Introduction to Progent's Security Consulting Services
Progent's industry certified computer security professionals can provide a broad range of services designed to help companies of any size to identify and eliminate security weaknesses, block assaults, remediate any problems resulting from a breach of security, and comply with government requirements for guarding data and reporting incidents. Progent can deliver expert support for key security and recovery technologies such as AI-driven EDR (End Point Protection and Response), MDR (Managed Detection and Response), full system restoration validation, immutable backup, and off-site backup.
Progent can provide a selection of service delivery modes:
- On-demand remote and on-premises assistance invoiced to the nearest minute
- On-going fully managed services invoiced at an affordable fixed monthly rate
- Set-price service bundles for a single security and compliance assessment
- Emergency ransomware response. Progent will submit a bid after an assessment of the extent of the damage.
(If your network has been victimized by any version of crypto-ransomware, do not panic. Get immediate help by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
As-needed Security Consulting Services
Once you sign up for Progent's services (signing up is free), you can receive on-demand remote or on-premises assistance from one of Progent security and compliance expert. This traditional support model is primarily reactive and geared toward rapidly resolving technical issues that are affecting your network or that have stumped your own support personnel. Typical scenarios are configuring a firewall appliance or VPN connection, implementing a critical security update for a Cisco switch, designing secure access to a public cloud, or restoring data after a ransomware attack. These security services are invoiced to the nearest minute, which avoids the annoying case of receiving large bills for fast fixes.
Delivery options for Progent's on-demand support services include:
- Online Security Support
The majority security issues can be handled online through a mix of phone-based support and an Internet connection between Progent's Technical Response Center (TRC) and a customer's network. Progent's Technical Response Center can deliver online security support by offering easy access to consultants with the background and resources to resolve some of the most difficult problems quickly, making your service costs low and reducing lost productivity.
- Onsite Security Support Services
For cases where onsite assistance is required, Progent can send a technical professional to major cities across the United States. Progent can also send a security specialist with high-level certifications and world-class skills to any location in the U.S.
Progent's accredited security engineers are certified to support systems based on Microsoft Windows, Linux, macOS and OS X, Sun Solaris, and popular versions of UNIX. Progent's wide range of consulting services encompasses firewall technology, e-mail systems, protected network design, and data restoration. Progent's support staff has been awarded the industry's most advanced security certifications including Certified Information Security Manager (CISM) and Information System Security Architecture Professional. Progent also can provide fast access to online Cisco CCIE network engineers who can provide advanced assistance with complex network integration issues.
ProSight Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
- ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates SentinelOne's next generation behavior-based machine learning tools to defend endpoints and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the entire threat progression including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense based on SentinelOne technology.
- ProSight Reporting: Real-time Reporting for Ticketing and Network Monitoring Applications
ProSight Reporting is an expanding line of real-time and in-depth reporting utilities created to integrate with the top ticketing and network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting uses Microsoft Graph and features color coding to surface and contextualize critical issues such as spotty support follow-through or machines with out-of-date AVs. By identifying ticketing or network health concerns concisely and in near-real time, ProSight Reporting enhances productivity, reduces management overhead, and saves money. For details, see ProSight Reporting for ticketing and network monitoring platforms.
- ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies packaged within one agent accessible from a single control. Progent's data protection and virtualization consultants can assist you to design and implement a ProSight ESP environment that meets your organization's unique needs and that helps you demonstrate compliance with legal and industry data protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that call for immediate attention. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
- ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates and monitors your backup activities and enables rapid recovery of vital data, apps and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPAA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup.
- ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security companies to deliver centralized control and comprehensive protection for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway device adds a further layer of inspection for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email traffic that stays within your security perimeter. Learn more about Progent's ProSight Email Guard spam filtering, virus defense, email content filtering and data leakage protection.
- ProSight Duo MFA: Two-Factor Identity Authentication
ProSight Duo is a suite of managed service plans utilizing top-ranked cybersecurity technology from Duo, a Cisco company, to build two-factor authentication solutions. Two-factor authentication utilizes an out-of-band device to confirm user identity, providing a second layer of protection beyond just passwords. This counters the majority of IT security break-ins like social engineering, brute-force password guessing, and burglarized personal credentials. Duo's push technology can save time and minimize hassle by permitting users to confirm their identity as easily as clicking "Approve" on the authentication box on their own personal endpoint, which could be a smartphone, a watch, or other compatible device. This one-click procedure eliminates the need to find an email or text message and manually copy a temporary security code. Learn more about Progent's ProSight Duo MFA multi-factor authentication service plans.
