Overview of Progent's Security and Compliance Consulting Services
Progent's certified security and compliance consultants offer a wide range of professional services intended to help organizations of all sizes identify and eliminate security vulnerabilities, defend against malicious attacks, recover from the damage caused by a security breach, and comply with regulatory requirements for protecting data and reporting incidents. Progent can provide world-class expertise for vital security and recovery solutions including AI-based EDR (End Point Protection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Response), complete system restoration testing, immutable backup, and cloud backup. Progent offers a variety of service models:

Progent offers a variety of service models:

  • On-demand remote and on premises support billed by the minute
  • On-going fully managed services billed at a low fixed monthly rate
  • Set-price service packages for one-time security and compliance assessment and testing
  • Emergency ransomware response. Progent will submit a bid based on an evaluation of the damage.
    (If your system has been breached by any strain of ransomware, don't panic. Get immediate help by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.)
On-demand Security Support Options
Once you sign up for Progent's services (signing up is free), you can receive as-needed remote or on-premises support from a Progent security and compliance expert. This traditional support model is primarily reactive and geared toward quickly resolving technical issues that are disrupting your network or that have stumped your in-house support staff. Typical examples include re-configuring a firewall or VPN tunnel, installing a critical security patch for a Cisco switch, debugging connectivity to a public cloud, or recovering from a ransomware attack. These services are billed by the minute, which avoids the common scenario of getting big invoices for quick fixes. Delivery alternatives for Progent's on-demand support include:
  • Remote Security Support Services
    Most security issues can be handled online via a mix of phone-based support and a remote Internet connection between Progent's Technical Response Center (TRC) and a customer's computer. Progent's TRC group can provide remote security support by offering access to consultants with the experience and technical resources to fix some of the most challenging problems quickly, making your service expenses affordable and minimizing lost productivity. Progent offers online security help with billable time to the nearest minute and with no minimum charges. Progent's pricing structure avoids scenarios where simple solutions entail big charges.
  • Onsite Security Support Services
    For cases where on-site support is required, Progent can dispatch a field service professional to major cities across the United States. Progent can also provide a security consultant with advanced certifications and world-class skills to any site in the U.S.
  • 24x7 Ransomware Hotline
    Progent's Ransomware Hot Line is intended to help you complete the time-critical first phase in mitigating a ransomware attack by putting out the fire. Progent's online ransomware experts can help businesses to locate and quarantine breached servers and endpoints and guard undamaged resources from being compromised. If your network has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
  • Ransomware Defense, Removal and Business Recovery Services
    Progent can provide the services of a proven team of ransomware removal and business recovery consultants who are experienced with protecting your network against ransomware and restoring your IT network after a ransomware attack. Progent's NodeZero penetration testing experts can help you find, prioritize, fix, and verify cybersecurity vulnerabilities that could be exploited by ransomware attacks on a distributed environment. Progent also offers certified expertise in SentinelOne's Singularity EDR platform that uses autonomous AI to power state-of-the-art endpoint detection and response (EDR) and defend against the latest ransomware assaults.Progent's team of cybersecurity experts bring the broad range of skills required to rebuild all components of a compromised network quickly and with minimal loss of data. To find out about Progent's ransomware protection and recovery services, see Progent's ransomware removal and business restoration services.
  • Cybersecurity for Telecommuters
    At-home staff members typically utilize their own computers and usually work in an unsecured physical space. This situation increases their susceptibility to malware threats and calls for judicious configuration of firewalls, AV tools, multi-factor authentication, remote endpoint monitoring, thorough end-user training, and the development of security policies built on best practices. Progent's veteran team of Work-from-Home (WFH) solutions experts can assist your business to plan, deploy and manage an effective cybersecurity solution that guards critical IT assets in networks that incorporate at-home workers.
Progent's accredited security consultants are certified to provide help for systems based on Microsoft Windows, Apple Mac, and major distributions of Linux. Progent's wide range of services addresses firewall expertise, email systems, protected system architecture, and data recovery. Progent's support team has been awarded the industry's most advanced security credentials including CISA, CISM, CISSP, ISSAP and GIAC. Progent also can provide immediate access to online Cisco CCIE network engineers who can deliver advanced support for complex network configuration problems.

