Introduction to Progent's Security and Compliance Consulting Services
Progent's certified network security and compliance experts offer a wide range of services designed to help businesses of any size to uncover and correct security weaknesses, block attacks, remediate any damage resulting from a breach of security, and meet regulatory mandates for guarding information and reporting security incidents. Progent offers a choice of service delivery modes:
On-demand Security Consulting Services
- As-needed online and on-premises support invoiced by the minute
- On-going managed services billed at an affordable fixed monthly fee
- Set-price service packages for a single security assessment
Once you register for Progent's services (registration is free), you can get on-demand remote or on-premises assistance from a Progent security consultant. This classic service model is primarily reactive and optimized for quickly taking care of IT issues that are affecting your productivity or that are beyond the scope of your own support personnel. Common scenarios are replacing a firewall or VPN connection, implementing a vital security patch for a Cisco switch or router, setting up compliant access to cloud-based resources, or restoring data after a ransomware assault. These services are invoiced by the minute, which eliminates the frustrating situation of getting big bills for quick repairs.
Delivery options for Progent's as-needed support services include:
Progent's accredited security consultants are qualified to provide help for environments based on Microsoft Windows, Linux, macOS and OS X, Solaris, and popular versions of UNIX. Progent's wide selection of services addresses firewall expertise, email and messaging security, protected system design, and data recovery. Progent's technical support team has been awarded the industry's top security accreditations including GIAC (Global Information Assurance Certification) and Information System Security Architecture Professional (ISSAP). Progent also can provide immediate access to remote Cisco-certified CCIE network consultants who can deliver world-class support with complex network technology issues.
- Remote Security Support Services
The majority security issues can be handled online via a mix of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a client's computer. Progent's Technical Response Center can provide online security support by offering efficient access to consultants who have the background and technical resources to resolve some of the most difficult problems quickly, keeping your service costs affordable and minimizing lost productivity.
- Onsite Security Services
For instances where onsite support is necessary, Progent can dispatch a technical expert to major cities across the U.S. Progent can also dispatch a security consultant with top certifications and world-class skills to any location in the country.
ProSight Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Network Audits
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based analysis technology to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely escape traditional signature-matching AV tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to manage the complete threat lifecycle including filtering, detection, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
- ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry information security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent can also assist you to install and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
- ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates and monitors your backup activities and allows rapid restoration of vital files, applications and VMs that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images/, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.
- ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security vendors to deliver centralized control and world-class security for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a further level of inspection for inbound email. For outgoing email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard spam filtering, virus blocking, email content filtering and data leakage prevention.
- ProSight WAN Watch: Infrastructure Remote Monitoring and Management
Progentís ProSight WAN Watch is an infrastructure monitoring and management service that makes it simple and inexpensive for small and mid-sized businesses to map, monitor, reconfigure and troubleshoot their connectivity hardware like routers, firewalls, and load balancers as well as servers, client computers and other networked devices. Using state-of-the-art Remote Monitoring and Management (RMM) technology, WAN Watch makes sure that network maps are always updated, captures and manages the configuration information of almost all devices on your network, monitors performance, and sends alerts when potential issues are discovered. By automating complex management processes, WAN Watch can knock hours off common chores like network mapping, reconfiguring your network, locating appliances that need critical software patches, or isolating performance problems. Find out more about ProSight WAN Watch infrastructure management consulting.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progentís server and desktop remote monitoring service that incorporates advanced remote monitoring and management (RMM) technology to keep your network running at peak levels by tracking the state of critical computers that power your information system. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your designated IT management staff and your assigned Progent engineering consultant so any looming issues can be addressed before they have a chance to disrupt your network Find out more details about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported immediately to an alternate hardware environment without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can save up to 50% of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Progent's ProSight Network Audits offer a quick and low-cost alternative for small and mid-size businesses to obtain an objective evaluation of the health of their information system. Based on some of the top remote monitoring and management (RMM) tools available, and overseen by Progent's certified group of IT experts, ProSight Network Audits help you see how closely the configuration of your core network devices conform to leading practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate benefits like a cleaner Active Directory (AD) environment. Both also come with one year of cutting-edge remote network monitoring and management (RMM). Advantages can include simpler management, improved compliance with information security standards, more efficient utilization of network assets, quicker troubleshooting, more dependable backup and recovery, and higher availability. Learn more about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is an affordable service built around a phone discussion with a Progent backup/recovery expert. The fact-finding interview is intended to evaluate your company's preparedness to stop or recover quickly following an assault by a ransomware strain like Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you personally to gather information concerning your current antivirus tools and backup/recovery system, and Progent will then deliver a written Basic Security and Best Practices Report document describing how you can follow industry best practices to build an efficient AV and backup environment that aligns with your business needs. For details, visit The ProSight Ransomware Preparedness Report Service.
