Overview of Progent's Security Support Services
Progent's certified network security experts can provide a broad selection of support services intended to help businesses of all sizes to uncover and eliminate security vulnerabilities, defend against assaults, remediate the damage caused by a breakdown of security, and meet regulatory requirements for protecting data and reporting incidents. Progent can provide a selection of service delivery modes:
As-needed Security and Compliance Support Services
- As-needed online and on-site support billed to the nearest minute
- On-going fully managed services billed at an affordable flat monthly rate
- Value-priced service packages for a single security and compliance assessment
After you sign up for Progent's services (signing up is free), you can get as-needed remote or on-premises support from a Progent security and compliance expert. This traditional support model is essentially reactive and optimized for quickly resolving technical problems that are affecting your network or that are beyond the scope of your own support staff. Common scenarios are replacing a firewall or VPN connection, implementing a critical security update for a Cisco switch, designing secure access to a public cloud, or recovering from a ransomware attack. These security services are invoiced to the nearest minute, which eliminates the annoying situation of receiving large invoices for fast repairs.
Delivery options for Progent's as-needed support include:
Progent's security consultants are qualified to support environments powered by Microsoft Windows, Linux, Mac, Solaris, and popular derivatives of UNIX. Progent's wide range of services covers firewall configuration, email security, secure system architecture, and data recovery. Progent's technical support staff has earned the industry's top security accreditations including GIAC (Global Information Assurance Certification) and CISSP. Progent also can provide immediate access to remote Cisco CCIE network infrastructure consultants who can deliver advanced assistance with tough network configuration issues.
- Remote Security Services
Most security problems can be resolved online through a mix of phone-based help and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can deliver online security help by offering easy access to consultants who have the background and resources to resolve many of the most challenging issues quickly, making your support costs affordable and reducing downtime.
- On-premises Security Services
For instances where on-premises support is required, Progent can dispatch a technical expert to major metropolitan areas across the U.S. Progent can also dispatch a security specialist with top certifications and world-class skills to any site in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis tools to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely escape legacy signature-based AV products. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to manage the complete malware attack progression including protection, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device management, and web filtering through leading-edge tools incorporated within a single agent managed from a single control. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with legal and industry information protection standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent attention. Progent can also help you to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of vital data, applications and VMs that have become lost or damaged as a result of component failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide world-class support to configure ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security vendors to deliver centralized management and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data loss protection.
- ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map, track, enhance and troubleshoot their networking hardware like routers and switches, firewalls, and wireless controllers plus servers, printers, client computers and other devices. Incorporating state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are kept current, copies and displays the configuration of virtually all devices on your network, tracks performance, and generates alerts when problems are detected. By automating time-consuming management processes, WAN Watch can knock hours off common chores like making network diagrams, expanding your network, locating appliances that need important software patches, or isolating performance problems. Learn more about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring and Management
ProSight LAN Watch is Progentís server and desktop remote monitoring managed service that uses advanced remote monitoring and management (RMM) technology to keep your network running efficiently by checking the health of critical computers that power your business network. When ProSight LAN Watch detects an issue, an alert is transmitted immediately to your specified IT management staff and your assigned Progent consultant so any potential problems can be addressed before they can impact your network Learn more details about ProSight LAN Watch server and desktop remote monitoring services.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hosting solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can save up to half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and affordable alternative for small and mid-size organizations to get an unbiased evaluation of the health of their IT system. Powered by some of the top remote monitoring and management tools available, and overseen by Progent's certified group of IT experts, ProSight Network Audits help you see how closely the configuration of your core infrastructure assets conform to industry best practices. Both the Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide instant benefits like a more manageable Active Directory system. Both versions also include one year of advanced remote network monitoring and management. Advantages can include lower-cost management, improved compliance with data security standards, higher utilization of network assets, quicker troubleshooting, more dependable backup and restore, and increased uptime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.
The ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report service is an affordable service based on a brief phone interview with a Progent backup/recovery consultant. The fact-finding interview is designed to help assess your organization's ability to block or recover rapidly following an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to gather information about your current security profile and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can follow industry best practices to deploy an efficient AV and backup environment that aligns with your business needs. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Packages
Progent offers a number of set-price security assessment bundles that provide high value by deploying Progent's enterprise-class system monitoring software as well as Progent's consulting experience to create an objective and thorough assessment of your IT environment security profile.
Our System Has Been Hacked: What Are We Supposed to Do?
- Security Inventory Service Packages for Small Organizations
Progent offers two value-priced security inventory scanning packages designed to allow small organizations to obtain an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive assessment of your IT system from beyond your corporate firewall to identify possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security consultant runs a network scan from an authorized machine inside your corporate firewall to evaluate your vulnerability to inside threats. These two security inventory scans are configured and run from a secured offsite location. The scan is managed by a consultant who has earned advanced security certifications and who produces a report that details and interprets the information captured by the security scan and recommend various improvements where required.
- Security Vulnerability Evaluation Bundles for Large Businesses
Progent has developed three levels of set-price security assessment service packages designed for enterprises who want to meet security standards required by government or industry regulators. Progent's security evaluation service packages offer larger organizations a chance to get an objective assessment at the viability of their security profile. For each security evaluation bundle, Progent engineers with advanced security credentials analyze and report on collected data and provide suggestions for efficient remediation. Each of the network security audit bundles include an added-cost option for onsite engineers at any location in the United States.
- Stealth Penetration Testing
Stealth penetration testing, often called PEN testing, is a critical technique for helping businesses to determine how open their IT environments are to modern attacks. Progent's stealth penetration testing services test how well your corporate security procedures and platforms resist authorized but unannounced intrusion attempts managed by Progent's certified security specialists utilizing cutting-edge hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.
If your company is currently fighting a network security emergency and you have no formal response plan, visit Progent's Online Network Help to learn how to receive fast help. Progent offers online help from skilled network technicians and can refer trouble tickets to certified security experts if necessary. Your business does not need to be a current Progent client to get urgent help for a security problem, but you can register as a Progent client ahead of time at no cost and your standing as a registered customer could save precious time in case of an emergency.
Usually, smaller organizations have no response procedure in case of a damaging penetration. This is risky, since the cost of a successful security assault can be more devastating for a small company than for a big corporation. Progent's security consultants can assist your you to design an effective response and event reporting procedure that reduces the network downtime following an attack. The formal incident handling procedure outlined by Global Information Assurance Certification is Progent's suggested procedure for handling a major security incident.
Advanced Security Services Available from Progent
Progent's certified security engineers can provide world-class consulting in vital facets of IT security including:
Progent's Security Accreditations
- Security Vulnerability Evaluation and Security Compliance Testing
Progent provides experience with information risk evaluation software like Microsoft Baseline Security Analyzer or LANguard for performing a set of automatic system scans to identify potential security problems. Progent has extensive experience with scanning utilities and can help you to understand assessment results and react efficiently. Progent's security consultants also provide web software validation and can perform thorough evaluation of enterprise-wide security to confirm your company's compliance with key worldwide security standards such as FISMA, PCI, and ISO 17799. Also, Progent can assess the strength of your wireless protection covering fixed wireless equipment as well as portable handsets. Read more details about Progent's Information Risk Audits and Compliance Assessment.
- Planning, Building, and Validating Protected Networks
Every business ought to have a carefully considered security strategy that includes both preventive and responsive elements. The pre-attack plan is a set of steps that works to reduce security holes. The post-attack strategy defines procedures to help security personnel to assess the losses caused by a breach, repair the damage, record the event, and revive business functions as quickly as feasible. Progent can advise you how to design security into your business processes, configure scanning utilities, define and implement a secure network architecture, and recommend processes and policies to enhance the safety of your computing environment. Progent's security professionals are available to help you to set up a firewall, design safe online and mobile connectivity to email and files, and configure an effective VPN. If your company is looking for an affordable option for outsourcing your security administration, Progent's 24x7 Monitoring Options feature continual remote server tracking and immediate resolution of problems.