Managed Services for Security and Information Assurance
Progent ProSight suite of flat-rate network management services are designed to provide small and mid-size businesses with enterprise-class technology for all aspects of information assurance. ProSight managed services available from Progent include:

  • ProSight LAN Watch: Network, Server, and Endpoint Monitoring
    ProSight LAN Watch is Progent's network, server, and endpointp remote monitoring and management subscription service that uses advanced RMM technology to help keep your IT system operating at peak levels by tracking the state of vital assets that power your business network. When ProSight LAN Watch detects an issue, an alarm is sent immediately to your designated IT personnel and your Progent consultant so any potential problems can be addressed before they can disrupt your network. ProSight LAN Watch is National Institute of Standards (NIST) compliant. Learn more details about ProSight LAN Watch netywork, server, and endpoint remote monitoring and management services.
  • ProSight LAN Watch with NinjaOne RMM: Centralized RMM Solution for Networks, Servers, and Workstations
    ProSight LAN Watch with NinjaOne RMM software offers a centralized, cloud-based platform for monitoring and managing your server and desktop devices by providing tools for streamlining common time-consuming tasks. These include health monitoring, patch management, automated remediation, endpoint deployment, backup and recovery, A/V protection, secure remote access, built-in and custom scripts, resource inventory, endpoint status reporting, and troubleshooting support. When ProSight LAN Watch with NinjaOne RMM uncovers a serious issue, it sends an alarm to your designated IT personnel and your assigned Progent technical consultant consultant so that emerging problems can be fixed before they impact your network productivity. Learn more about ProSight LAN Watch with NinjaOne RMM server and desktop monitoring consulting services.
  • ProSight WAN Watch: Infrastructure Remote Monitoring and Management
    Progent's ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to map, track, optimize and debug their networking appliances such as routers and switches, firewalls, and access points as well as servers, client computers and other devices. Incorporating cutting-edge Remote Monitoring and Management technology, WAN Watch makes sure that network maps are kept updated, captures and displays the configuration of almost all devices connected to your network, monitors performance, and sends alerts when issues are discovered. By automating tedious management and troubleshooting activities, ProSight WAN Watch can knock hours off ordinary chores like making network diagrams, reconfiguring your network, finding devices that require important software patches, or identifying the cause of performance problems. Learn more details about ProSight WAN Watch network infrastructure management consulting.
  • ProSight Reporting: Real-time and In-depth Reporting for Ticketing and Network Monitoring Platforms
    ProSight Reporting is an expanding suite of real-time reporting utilities created to integrate with the industry's top ticketing and network monitoring platforms such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne. ProSight Reporting incorporates Microsoft Graph and features color coding to highlight and contextualize critical issues such as spotty support follow-up or endpoints with out-of-date AVs. By exposing ticketing or network health problems concisely and in near-real time, ProSight Reporting enhances network value, lowers management overhead, and saves money. For more information, see ProSight Reporting for ticketing and network monitoring platforms.
  • ProSight Data Protection Services: Fully Managed Cloud Backup Services
    ProSight Data Protection Services offer small and mid-sized organizations an affordable, fully managed service for secure backup/disaster recovery (BDR). The ProSight DPS family of services automate and monitor your backup activities and allow rapid recovery of vital files, folders, apps, and system images as well as Hyper-V and VMware images. ProSight DPS services help you recover from hardware breakdown, natural and human-caused disasters, cyber attacks such as ransomware, human mistakes, or software defects. Immutable Cloud Storage makes data tamper-proof while under your defined immutable policy so backup data cannot be modified by any user (including administrators or root users). This adds an extra level of security and recoverability in the event of a successful ransomware attack. Bare Metal Restore allows you to restore like or unlike hardware, and you can use point-in-time recovery. You can back data up to the cloud, to an on-premises device, or mirror your backups to both. Managed backup services available in the ProSight DPS family include ProSight Hornetsecurity/Altaro VM Backup, ProSight Altaro Microsoft 365 Total Backup, ProSight DPS ECHO Backup based on Barracuda purpose-built storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can help you determine which of these fully managed solutions are best suited for your IT environment.
  • ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
