining company-wide security policies and procedures. Learn more details concerning Progent's CRISC Risk Management Services.
- Global Information Assurance Certification Support Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security engineers. GIAC's mission is to ensure that an accredited professional possesses the knowledge needed to deliver support in key categories of network, information, and software security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the United States National Security Agency. Progent can provide the help of GIAC certified consultants for all of the security capabilities addressed under GIAC certification topics including assessing perimeters, incident handling, intrusion detection, and web services security. Get more information about Progent's Global Information Assurance Certification Consulting Assistance.
If you need network security consulting, telephone Progent at 800-993-9400 or refer to Contact Progent.