Overview of Progent's Security and Compliance Support Services
Progent's industry certified computer security professionals can provide a broad selection of services designed to help organizations of all sizes to uncover and correct security weaknesses, block attacks, remediate any problems resulting from a breach of security, and comply with regulatory requirements for guarding data and reporting security incidents. Progent offers a selection of service modes:
As-needed Security Consulting Services
- On-demand online and on-premises assistance billed by the minute
- On-going managed services invoiced at an affordable fixed monthly rate
- Set-price service packages for a one-time security and compliance evaluation
After you register for Progent's services (registration is free), you can get as-needed remote or on-premises support from a Progent security and compliance expert. This traditional support model is primarily reactive and optimized for rapidly taking care of IT issues that are disrupting your productivity or that have stumped your in-house support staff. Common examples are debugging a firewall appliance or VPN tunnel, implementing a vital security update for a Cisco switch or router, designing secure access to a public cloud, or recovering from a ransomware assault. These services are billed to the nearest minute, which avoids the frustrating situation of getting big bills for fast fixes.
Delivery alternatives for Progent's as-needed support services include:
Progent's security consultants are qualified to support systems based on Windows, Linux, Apple Mac, Sun, and major derivatives of UNIX. Progent's broad range of consulting services addresses firewall technology, email and messaging security, protected system design, and information restoration. Progent's support staff has been awarded the industry's most advanced security credentials including CISM and Certified Information Systems Security Professional. Progent also offers fast access to remote Cisco CCIE network consultants who can deliver advanced assistance with tough network technology issues.
- Remote Security Support Services
Most security-related issues can be resolved online through a combination of phone help and an connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's TRC group can provide remote security support by offering efficient access to consultants with the experience and technical resources to fix some of the most difficult problems quickly, keeping your service costs affordable and minimizing downtime.
- On-premises Security Support Services
For cases where onsite assistance is required, Progent can send a technical professional to major cities throughout the United States. Progent can also dispatch a security specialist with high-level certifications and advanced skills to any location in the country.
ProSight Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior machine learning tools to guard endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily get by legacy signature-matching AV tools. ProSight ASM safeguards local and cloud-based resources and provides a unified platform to manage the complete malware attack lifecycle including blocking, infiltration detection, containment, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
- ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that addresses your company's specific needs and that helps you prove compliance with government and industry information protection standards. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent's consultants can also help your company to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
- ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical data, apps and virtual machines that have become lost or corrupted due to component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images/, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or to both. Progent's BDR consultants can deliver advanced support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security vendors to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the local gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data loss prevention.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to diagram, monitor, optimize and debug their networking hardware like routers, firewalls, and wireless controllers plus servers, endpoints and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch ensures that network maps are kept updated, copies and manages the configuration information of almost all devices connected to your network, monitors performance, and generates alerts when issues are detected. By automating complex management processes, WAN Watch can knock hours off ordinary chores like network mapping, reconfiguring your network, finding devices that need critical updates, or isolating performance issues. Find out more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Remote Monitoring
ProSight LAN Watch is Progentís server and desktop monitoring service that incorporates advanced remote monitoring and management techniques to help keep your network operating at peak levels by tracking the health of critical computers that drive your information system. When ProSight LAN Watch uncovers a problem, an alert is sent immediately to your specified IT staff and your Progent consultant so that any looming issues can be addressed before they can impact your network Learn more details about ProSight LAN Watch server and desktop monitoring services.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect data related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to half of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and affordable way for small and medium-size organizations to get an unbiased evaluation of the health of their network. Based on some of the top remote monitoring and management platforms in the industry, and supervised by Progent's certified team of information technology professionals, ProSight Network Audits help you see how well the configuration of your essential infrastructure devices conform to industry leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver instant ROI like a more manageable Active Directory (AD) environment. Both also come with one year of cutting-edge remote network monitoring and management. Benefits can include simpler management, improved compliance with data security requirements, more efficient utilization of IT assets, faster problem resolution, more reliable backup and recovery, and higher availability. See more information about ProSight Network Audits network infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report
The ProSight Ransomware Preparedness Report is a low-cost service built around a phone interview with a Progent information assurance consultant. The interview is designed to evaluate your company's preparedness to stop or recover rapidly after an assault by a ransomware variant such as Ryuk, WannaCry, NotPetya, or Hermes. Progent will work with you directly to gather information about your current security profile and backup/recovery system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can follow industry best practices to create a cost-effective AV and backup/recovery system that meets your company's needs. For more information, visit Progent's ProSight Ransomware Preparedness Report.