    Progent has worked with top data security companies to offer ProSight Email Guard, a hybrid solution that combines cloud and on-premises resources to defend against spam, viruses, Denial of Service (DoS) attacks and other email-based threats. Email Guard offers both inbound and outbound filtering. Data Loss Protection (DLP) and cloud-assisted encryption use custom policies for automatically keeping sensitive information from leaking from your organization via intentional or careless emails. By blocking outbound spam and viruses, Email Guard also helps keep your organization off spam block lists. To assure consistent system performance, Email Guard offers adjustable, threshold-based rate control for inbound and outbound email traffic. Learn more about Progent's ProSight Email Guard spam filtering, data leakage protection and content filtering.
  • ProSight Duo MFA: Two-Factor Identity Authentication
    ProSight Duo MFA is a family of managed services that incorporates industry-leading technology from Duo, a Cisco company, to deliver two-factor authentication solutions. Two-factor authentication (2FA) uses out-of-band identity validation to provide a second layer of protection beyond just passwords. This protects against the most common causes of cybersecurity breaches such as phishing, social engineering, brute-force password attacks, and stolen credentials. Duo's push technology can save time and hassle by allowing users to verify their identity simply by tapping "Approve" on the authentication prompt on their compatible personal device. This one-tap process eliminates the need to open an email or text message and transcribe a security code manually. Learn more about Progent's ProSight Duo MFA Two-Factor identity authentication service plans.
  • ProSight Co-Managed Help Desk Services: Outsourced and Co-Sourced IT Support
    ProSight Co-Managed Help Desk Support provides a seamless extension of your in-house IT support resources. End user interaction with the Service Desk, delivery of technical assistance, problem escalation, trouble ticket creation and tracking, performance measurement, and management of the support database are consistent whether issues are resolved by your in-house network support group by Progent's team, or by a mix of the two. Your business has complete flexibility to expand or reduce your part of technical support activity as needed. Progent provides initial deployment and onboarding of the professional services automation (PSA) software as well as workflow documentation, validation and training. For more information about ProSight Co-Managed Call Desk Support, visit ProSight Co-Managed Call Desk Support.
  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting-edge behavior analysis from SentinelOne to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which evade traditional signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to manage the complete threat lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and real-time, network-wide immunization against new threats. Find out more about Progent's ProSight ASM next-generation endpoint protection and ransomware defense. (Progent is also a SentinelOne Partner, reseller, and integrator.)
  • ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
    Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools incorporated within one agent managed from a single control. Progent's security and virtualization experts can assist your business to design and implement a ProSight ESP deployment that meets your company's unique requirements and that allows you achieve and demonstrate compliance with government and industry data protection regulations. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate attention. Progent can also assist you to set up and test a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
  • ProSight Virtual Hosting: VM Hosting Services at a World-class Data Center
    ProSight Virtual Hosting service makes it affordable for small and mid-size businesses to have their critical servers and applications hosted in a world-class data center in a virtualized environment set up and managed by Progent's networking experts. Progent's model for ProSight Virtual Hosting services allows the customer to keep ownership of all data, operating systems licenses, and applications. Since the environment is virtualized, you can move it easily and quickly a different host without requiring a lengthy and expensive reconfiguration process. You are not locked into a sole hosting service. For more information about ProSight Virtual Hosting services, go to ProSight Virtual Hosting Services.
  • ProSight IT Asset Management: Network Infrastructure Documentation and Password Management Services
    ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect data related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or domains. By updating and managing your network documentation, you can save as much as 50% of time thrown away trying to find critical information about your network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether you're planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable way for small and mid-size organizations to obtain an unbiased evaluation of the overall health of their IT system. Powered by some of the leading remote monitoring and management tools in the industry, and supervised by Progent's world-class group of IT experts, ProSight Network Audits help you see how well the deployment of your core network devices adhere to best practices. The Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver immediate benefits like a more manageable Active Directory (AD) environment. Both also include one year of cutting-edge remote network monitoring and management (RMM). Advantages can include easier management, better compliance with government and industry security standards, higher utilization of IT assets, quicker troubleshooting, more reliable backup and recovery, and less downtime. Learn more about ProSight Network Audits IT infrastructure assessment.

