Overview of Progent's Security Support Services
Progent's industry certified network security consultants offer a wide selection of services intended to help businesses of any size to identify and eliminate security weaknesses, block attacks, remediate any issues caused by a breach of security, and meet government requirements for guarding information and reporting incidents. Progent can provide a choice of service delivery modes:
As-needed Security Consulting Services
- As-needed online and on-site assistance invoiced to the nearest minute
- Continual fully managed services invoiced at a low fixed monthly rate
- Value-priced service packages for a single security evaluation
Once you sign up for Progent's services (registration is free), you can receive on-demand remote or on-premises support from one of Progent security consultant. This classic support model is essentially reactive and geared toward rapidly taking care of technical issues that are affecting your network or that have stymied your own support staff. Common examples include replacing a firewall or VPN tunnel, implementing a critical security patch for a Cisco switch, setting up compliant access to cloud-based resources, or restoring data after a ransomware attack. These services are invoiced by the minute, which eliminates the frustrating situation of getting large invoices for fast repairs.
Delivery options for Progent's on-demand support include:
Progent's accredited security consultants are qualified to provide help for systems powered by Microsoft, Linux, Apple Mac, Solaris, and major versions of UNIX. Progent's wide array of consulting services covers firewall configuration, email security, protected network architecture, and data restoration. Progent's technical support team has been awarded the industry's most advanced security accreditations including GIAC and CISSP. Progent also can provide immediate access to online Cisco CCIE network engineers who can deliver advanced support with tough network integration problems.
- Online Security Support
The majority security problems can be handled remotely via a mix of phone-based support and a remote Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide remote security help by offering efficient access to consultants with the experience and resources to fix many of the most difficult issues quickly, keeping your service costs affordable and reducing lost productivity.
- On-premises Security Services
For cases where onsite assistance is necessary, Progent can dispatch a technical expert to major metropolitan areas across the United States. Progent can also send a security specialist with high-level certifications and world-class skills to any location in the country.
ProSight Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior analysis technology to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to address the complete malware attack lifecycle including blocking, detection, containment, remediation, and forensics. Key features include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies incorporated within a single agent managed from a single control. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP deployment that addresses your company's unique needs and that allows you prove compliance with legal and industry information protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent action. Progent's consultants can also help you to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.
- ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical data, applications and VMs that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from making it to your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of inspection for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, content filtering and data leakage protection.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure management service that makes it easy and inexpensive for small and mid-sized businesses to map out, track, optimize and troubleshoot their connectivity appliances such as routers and switches, firewalls, and wireless controllers plus servers, printers, client computers and other networked devices. Using state-of-the-art RMM technology, WAN Watch makes sure that infrastructure topology diagrams are kept updated, copies and manages the configuration information of almost all devices on your network, monitors performance, and sends alerts when issues are detected. By automating time-consuming management and troubleshooting activities, WAN Watch can knock hours off common tasks like network mapping, expanding your network, locating appliances that need important software patches, or identifying the cause of performance problems. Learn more details about ProSight WAN Watch infrastructure management services.
- ProSight LAN Watch: Server and Desktop Monitoring and Management
ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management (RMM) technology to help keep your network operating at peak levels by checking the health of critical computers that drive your business network. When ProSight LAN Watch uncovers a problem, an alarm is sent automatically to your designated IT management staff and your assigned Progent engineering consultant so that any potential problems can be resolved before they can impact your network Find out more about ProSight LAN Watch server and desktop remote monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect information related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can save up to 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size businesses to obtain an unbiased assessment of the health of their network. Powered by a selection of the leading remote monitoring and management tools in the industry, and overseen by Progent's world-class team of information technology experts, ProSight Network Audits help you see how well the configuration of your essential infrastructure assets conform to best practices. Both the Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver instant ROI like a cleaner Active Directory system. Both also come with a year of advanced remote network monitoring and management. Benefits can include simpler management, better compliance with data security standards, more efficient utilization of network assets, quicker troubleshooting, more dependable backup and recovery, and less downtime. Read more about Progent's ProSight Network Audits IT infrastructure assessment.
Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service built around a brief interview with a Progent backup/recovery consultant. The fact-finding interview is intended to evaluate your organization's ability either to stop or recover quickly following an attack by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will work with you directly to collect information concerning your current antivirus tools and backup system, and Progent will then produce a custom Basic Security and Best Practices Report describing how you can follow industry best practices to create a cost-effective security and backup/recovery environment that aligns with your company's needs. For more information, see Progent's ProSight Ransomware Preparedness Report.
Set-price Security Assessment and Verification Bundles
Progent has put together a selection of flat-rate security and compliance evaluation packages that deliver exceptional value by utilizing Progent's enterprise-class network monitoring tools plus Progent's technical experience to create an unbiased and comprehensive assessment of your network security posture.
Our Network Has Been Hacked: What Can We Do?
- Security Assessment Service Packages for Small Organizations
Progent offers two ultra-affordable security inventory service packages designed to allow small organizations to get an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a consultant administers an extensive assessment of your IT system from outside your corporate firewall to identify potential risks in the security posture you expose to the outside. With Progent's Internal Security Inventory Scan, a security consultant runs a system scan using an authorized machine within your corporate firewall to assess your exposure to internal assaults. The two security inventory services are set up and run from a secured external site. The scan is administered by an engineer who has been awarded high-level security certifications and who creates a report that details and interprets the data captured by the security scan and recommend practical improvements where required.
- Security Vulnerability Evaluation Packages for Large Organizations
Progent offers three levels of fixed-price security evaluation service packages intended for enterprises who want to meet compliance standards required by state or industry regulators. Progent's security evaluation service bundles offer larger businesses a chance to obtain a professional look at the viability of their security posture. For each security assessment bundle, Progent consultants with advanced security credentials analyze and report on collected data and offer recommendations for efficient improvements. All the network security audit packages include an added-cost option for onsite engineers anywhere in the U.S.
- Stealth Penetration Testing
Stealth penetration testing, commonly called PEN testing, is an accepted tool for helping organizations to determine how open their network environments are to current-generation attacks. Progent's stealth penetration testing check how well your corporate security procedures and technologies resist authorized but unannounced penetration attempts launched by Progent's veteran security experts utilizing cutting-edge hacking methods. Find out about Progent's stealth penetration testing (PEN Test) services.
If your business is now fighting a security emergency and you have not prepared a detailed recovery plan, refer to Progent's Remote Network Help to find out how to get immediate help. Progent offers remote assistance from skilled network technicians and can refer problems to certified security experts if required. Your business does not need to be a current Progent client to get emergency help for a security breach, but you can register as a Progent client ahead of time for free and your standing as a current customer could save valuable time in a crisis.
Typically, smaller organizations do not have a response procedure in case of a damaging security breach. This is risky, because the damage from a successful security assault can be more catastrophic for a small business than for a big corporation. Progent's security specialists can help your you to create a sensible response and event reporting plan that reduces the IT system downtime resulting from an attack. The formal post-attack handling procedure promoted by Global Information Assurance Certification is Progent's recommended procedure for reacting to a serious security penetration.
High-value Security Services Available from Progent
Progent's certified security engineers can provide specialized help in vital areas of computer protection such as:
Progent's Security Accreditations
- Information Risk Evaluation and Compliance Assessment
Progent provides expertise with information risk auditing utilities like MS Baseline Security Analyzer and LANguard for performing a set of automatic system tests to uncover possible security holes. Progent has broad experience with monitoring utilities and can help you to analyze audit reports and react efficiently. Progent's security consultants also can perform web application validation and can conduct expert evaluation of enterprise-wide security to verify your company's compliance with key global security specifications such as FISMA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless security including stationary wireless appliances as well as portable devices. Find out the details about Progent's Information Risk Audits and Security Compliance Assessment.
- Planning, Implementing, and Testing Protected Environments
Any business ought to develop a carefully thought out security plan that incorporates both proactive and responsive elements. The proactive strategy is a set of steps that helps to reduce security holes. The post-attack strategy specifies activities to assist security staff to assess the losses caused by a breach, repair the damage, record the experience, and restore network activity as soon as feasible. Progent can show you how to incorporate security into your business operations, configure scanning software, create and build a secure computer architecture, and propose processes and policies that will enhance the protection of your information system. Progent's security professionals are available to help you to configure a firewall, deploy protected online and mobile connectivity to e-mail and data, and install an effective virtual private network (VPN). If your company is interested in an affordable way for outsourcing your network security management, Progent's Round-the-clock Network Support Packages include continual remote server tracking and fast resolution of emergencies.