Fixed-price Security Evaluation and Validation Packages
Progent has put together a portfolio of set-price security assessment packages that deliver exceptional value by deploying Progent's enterprise-class system monitoring and analysis tools plus Progent's technical experience to create an unbiased and comprehensive assessment of your network security profile.
Our System Has Been Hacked: What Can We Do?
- Security Assessment Service Bundles for Small Organizations
Progent offers two ultra-affordable security inventory scanning service packages intended to enable small organizations to get a professional security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer manages a comprehensive assessment of your network from outside your firewalled perimeter to identify possible gaps in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security expert executes a network scan from an authorized computer inside your company firewall to evaluate your exposure to inside assaults. These two security inventory scanning services are configured and executed from a secured offsite location. The project is managed by an engineer who has been awarded advanced security certifications and who produces a report that details and evaluates the data captured by the security scan and suggests practical enhancements where required.
- Security Vulnerability Assessment Packages for Large Businesses
Progent offers three levels of flat-rate security evaluation service bundles designed for large organizations who need to meet compliance standards required by state or industry agencies. Progent's security evaluation service bundles offer larger organizations a chance to get a professional assessment at the viability of their security profile. For every security evaluation package, Progent consultants with top security credentials study and report on captured data and provide recommendations for efficient remediation. All the network security audit packages include an added-cost option for onsite consultants anywhere in the United States.
- Stealth Penetration Testing Services
Stealth penetration testing, commonly known as PEN testing, is a critical technique for allowing organizations to determine how vulnerable their IT systems are to modern attacks. Progent's stealth penetration testing test how well your corporate security policies and technologies resist authorized but unannounced intrusion attempts launched by Progent's certified security experts utilizing cutting-edge hacking methods. Read about Progent's stealth penetration testing (PEN Test) services.
If your business is currently faced with a security emergency and you have no formal recovery plan, visit Progent's Online Network Help to find out how to get fast assistance. Progent offers online technical support from experienced network technicians and can escalate trouble tickets to certified security specialists if necessary. Your organization does not have to be a current Progent customer to get urgent support for a security problem, but you can register as a Progent customer ahead of time for free and your standing as a registered client could save valuable time in a crisis.
Usually, smaller businesses have not documented a recovery plan in case of a damaging penetration. This is not good, since the cost of a serious security assault can be more devastating for a small business than for a big corporation. Progent's security engineers can assist your company to design a practical response and event reporting plan that minimizes the IT system downtime resulting from a security breach. The step-by-step post-attack handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's suggested procedure for responding to a major security attack.
Advanced Security Services Offered by Progent
Progent's seasoned consultants can provide consulting support in key areas of network compliance such as:
Progent's Security Certifications
- Security Vulnerability Audits and Compliance Assessment
Progent provides experience with security auditing tools like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of automatic network tests to identify possible security holes. Progent has extensive skills with these tools and can assist your company to understand assessment reports and respond efficiently. Progent's certified security engineers also offer web application validation and can perform expert evaluation of corporate-wide security to confirm your organization's compliance with important industry security standards including HIPAA, NIST, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless protection including fixed wireless appliances as well as mobile handsets. Find out more information concerning Progent's Information Risk Evaluation and Security Compliance Assessment.
- Designing, Implementing, and Testing Secure Networks
Any company should develop a thoroughly considered security strategy that incorporates both proactive and responsive elements. The proactive strategy is a set of precautions that works to reduce security holes. The reactive plan defines activities to assist IT personnel to assess the damage caused by an attack, remediate the damage, document the event, and restore business functions as soon as feasible. Progent can show you how to build security into your business operations, set up scanning software, define and execute a safe network infrastructure, and propose processes and policies to enhance the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, deploy safe remote connectivity to email and files, and configure an effective VPN. If you are interested in an economical way for outsourcing your security management, Progent's Round-the-clock Monitoring Options include non-stop online network tracking and fast resolution of emergencies.