Set-price Security Assessment and Verification Packages
Progent offers a number of fixed-price security and compliance evaluation bundles that provide exceptional value by utilizing Progent's advanced network monitoring software as well as Progent's consulting experience to deliver an objective and thorough analysis of your network security.

  • Security Inventory Service Bundles for Small Businesses
    Progent has put together two ultra-affordable security inventory scanning packages designed to allow small businesses to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from beyond your firewalled perimeter to determine potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine inside your company firewall to assess your exposure to internal assaults. The two security inventory services are configured and run from a secured external site. The project is managed by an engineer who has earned high-level security certifications who produces a document that details and interprets the data captured by the scan and suggests practical improvements where appropriate.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent offers three levels of set-price security evaluation service bundles designed for enterprises who need to meet security standards required by state regulators or by vendors. Progent's security assessment service packages offer larger businesses a chance to get a professional look at the strength of their protection profile. For each security evaluation bundle, Progent engineers with top security credentials analyze and report on collected data and provide recommendations for efficient remediation. The various network security audit packages include an added-cost option for onsite engineers anywhere in the U.S.
  • Consulting Services for the NodeZero Penetration Testing Platform
    NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that supports continuous, concurrent, automated testing of your network to help you find, prioritize, fix, and verify cybersecurity vulnerabilities before threat actors can exploit them. Progent can help you use NodeZero to perform comprehensive penetration tests of your network perimeter and your internal IT infrastructure in order to determine your complete security profile. Progent can also help you harden your current network security and can work with you to design and deploy a unified cybersecurity strategy that streamlines management and provides optimum protection for on-prem, multi-cloud, and perimeter IT assets. To learn about Progent's threat assessment services based on NodeZero's pen testing platform, visit Consulting Services for NodeZero's Penetration Testing Platform.
  • Stealth Penetration Testing Services
    Stealth penetration testing, known as PEN testing, is a common technique for allowing businesses to find out how vulnerable their IT environments are to real-world threats by testing how well corporate security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by veteran security specialists using advanced hacking methods. Get additional information about Progent's Stealth Penetration Intrusion Testing Services.
Download Progent's Security Services Overview Datasheet
To download a datasheet containing an overview of Progent's security services, click:
Overview of Progent's Security Services (PDF - 511 KB).

We've Been Hacked: What Can We Do?
Cybersecurity ConsultingIf you are currently faced with a security crisis and you have no formal response plan, refer to Progent's Emergency Remote Computer Support to find out how to receive fast assistance. Progent offers online help from skilled engineers and can escalate problems to high-level security specialists if required. Your company does not need to be a current Progent customer to get urgent support for a security breach, but you can sign up as a Progent customer in advance at no cost and your standing as a current client can save precious time when there is an emergency.

Typically, small companies have no documented response plan in case of a security breach. This is risky, since the damage from a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security consultants can assist your company to design an efficient recovery and incident reporting plan that minimizes the IT system disruption resulting from a security penetration and that complies with regulatory reporting requirements. The formal incident response model promoted by GIAC is Progent's recommended method for responding to a serious security penetration.