Flat-rate Security Evaluation and Verification Bundles
Progent offers a portfolio of fixed-price security and compliance evaluation bundles that provide exceptional value by utilizing Progent's enterprise-class network monitoring software as well as Progent's technical experience to produce an unbiased and comprehensive assessment of your IT environment security profile.
Our Network Has Been Hacked: What Are We Supposed to Do Now?
- Security Assessment Service Packages for Small Organizations
Progent offers two value-priced security inventory scanning service packages designed to allow small organizations to get a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant manages a comprehensive assessment of your network from outside your firewalled perimeter to identify potential gaps in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security consultant executes a system scan from an authorized computer within your corporate firewall to assess your vulnerability to inside attacks. The two security inventory scanning services are set up and executed from a secured offsite location. The project is managed by an engineer who has earned advanced security certifications and who produces a report that describes and evaluates the data collected by the scan and recommend practical enhancements where appropriate.
- Security Vulnerability Evaluation Packages for Large Businesses
Progent has developed three levels of flat-rate security assessment service packages designed for large organizations who need to meet security standards required by state or industry agencies. Progent's security evaluation service packages offer enterprises a chance to obtain an objective assessment at the strength of their security profile. For each security evaluation package, Progent consultants with advanced security credentials analyze and report on collected data and offer recommendations for efficient improvements. Each of the network security audit packages include an added-cost option for on-premises consultants at any location in the United States.
- Stealth Penetration Testing
Stealth penetration testing, often referred to as PEN testing, is an accepted tool for helping businesses to determine how open their network systems are to current-generation threats. Progent's stealth penetration testing services test how well your existing security policies and technologies resist authorized but unannounced intrusion attempts managed by Progent's experienced security specialists using advanced hacking techniques. Find out about Progent's stealth penetration testing services.
If your company is now fighting a network security crisis and you do not have a formal recovery procedure, refer to Progent's Online Technical Support to find out how to get immediate help. Progent provides remote assistance from skilled network technicians and can escalate problems to certified security specialists if required. Your organization does not have to be a registered Progent customer to receive emergency support for a security breakdown, but you can register as a Progent client in advance for free and your standing as a current client could save precious time during an emergency.
Typically, smaller companies have no response plan in case of a successful penetration. This is not good, since the damage from a serious security attack can be more catastrophic for a small business than for a large enterprise. Progent's security consultants can assist your you to create a practical response and incident reporting plan that reduces the network downtime resulting from a security breach. The step-by-step incident handling model outlined by Global Information Assurance Certification is Progent's suggested procedure for reacting to a serious security attack.
Advanced Security Expertise Offered by Progent
Progent's seasoned consultants can provide advanced support in vital facets of computer protection such as:
Progent's Security Credentials
- Security Vulnerability Evaluation and Compliance Testing
Progent offers expertise with information risk evaluation tools like Microsoft Baseline Security Analyzer or LANguard for performing a variety of comprehensive network scans to reveal possible security holes. Progent has extensive experience with these and similar tools and can help you to analyze audit reports and react appropriately. Progent's security engineers also offer web application testing and can perform thorough evaluation of corporate-wide security to confirm your organization's compliance with major global security specifications including HIPAA, NIST, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances as well as portable handsets. Read the details concerning Progent's Information Risk Audits and Security Compliance Assessment.
- Planning, Implementing, and Testing Protected Networks
Any organization ought to develop a thoroughly thought out security plan that includes both proactive and reactive steps. The proactive strategy is a set of precautions that helps to minimize vulnerabilities. The reactive strategy specifies procedures to help security staff to assess the damage resulting from a breach, remediate the damage, document the experience, and revive business functions as quickly as possible. Progent can advise you how to design security into your business operations, set up auditing software, define and execute a secure network infrastructure, and propose procedures and policies that will optimize the protection of your information system. Progent's security professionals are ready to help you to configure a firewall, deploy safe offsite connectivity to email and data, and install an effective VPN. If your company is interested in an affordable way for jobbing out your security administration, Progent's Round-the-clock Network Support Packages include continual remote network monitoring and quick resolution of problems.