- System Restoration and Failure Analysis
Progent offers expertise in restoring systems and servers that have been compromised, are quarantined, or have stopped working following a security attack. Progent can show you how to evaluate the damage caused by the assault, return your company to ordinary business operations, and recover information compromised owing to the event. Progent's security specialists can also manage a comprehensive failure evaluation by examining activity logs and using a variety of proven forensics techniques. Progent's background with security consulting reduces your downtime and permits Progent to recommend effective measures to avoid or contain new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your current PIX or ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
- Other Firewall and VPN Solutions
In addition to being expert in a wide range of security solutions available from Microsoft and Cisco, Progent offers small and mid-size businesses top-level engineering services for technologies from other major firewall and Virtual Private Network vendors including:
- SIEM Solutions
Security information and event management (SIEM) applications and services are designed to digest the enormous quantity of information collected in security incident logs created by multiple sources such as network appliances, servers, and application software and tools. SIEM software organizes the security logs from these various sources and creates summary reports of security events as required by government regulations and industry compliance guidelines. Progent's GIAC-certified computer security consultants and Cisco-certified network experts can assist organizations to plan, deploy and operate a SIEM system that enables them to see the progress of security incidents and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management solutions.)
Progent's security specialists have been awarded some of the most respected certifications offered in the security industry. All of these accreditations require extensive examinations and proven field background to guarantee that candidates have acquired expertise with a significant amount of security information and methodologies and can offer advanced solutions to information networks of any size.
Get in Touch with Progent for Network Security Support
- Certified Information Security Manager Security Consulting Expertise
Certified Information Security Manager (CISM) defines the fundamental skills and worldwide standards of service that information security professionals are expected to achieve. CISM offers business management the confidence that consultants who have been awarded their certification possess the background and skill to offer effective security management and consulting services. Progent can offer a CISM-certified support professional to assist your organization in critical security areas such as data protection governance, vulnerability management, information protection program management, and crisis handling management. Learn more details concerning Progent's Certified Information Security Manager Security Support Expertise.
- CISSP Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP accreditation as a result of verified professional work, extensive study, and exhaustive testing. CISSP Certification recognizes mastery of an international standard for IT security. American National Standards Institute has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management practices, security architecture and test systems, connection control methodology, software development security, business processes security, physical security, encryption, communications, network security, and business continuity planning. Find out more information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
- CISSP-ISSAP} Security Architecture Consulting Expertise
Progent's CISSP-ISSAP qualified security architecture experts have earned ISSAP accreditation as a result of thorough testing and extensive experience. field experience with information security design. ISSAP security experts possess comprehensive knowledge of access management mechanisms and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, business continuity and DRP, and physical security. Progent's CISSP-ISSAP-certified security experts can assist your business with all phases of secure network architecture. Learn additional details concerning Progent's ISSAP Certified Protected Network Architecture Consulting Support.
- Certified Information Systems Auditor (CISA) Consulting Services
The CISA credential is an important achievement that signifies expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive examination given by the ISACA international professional group. Progent can provide the services of a CISA-qualified security professional trained to assist companies in the areas of information systems audit process, IT enforcement, systems and architecture planned useful life, information technology support, protecting information assets, and disaster recovery preparedness. Learn additional details about Progent's CISA Professional Assistance.
- CRISC Risk Mitigation Consultants
The CRISC program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and maintain IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's network risk mitigation services are a good fit the support provided by Progent's CISA-certified security engineers for impartially assessing your IT control mechanisms and with the expertise of Progent's CISM experts for defining security policies and procedures. Learn more information concerning Progent's CRISC-certified Risk Management Support.
- Global Information Assurance Certification Support Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of computer security experts. GIAC's goal is to verify that an accredited security consultant has the knowledge necessary to provide support in vital categories of network, information, and application security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. NSA. Progent can provide the help of certified security engineers for all of the security services addressed under GIAC certification topics such as assessing networks, incident response, traffic analysis, and web application security. Find out more information about Progent's GIAC (Global Information Assurance Certification) Professional Assistance.
If you need network security engineering help, phone Progent at 800-993-9400 or visit Contact Progent.