Advanced Security Services Offered by Progent
Progent's veteran engineers can provide world-class expertise in vital facets of computer compliance such as:

  • Security Vulnerability Evaluation and Security Compliance Testing
    Progent provides expertise with security auditing tools such as Microsoft Baseline Security Analyzer and LANguard for conducting a variety of automatic system tests to identify potential security holes. Progent has extensive skills with these utilities and can assist you to analyze assessment reports and react efficiently. Progent's security engineers also can perform web software testing and can conduct objective evaluations of enterprise-wide security to validate your organization's compliance with major global security specifications such as FISMA, NIST, and ISO. In addition, Progent can assess the effectiveness of your wireless protection covering stationary wireless appliances as well as mobile devices. Progent offers a selection of value-priced security vulnerability evaluation and compliance testing packages and help you with custom security assessment projects.
  • Designing, Implementing, and Testing Secure Environments
    Every business ought to have a carefully thought out security plan that incorporates both proactive and responsive activity. The pre-attack strategy is a collection of steps that helps to reduce vulnerabilities. The reactive strategy defines activities to assist IT staff to assess the losses resulting from a breach, repair the damage, document the experience, and restore business activity as quickly as feasible. Progent can advise you how to build protection into your business operations, configure scanning utilities, create and build a safe IT infrastructure, and propose processes and policies to enhance the protection of your information system. Progent's security professionals are available to help you to set up a firewall, design safe remote access to e-mail and data, and configure practical VPN connections. If your company is looking for an affordable way for outsourcing your network security administration, Progent's 24x7 Network Support Options include automated online network tracking and fast response to emergencies.
  • Data Recovery and Forensics
    Progent has expertise in recovering systems and servers that have been hacked, are quarantined, or have stopped working because of a security penetration. Progent can help determine the damage caused by the attack, return your company to ordinary functions, and recover information compromised owing to the event. Progent's security specialists can also perform a thorough forensic evaluation by examining activity logs and utilizing other advanced assessment tools. Progent's background with security problems minimizes your downtime and allows Progent to propose effective ways to avoid or mitigate new assaults. Progent's ProSight Active Security Monitoring managed service includes a powerful forensics visualization tool to help you understand the progression of a malware attack within your network from inception to containment. This allows you to pinpoint vulnerabilities so you can address vulnerabilities in your security strategy.
  • Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
    Cisco Certified CCIE Security ConsultantsThe new ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your existing PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and debugging support.
  • Other Firewall and VPN Technologies Supported by Progent
    In addition to offering expertise in a broad array of security solutions from Microsoft and Cisco, Progent can provide small and mid-size businesses top-tier consulting for technologies from other important firewall and Virtual Private Network (VPN) vendors by delivering services that include:
    Palo Alto Networks consulting
    Check Point Software Technologies expertise
    Barracuda CloudGen Firewall Consulting
    WatchGuard support services
    Juniper Networks/NetScreen integration consulting
    SonicWall configuration help
    Fortinet FortiGate Firewall and VPN integration consulting
    Symantec consulting expertise
  • SIEM Security Information and Event Management Solutions
    Security information and event management (SIEM) software and services are intended to digest the massive amounts of data collected by security event logs generated by a wide range of sources including network infrastructure appliances, operating systems, and application software. SIEM software analyzes the variously formatted security event records from these diverse sources and produces summary reports of security incidents as mandated by government regulations and industry compliance standards. Progent's GIAC-certified security forensics experts and Cisco-certified network infrastructure consultants can help organizations design, deploy and operate a SIEM system that helps them understand their threat environment and comply with security incident reporting requirements. (Visit Progent's Security information and Event Management (SIEM) solutions.)
  • Software Update Management Services
    Patch management includes applying software or firmware updates to operating systems and applications, servers and endpoints, peripherals, network appliances, and Internet-of-Things devices. Properly executed patch management optimizes security, compliance, availability, and functionality. Sloppy patch management can cause security gaps, compatibility problems, erratic performance, unnecessary downtime, or loss of features. Progent's managed services for patch management provide businesses of any size an affordable end-to-end solution for identifying, acquiring, evaluating, testing, prioritizing, scheduling, applying, and documenting software and firmware updates to your ever-evolving IT network. In addition to optimizing the security and functionality of your IT network, Progent's patch management services free up time for your IT staff to focus on strategic projects and tasks that deliver maximum business value to your network. (Visit Progent's patch management solutions.)
Progent's Security Certifications
Progent's security professionals have been awarded the most respected accreditations offered in the security industry. These certifications require exhaustive examinations and demonstrated work background to guarantee that candidates have mastered a significant body of security information and methodologies and can offer advanced solutions to computer networks of any complexity.
  • Certified Information Systems Auditor (CISA) Support Expertise
    CISA Certified Security Auditing ConsultantsThe CISA credential is a recognized achievement that represents expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA professional group. The certification also requires five years of information systems auditing, control, assurance or security work experience. In addition to auditing information systems, the CISA certification covers other key areas including IT governance and management, information system development and implementation, information system operations and maintenance, plus protection of information assets.