- Data Restoration and Failure Analysis
Progent offers expertise in restoring systems and devices that have been compromised, are in question, or have ceased to function following a security attack. Progent can help determine the losses resulting from the breach, return your company to ordinary business operations, and retrieve information lost owing to the attack. Progent's certified engineers can also oversee a comprehensive forensic analysis by going over event logs and using other proven assessment tools. Progent's experience with security consulting reduces your off-air time and permits Progent to recommend effective strategies to prevent or mitigate new assaults.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and troubleshooting services.
- Other Firewall and VPN Consulting Services
In addition to being expert in a wide array of protection solutions available from Microsoft and Cisco, Progent offers small and mid-size businesses expert support for security products from other important firewall and Virtual Private Network (VPN) vendors including:
- SIEM Integration and Support
Security information and event management (SIEM) software and services are designed to digest the massive amounts of data represented by security incident logs generated by a wide range of sources such as network appliances, servers, and application software and monitoring tools. SIEM applications organizes the security logs from these diverse sources and creates consolidated reports of security events as required by state regulations and business compliance guidelines. Progent's GIAC-certified information assurance experts and Cisco CCIE certified network experts can assist organizations to design, deploy and manage a SIEM system that enables them to understand the behavior of attacks and comply with event reporting requirements. (See Progent's Security information and Event Management solutions.)
Progent's security specialists have been awarded some of the most respected certifications offered in the security industry. These certifications require exhaustive examinations and proven field background to ensure that recipients have mastered a substantial amount of security information and techniques and can offer advanced solutions to information environments of any size.
Get in Touch with Progent for Network Security Expertise
- Certified Information Security Manager Security Support Services
CISM identifies the basic skills and international standards of performance that computer security professionals are required to achieve. CISM offers executive management the confidence that consultants who have been awarded their accreditation have the experience and skill to provide efficient security administration and consulting support. Progent can provide a CISM-certified consultant to help your enterprise in vital security areas such as data protection governance, risk assessment, data protection process control, and incident response support. Learn additional details about Progent's CISM Security Consulting Services.
- Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP experts are security engineers who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and formal testing. CISSP qualification recognizes mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security design and models, connection control systems, software development security, business processes security, hardware security, encryption, telecommunications, Internet security, and disaster recovery planning. Read the details concerning Progent's CISSP Support Services.
- CISSP-ISSAP} Cybersecurity Architecture Consulting Support Services
Progent's CISSP-ISSAP qualified security architecture consultants have earned ISSAP status after thorough examination and significant experience. field experience with network security design. ISSAP security experts have comprehensive knowledge of access management systems and methodologies, phone system and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-certified security experts can help your business with all phases of secure network architecture. Find out additional details concerning Progent's ISSAP Certified Protected Network Architecture Consulting Support.
- Certified Information Systems Auditor Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that indicates expertise in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants pass an extensive examination given by the ISACA professional association. Progent offers the expertise of a CISA-qualified security audit engineer able to assist companies in the fields of IS audit process, information technology governance, network assets and infrastructure planned useful life, IT service delivery, protecting information resources, and business continuity preparedness. Find out the details concerning Progent's CISA Support Assistance.
- CRISC Network Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify a consultant's skills to design, implement, and support information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and execute a business continuity plan that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's risk mitigation services are a good fit the services available from Progent's CISA-qualified consultants for objectively evaluating your IS management mechanisms and also with the expertise of Progent's CISM-certified consultants for defining security policies and procedures. Find out additional information concerning Progent's CRISC-certified IT Risk Management Expertise.
- Global Information Assurance Certification Professional Services
GIAC was founded in 1999 to certify the skill of information technology security engineers. GIAC's goal is to assure that a certified security consultant has the knowledge needed to provide services in vital areas of network, information, and software security. GIAC accreditations are acknowledged by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent offers the expertise of certified security engineers for all of the network security capabilities addressed within GIAC accreditation topics including assessing security systems, incident handling, traffic analysis, and web services security. Get additional details about Progent's GIAC Consulting Expertise.
If you're looking for computer security consulting expertise, telephone Progent at 800-993-9400 or refer to Contact Progent.