- Data Restoration and Security Forensics
Progent has skill in restoring networks and devices that have been compromised, are quarantined, or have failed because of a security attack. Progent can show you how to evaluate the losses caused by the assault, restore normal functions, and recover information compromised owing to the attack. Progent's security specialists can also perform a comprehensive forensic evaluation by going over activity logs and using a variety of advanced assessment techniques. Progent's experience with security problems reduces your downtime and allows Progent to recommend effective measures to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
- Other Firewall and VPN Consulting Services
As well as being expert in a broad range of security technologies available from Microsoft and Cisco, Progent offers small and mid-size organizations expert support for technologies from other important firewall and Virtual Private Network vendors such as:
- SIEM Security Information and Event Management Solutions
Security information and event management (SIEM) software and services are intended to make sense the enormous quantity of information collected in security event records created by multiple sources including network infrastructure appliances, operating systems, and application software and monitoring tools. SIEM applications organizes the security logs from these diverse sources and produces consolidated reports of security incidents as required by government regulations and industry compliance guidelines. Progent's GIAC-certified network security experts and Cisco CCIE certified network infrastructure consultants can assist businesses to plan, install and manage a SIEM system that helps them to see the behavior of attacks and comply with event reporting regulations. (Visit Progent's SIEM solutions.)
Progent's security specialists have been awarded some of the most prestigious accreditations available in the security industry. These certifications demand extensive testing and proven field experience to guarantee that candidates have acquired expertise with a substantial body of security knowledge and methodologies and can provide high-level consulting to computer networks of any size.
Get in Touch with Progent for Computer Security Help
- Certified Information Security Manager Security Consulting Services
Certified Information Security Manager identifies the basic skills and international benchmarks of service that information technology security professionals are required to achieve. It offers executive management the assurance that consultants who have been awarded their accreditation possess the background and knowledge to offer efficient security management and consulting support. Progent can provide a CISM expert to help your organization in vital security areas including data protection governance, vulnerability assessment, information security process control, and incident handling support. Read more details about Progent's Certified Information Security Manager (CISM) Security Support Expertise.
- CISSP Security Consulting Services
Progent's CISSP consultants are security engineers who have earned CISSP certification through verified experience, rigorous study, and exhaustive examination. CISSP qualification recognizes mastery of an international standard for IT security. ANSI has given the CISSP status accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security management practices, security design and test systems, access permission methodology, applications development security, operations security, physical security, encryption, communications, network security, and business continuity planning. Get additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
- CISSP-ISSAP} Security Architecture Consulting Support
Progent's CISSP-ISSAP qualified cybersecurity architecture experts have earned ISSAP status after thorough testing and substantial hands-on work with network security architecture. ISSAP consultants have in-depth knowledge of access control systems and techniques, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security. Progent's CISSP-ISSAP-qualified security experts can assist your business with all phases of architecture security. Find out the details concerning Progent's ISSAP Accredited Protected Network Architecture Consulting Services.
- Certified Information Systems Auditor Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that indicates mastery in information system security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA international professional group. Progent can provide the expertise of a CISA-certified security professional trained to help companies in the fields of information systems audit services, information technology enforcement, systems and infrastructure lifecycle, IT support, safeguarding information assets, and business continuity planning. Find out more information concerning Progent's CISA Professional Services.
- CRISC IT Risk Mitigation Specialists
The CRISC program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's risk management services are a good fit the support available from Progent's CISA-certified security engineers for impartially evaluating your IS control mechanisms and also with the services of Progent's CISM-certified support professionals for defining company-wide security policies. Find out additional details concerning Progent's CRISC IT Risk Management Support.
- GIAC Support Services
Global Information Assurance Certification was founded in 1999 to certify the skill of network security experts. GIAC's mission is to verify that a certified security consultant possesses the skills appropriate to deliver services in vital areas of network, data, and application security. GIAC certifications are recognized by companies and government organizations all over the world including and the U.S. National Security Agency. Progent offers the expertise of GIAC certified professionals for any of the security services addressed within GIAC certification programs such as assessing perimeters, incident handling, traffic analysis, and web application security. Read more information about Progent's GIAC (Global Information Assurance Certification) Support Services.
If you need security support services, telephone Progent at 800-993-9400 or see Contact Progent.