    Progent can provide the expertise of a CISA-certified security professional able to assist companies in the areas of information systems audit process, information technology governance, systems and architecture lifecycle, information technology support, protecting data resources, and business continuity planning. Get more details concerning Progent's CISA-certified security audit consulting.

  • Certified Information Security Manager (CISM) Security Support Expertise
    CISM Certified Security Management ConsultantsCISM identifies the fundamental competencies and worldwide standards of service that IT security professionals are required to master. CISM provides executive management the confidence that those who have earned their certification have the experience and knowledge to offer effective security administration and consulting support. CISM certifies mastery in managing information security. This covers information security governance, risk management, program development and management, and incident management. CISM certification also requires five years of professional experience in information management.

    Progent can provide the support of a CISM-certified expert to assist your organization in critical security areas such as data security governance, vulnerability assessment, data security program control, and crisis response management. Get more details concerning Progent's CISM-certified security management consulting.

  • Certified in Risk and Information Systems Control (CRISC) Risk Management Consulting
    CRISC-certified Information Systems Risk Management ConsultantsThe CRISC program was established by ISACA to validate a consultant's skills in designing, implementing, and supporting information system controls to manage network risk. CRISC certification confirms a consultant's hands-on work background and thoroughly tests knowledge in critical fields of information system risk mitigation: including risk identification and assessment, risk response and monitoring, information system control design and deployment, plus monitoring and maintenance of IS controls. Progent's risk mitigation expertise is complementary to the services available from Progent's CISA-qualified security engineers for impartially auditing your IS control design and with the expertise of Progent's CISM-certified consultants for defining security policies and procedures.

    Progent offers the services of a CRISC-certified consultant to help your business plan, deploy, monitor, manage, and troubleshoot efficient risk-based information systems controls. Find out additional details about Progent's CRISC-certified IT risk management consulting.

  • Certified Information Systems Security Professionals (CISSP) Security Support Expertise
    CISSP Certified Cybersecurity ConsultantsProgent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified experience, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for information security. ANSI has given the CISSP status official recognition in the field of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security administration practices, security design and models, connection control systems, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning.

    Read more about Progent's CISSP-certified cybersecurity consultants.

  • Information Systems Security Architecture Professionals (ISSAP) Consulting Services
    CISSP Certified Cybersecurity ConsultantsProgent's CISSP-ISSAP certified security consultants are experts who have earned ISSAP certification as a result of rigorous testing and significant experience. field experience with information security design. Cybersecurity consultants who have earned CISSP-ISSAP (Information Systems Security Architecture Professional) certification have demonstrated their ability to assist large organizations in the roles of security architect, network designer, business analyst, and chief security officer. Progent's CISSP-ISSAP consultants can assist you to incorporate a robust architectural framework into your company-wide security strategy, plan and deploy an advanced identity management solution, review and improve your access control systems, provide governance and risk management support, assess and enhance application development security, and verify secure connectivity for local, cloud-based, and hybrid network models.