- ProSight WAN Watch: Network Infrastructure Management
ProSight WAN Watch is a network infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized businesses to diagram, monitor, enhance and debug their networking hardware such as switches, firewalls, and wireless controllers as well as servers, printers, client computers and other networked devices. Incorporating cutting-edge RMM technology, WAN Watch ensures that network diagrams are kept updated, captures and displays the configuration of almost all devices on your network, monitors performance, and sends notices when problems are detected. By automating complex management and troubleshooting activities, WAN Watch can knock hours off common chores such as making network diagrams, expanding your network, locating devices that need critical software patches, or isolating performance issues. Learn more about ProSight WAN Watch infrastructure monitoring and management services.
- ProSight LAN Watch: Server and Desktop Monitoring
ProSight LAN Watch is Progent's server and desktop remote monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) technology to keep your network running at peak levels by tracking the state of vital assets that drive your business network. When ProSight LAN Watch uncovers an issue, an alert is transmitted automatically to your designated IT management personnel and your Progent engineering consultant so any potential problems can be resolved before they can impact productivity Find out more about ProSight LAN Watch server and desktop monitoring consulting.
- ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved easily to a different hosting solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
- ProSight IT Asset Management: Network Infrastructure Documentation Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard information about your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether you're making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require when you need it. Learn more about ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a quick and low-cost way for small and medium-size organizations to obtain an unbiased evaluation of the health of their information system. Based on some of the top remote monitoring and management (RMM) platforms available, and supervised by Progent's certified team of information technology professionals, ProSight Network Audits help you see how well the configuration of your essential infrastructure devices adhere to industry leading practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a low, one-time cost and provide immediate ROI like a cleaner Active Directory environment. Both versions also include a year of advanced remote network monitoring and management. Advantages can include lower-cost management, improved compliance with data security standards, higher utilization of network resources, faster problem resolution, more dependable backup and recovery, and increased uptime. Learn more information about Progent's ProSight Network Audits IT infrastructure review.
The ProSight Ransomware Preparedness Report
Progent's ProSight Ransomware Preparedness Report is a low-cost service based on a phone discussion with a Progent backup/recovery consultant. The interview is intended to assess your company's ability either to block or recover rapidly following an attack by a ransomware strain such as Ryuk, WannaCry, NotPetya, or Locky. Progent will consult with you directly to gather information about your existing cybersecurity profile and backup system, and Progent will then deliver a written Basic Security and Best Practices Report detailing how you can follow best practices to deploy an efficient security and backup/recovery system that meets your business requirements. For more information, refer to Progent's ProSight Ransomware Preparedness Report Service.
Set-price Security Assessment and Validation Packages
Progent offers a variety of fixed-price security assessment packages that provide high value by utilizing Progent's advanced network monitoring and analysis tools as well as Progent's technical skills to produce an objective and comprehensive assessment of your network security profile.
- Security Assessment Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages intended to allow small businesses to get a professional security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your IT system from beyond your corporate firewall to identify potential gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security consultant executes a network scan using an authorized machine inside your corporate firewall to evaluate your exposure to inside threats. These two security inventory scans are configured and executed from a secured offsite location. The project is managed by an engineer who has earned advanced security certifications and who produces a report that describes and interprets the data captured by the scan and suggests practical improvements where required.
- Security Vulnerability Assessment Bundles for Large Businesses
Progent has developed three levels of fixed-price security evaluation service bundles designed for enterprises who want to meet security standards required by government or industry agencies. Progent's security evaluation service bundles offer enterprises an opportunity to get a professional assessment at the viability of their security posture. For every security assessment bundle, Progent consultants with top security credentials analyze and report on captured data and offer recommendations for cost-effective remediation. All the network security audit packages include an added-cost option for onsite consultants anywhere in the U.S.