- System Restoration and Security Forensics
Progent has skill in restoring networks and computers that have been hacked, are in question, or have stopped working following a security attack. Progent can help evaluate the losses caused by the attack, return your company to normal functions, and recover information lost as a result of the attack. Progent's security specialists can also oversee a comprehensive failure analysis by examining activity logs and using a variety of proven assessment tools. Progent's background with security issues minimizes your off-air time and allows Progent to recommend effective measures to avoid or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
- Additional Firewall and VPN Consulting Services
In addition to supporting a wide array of protection technologies from Microsoft and Cisco, Progent offers small organizations expert engineering services for technologies from other major firewall and Virtual Private Network vendors such as:
- SIEM Security Information and Event Management Integration and Support
Security information and event management (SIEM) applications and services are designed to interpret the massive amounts of information collected in security event records generated by a wide range of sources including network appliances, servers, and applications and monitoring tools. SIEM software organizes the security event records from these diverse sources and creates summary reports of security incidents as required by government regulations and industry compliance standards. Progent's GIAC-certified information assurance experts and Cisco-certified network consultants can help organizations to design, deploy and manage a SIEM system that helps them to see the progress of security incidents and comply with event reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
Progent's security professionals have been awarded the most prestigious accreditations offered in the industry. These accreditations demand extensive testing and proven field background to guarantee that candidates have acquired expertise with a significant amount of security information and methodologies and can provide advanced consulting to information networks of any complexity.
Contact Progent for Computer Security Support
- Certified Information Security Manager Security Consulting Services
CISM identifies the basic competencies and worldwide standards of service that IT security professionals are required to master. CISM provides business management the confidence that consultants who have been awarded their CISM possess the background and skill to provide efficient security management and engineering services. Progent can offer a CISM-certified consultant to help your enterprise in key security areas such as data protection governance, risk assessment, data security process control, and incident handling management. Read the details about Progent's CISM Security Consulting Expertise.
- CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification as a result of verified experience, rigorous study, and exhaustive examination. CISSP qualification recognizes expertise in an international standard for IT security. ANSI has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management procedures, security design and models, access permission methodology, applications development security, business processes security, physical security, cryptography, communications, Internet security, and disaster recovery planning. Read additional information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Services
Progent's CISSP-ISSAP certified cybersecurity architecture experts have been awarded ISSAP status after rigorous testing and substantial experience. field experience with network security architecture. ISSAP security experts possess in-depth understanding of access control systems and techniques, phone system and network infrastructure security, cryptography, needs evaluation, BCP and disaster recovery, and physical security. Progent's CISSP-ISSAP-qualified security consultants can help your company with all aspects of secure network architecture. Find out more details concerning Progent's ISSAP Accredited Secure System Infrastructure Consulting Services.
- CISA Support Services
The CISA credential is a recognized qualification that signifies mastery in IS security auditing. Certified by ANSI, the CISA accreditation has consultants pass an extensive examination administered by the ISACA professional association. Progent offers the expertise of a CISA-certified security audit consultant able to assist businesses in the fields of information systems audit process, IT governance, network assets and architecture lifecycle, information technology service delivery, safeguarding information assets, and disaster recovery preparedness. Get more information about Progent's Certified Information Systems Auditor Professional Services.
- CRISC-certified Network Risk Management Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate an IT professional's skills to design, implement, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's risk management services are a good fit the services provided by Progent's CISA-qualified consultants for objectively auditing your IT control mechanisms and also with the services of Progent's CISM support professionals for implementing security policies. Learn more information concerning Progent's CRISC-certified Network Risk Management Consulting.
- Global Information Assurance Certification Support Services
GIAC was founded in 1999 to certify the skill of computer security professionals. GIAC's mission is to assure that a certified professional possesses the knowledge appropriate to provide services in critical areas of network, information, and application program security. GIAC accreditations are acknowledged by companies and institutions around the world including and the U.S. National Security Agency (NSA). Progent offers the expertise of GIAC certified security engineers for all of the security disciplines covered under GIAC accreditation programs such as assessing IT infrastructure, incident response, intrusion detection, and web-based application security. Read additional information concerning Progent's GIAC Consulting Expertise.
If you're trying to find computer security help, call Progent at 800-993-9400 or refer to Contact Progent.