    Progent's ISSAP-certified security consultants can assist your business with all aspects of secure network architecture. Learn the details about Progent's CISSP-ISSAP Information Systems Security Architecture Professional consulting services.

  • Information Systems Security Engineering Professionals (ISSEP) Consulting Services
    CISSP Certified Cybersecurity ConsultantsSecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide enterprises with the services associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, and senior security analyst. Progent can provide the expertise of a certified CISSP-ISSEP cybersecurity consultant to assist your enterprise to utilize modern system security engineering principles and techniques in system development, review and evaluate system security designs based on security engineering best practices, create cohesive system designs that incorporate compliant security features for all critical system functions, develop efficient design and configuration strategies to provide operational security, perform comprehensive risk analysis, and propose practical cybersecurity solutions that balance your operational goals with your organization's tolerance for risk.

    Progent's ISSEP-certified security engineering consultants can help your organization with any facet of assist your business with all aspects of cybersecurity design and deployment. Learn more about Progent's CISSP-ISSEP Information Systems Security Engineering Professional consulting services.

  • Global Information Assurance Certification (GIAC) Support Expertise
    GIAC Certified Information Assurance ConsultantsGlobal Information Assurance Certification was established in 1999 to certify the knowledge and experience of information technology security professionals. GIAC's mission is to verify that an accredited professional has the knowledge needed to provide services in key categories of system, data, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA).

    Progent offers the assistance of certified security engineers for any of the network security capabilities addressed within GIAC accreditation programs such as assessing perimeters, incident handling, traffic analysis, and web application security. Learn more about Progent's GIAC-certified Information Assurance consultants.

Important Security Notice:
A critical flaw has been identified in Log4j, a Java library for logging error messages in applications. This exploit is currently the most high-profile security vulnerability on the internet and has been assessed a severity score of 10 out of 10 by the cybersecurity industry's rating system, known as Common Vulnerability Scoring System (CVSS).

If you need assistance determining whether your network is impacted by this vulnerability or require help patching affected applications and devices, refer to Apache Log4j2 Vulnerability Mitigation.

Depend on Progent for Network Security Help
If you need computer security expertise, telephone Progent at 800-993-9400 or visit Contact Progent.



An index of content::

  • 24 Hour São José dos Campos Work at Home Employees IP Voice Systems Expertise Sao Jose dos Campos At Home Workers São José dos Campos Consulting Services - IP Voice Solutions Guidance
  • 24-Hour Exchange IT Consultants Winston-Salem Piedmont Triad 24-7 Remote Support Services Exchange Server 2019 Winston-Salem, NC
  • 24-Hour Offsite Workforce Guidance nearby Greensboro - Integration Consulting Services Greensboro Piedmont Triad 24x7 Work from Home Employees Consultants nearby Greensboro - Infrastructure Consulting and Support Services Greensboro, NC, United States
  • 24x7x365 SharePoint Server 2019 Remote Consulting Richmond Virginia Microsoft SharePoint 2013 On-site Technical Support Richmond, USA
  • Addison-Carrollton, TX Addison Ryuk Crypto-Ransomware Negotiation Consultants Addison Crypto-Ransomware Negotiation Services Addison-Farmers Branch, TX
  • Email Content Filtering Security Consultancy
  • Akron Remote Workers Video Conferencing Systems Consulting Services Award Winning Akron At Home Workforce Conferencing Systems Consultants Akron Canton
  • Alexandria Remote Workers Collaboration Systems Guidance Alexandria Virginia Immediate Work at Home Employees Guidance - Alexandria - Collaboration Systems Consulting Services Alexandria
  • At Home Workers Winston-Salem Guidance - Cybersecurity Systems Consultants Winston-Salem Piedmont Triad, United States Winston-Salem Remote Workforce Cybersecurity Solutions Consulting Experts Winston-Salem Piedmont Triad
  • At Home Workforce Consulting and Support Services near me in Petaluma - Backup Technology Consulting Services Petaluma California Work at Home Employees Assistance - Petaluma - Backup/Recovery Solutions Consulting and Support Services Petaluma Sonoma County
  • Augusta-Richmond County Ransomware Computer-Virus Readiness Checkup Richmond County Augusta, GA 24-7 Augusta-Richmond County Crypto-Ransomware Snatch Readiness Review
  • Baltimore Towson Dynamics GP-Great Plains Baltimore Vender - SQL Server Expert Microsoft Dynamics GP-Great Plains Vender in Baltimore - Customization Development Baltimore, MD