- Consulting Services for Horizon3.ai's NodeZero PEN Testing Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that supports repeated, concurrent, programmable assessment of your internal and perimeter network to help you expose, prioritize, fix, and confirm security vulnerabilities before malicious hackers can take advantage of them. Progent offers the skills of a NodeZero Certified Operator who can help you to deploy NodeZero to carry out comprehensive penetration tests of your network perimeter and your internal IT infrastructure so you can evaluate your present security profile. Progent's NodeZero experts can also assist you to strengthen your network security and can help you to design and implement a unified cybersecurity strategy that streamlines management and delivers optimum protection for on-prem, multi-cloud, and perimeter IT resources. To find out additional information about Progent's threat assessment services based on on NodeZero's PEN test platform, see Consulting Support for NodeZero's Pentest Platform.
- Stealth Penetration Testing
Stealth penetration testing, commonly referred to as PEN testing, is a critical technique for allowing organizations to determine how open their IT environments are to current-generation threats. Progent's stealth penetration testing services check how well your existing security policies and platforms resist authorized but unannounced intrusion attempts managed by Progent's veteran security specialists utilizing cutting-edge hacking techniques. Read about Progent's stealth penetration testing services.
Download the Security Services Overview Datasheet
To download a datasheet containing an overview of Progent's services for network security, click:
Overview of Progent's IT Security Services Portfolio (PDF - 511 KB).
Our Network Has Been Hacked: What Should We Do Now?
If your business is now experiencing a security emergency and you have no formal recovery plan, refer to Progent's Online Computer Help to learn how to get fast assistance. Progent provides remote assistance from skilled network technicians and can escalate problems to high-level security experts if required. Your company does not need to be a registered Progent client to get emergency help for a security breakdown, but you can register as a Progent customer ahead of time at no cost and your standing as a registered client could save valuable time when there is a crisis.
Usually, smaller businesses have not documented a recovery procedure in the event of a damaging security breach. This is risky, since the cost of a successful security attack can be more catastrophic for a small business than for a large enterprise. Progent's security specialists can assist your business to create an efficient recovery and incident reporting procedure that reduces the network disruption resulting from a security breach. The formal incident response procedure promoted by Global Information Assurance Certification is Progent's preferred procedure for responding to a serious security penetration.
High-value Security Services Offered by Progent
Progent's security engineers offer expertise in key facets of IT protection such as:
- Security Vulnerability Audits and Security Compliance Testing
Progent provides experience with security auditing tools such as Microsoft Baseline Security Analyzer or LANguard for performing a set of automatic system tests to uncover possible security problems. Progent has extensive skills with scanning utilities and can help your company to analyze audit reports and respond efficiently. Progent's security consultants also provide web software testing and can conduct expert evaluation of enterprise-wide security to validate your company's compliance with key worldwide security standards such as HIPAA, PCI, and ISO. In addition, Progent can assess the strength of your wireless security covering stationary wireless equipment plus portable devices. Read additional details about Progent's Security Vulnerability Evaluation and Compliance Testing.
- Planning, Implementing, and Validating Protected Environments
Any business should develop a carefully considered security strategy that incorporates both proactive and responsive elements. The proactive strategy is a set of precautions that works to reduce vulnerabilities. The post-attack strategy specifies procedures to help security staff to assess the losses caused by a breach, repair the damage, document the experience, and revive network activity as quickly as feasible. Progent can show you how to design security into your company processes, install auditing software, create and implement a safe IT architecture, and recommend procedures and policies to optimize the safety of your information system. Progent's security experts are ready to assist you to configure a firewall, deploy secure offsite access to e-mail and data, and configure an effective VPN. If your company is looking for an affordable option for jobbing out your security administration, Progent's Round-the-clock Network Support Services feature non-stop remote network tracking and quick resolution of emergencies.
- System Recovery and Security Forensics
Progent has skill in recovering systems and servers that have been compromised, are quarantined, or have ceased to function as a result of a security penetration. Progent can help determine the damage resulting from the assault, return your company to ordinary functions, and retrieve data compromised as a result of the assault. Progent's security engineers can also manage a thorough failure evaluation by going over activity logs and utilizing other advanced assessment tools. Progent's experience with security issues reduces your business disruption and permits Progent to suggest effective ways to prevent or mitigate future attacks.
- Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your current PIX or ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower configuration and debugging support.
- Other Firewall and Virtual Private Network Solutions Offered by Progent
In addition to supporting a broad array of network security technologies available from Microsoft and Cisco, Progent can provide small and mid-size companies expert engineering services for products from other important firewall and Virtual Private Network vendors by providing services including:
- SIEM Integration and Support
Security information and event management (SIEM) applications and services are intended to make sense the massive amounts of data collected in security event logs generated by multiple sources including network appliances, servers, and application software and monitoring tools. SIEM software organizes the security event records from these diverse sources and creates consolidated reports of security incidents as mandated by state regulations and industry compliance standards. Progent's GIAC-certified computer security experts and Cisco CCIE certified network consultants can help organizations to plan, install and manage a SIEM system that enables them to understand the behavior of security incidents and comply with security incident reporting regulations. (See Progent's Security information and Event Management (SIEM) solutions.)
- Patch Management Solutions
Patch management entails applying software updates to operating systems and applications, servers and endpoints, peripherals such as printers and scanners, network infrastructure appliances such as routers and wireless access points, and Internet-of-Things (IoT) devices such as sensors and health monitors. Prompt and properly managed updating optimizes security, regulatory compliance, uptime, and functionality. Sporadic patch management can cause security gaps, compatibility issues, slow or inconsistent performance, excessive offline stretches, or unavailability of key features. Progent's support services for software and firmware patch management provide businesses of any size a versatile and cost-effective alternative for evaluating, testing, scheduling, applying, and tracking software and firmware updates to your dynamic information network. (Visit Progent's patch management solutions.)
Progent's Security Accreditations
Progent's security consultants have earned the most respected accreditations available in the security industry. All of these certifications demand extensive testing and proven field experience to guarantee that recipients have mastered a significant body of security information and techniques and can provide advanced consulting to computer environments of any size.
- CISM Security Consulting Expertise
CISM identifies the core competencies and worldwide benchmarks of service that information security managers are expected to master. It offers business management the assurance that those who have earned their CISM have the experience and skill to offer efficient security management and consulting support. Progent can provide a CISM-certified support professional to help your enterprise in vital security areas including information security governance, vulnerability assessment, information protection program management, and crisis handling management. Find out more details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Services.
- CISSP Security Consulting Expertise
Progent's CISSP consultants are security specialists who have earned CISSP accreditation through demonstrated experience, extensive study, and exhaustive testing. CISSP qualification indicates mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Areas of expertise covered under CISSP include security management practices, security architecture and models, access permission methodology, software development security, operations security, hardware security, cryptography, communications, network security, and business continuity planning. Find out more information about Progent's CISSP Consulting Services.
- CISSP-ISSAP Security Architecture Consulting Support Services
Progent's CISSP-ISSAP Premier security architecture experts have been awarded ISSAP accreditation as a result of rigorous examination and significant hands-on work with information security design. ISSAP consultants have in-depth knowledge of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security. Progent's CISSP-ISSAP-premier security experts can assist your business with all aspects of secure network architecture. Find out more details about Progent's ISSAP Certified Secure IT Architecture Consulting Support.
- Certified Information Systems Auditor Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that signifies expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an extensive test given by the ISACA international professional association. Progent offers the services of a CISA-Certified security engineer able to help businesses in the fields of information systems audit process, information technology administration, network assets and infrastructure planned useful life, IT service delivery, safeguarding information assets, and disaster recovery preparedness. Learn the details about Progent's Certified Information Systems Auditor Consulting Services.
- CRISC-certified Network Risk Management Specialists
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's skills to design, implement, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's risk management expertise is a good fit the services provided by Progent's CISA-Certified consultants for impartially assessing your IS management mechanisms and also with the expertise of Progent's CISM support professionals for defining security policies. Get additional details about Progent's CRISC-certified Network Risk Management Consulting.
- GIAC Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security engineers. GIAC's goal is to ensure that an accredited security consultant has the skills needed to deliver services in important areas of network, information, and application software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the U.S. NSA. Progent can provide the support of certified consultants for all of the network security services addressed within GIAC certification topics such as auditing IT infrastructure, security incident response, traffic analysis, and web services security. Learn the details about Progent's Global Information Assurance Certification Professional Services.
Get in Touch with Progent for Computer Security Expertise
If you need computer security help, phone Progent at 800-993-9400 or see Contact Progent.