  • MSF Professional
    Design Consultant Stabilizing Phase: Design Tuning

    In performing IT projects for corporate clients, Progent follows a structured methodology driven by defined milestones so as to meet financial, scheduling and engineering targets while minimizing business disruption. Progent's Enterprise Services Methodology utilizes accepted project management procedures based on the best practices described by the Microsoft Solutions Framework Project methodology which includes requirements definition, architecture proposals, pilots, design tuning, and professional deployment. All phases are documented to make available a detailed description of IT services delivered and to help in downstream system maintenance.

  • Beverly Hills Remote Workers Backup Technology Consulting Beverly Hills-West Hollywood Beverly Hills Work at Home Employees Backup/Restore Solutions Consulting Beverly Hills-Westwood, CA
  • BlackBerry BES Server Integration Consulting Network Support Service BlackBerry Liverpool
  • BlackBerry BES Server Providers São José BlackBerry BPS Support Organization
  • Brisbane Dharma Ransomware Cleanup Brisbane Brisbane Hermes Ransomware Data-Recovery Brisbane

  • Award Winning Catalyst Wi-Fi 6 and Wi-Fi 6E AP Placement Consultants
    Catalyst Wi-Fi 6 AP Security Professionals

    Progent's Cisco-certified Catalyst Wi-Fi 6 and Wi-Fi 6E Access Point experts offer economical online and on-premises help for Catalyst Wi-Fi 6 and Wi-Fi 6E wireless access points.

  • Brisbane Spora Crypto-Ransomware Negotiation Support Brisbane Brisbane Snatch Ransomware Negotiation Guidance Brisbane
  • CISSP Security Group Auditing Security Arkansas - Little Rock, AR, Fort Smith, AR, Fayetteville, AR, Jonesboro, AR
  • Chesapeake, VA Temporary Network Support Staffing Support Services Consulting Expertise Supplemetary IT Staffing for Network Service Teams Chesapeake, South Hampton Roads
  • Cisco Tech Support Outsource Vitoria, Jardim Camburi Network Management Cisco Vitoria, ES
  • Cisco and Microsoft Certified Experts Pennsylvania Technical Support Group Small Business IT Outsourcing Services Pennsylvania

  • 24/7 Dynamics GP BizTalk Adapter Specialist
    Integration Microsoft Dynamics GP

    Progent's background delivering Microsoft .NET support and Microsoft SQL Server help, and Progent's programming experience with Microsoft VBasic, XML, and other developer platforms make it possible to create custom mission-critical applications and eCommerce solutions that integrate seamlessly with Microsoft Dynamics GP/Great Plains Software. Progent's Microsoft Dynamics GP management reporting services can help you design reports that let you track your business more thoroughly, turning raw data into useful understanding of your business.

  • Ciudad de Panamá Panama City Spora Ransomware Cleanup After Hours Panama City Maze Crypto-Ransomware System-Rebuild Panama City
  • Des Moines, Iowa Small Business Network Consulting Group Microsoft Certified Partner Des Moines IT Manager

  • Professionals Consulting for Service Providers
    IT Services for Network Service Firms IT Consultants

    Progent's Support for IT Service Providers lets you use Progent's information technology engineers under your own service brand as a seamless extension of your IT services team.

  • Detroit Michigan SQL Small Business Network Consulting Services SQL Small Business Computer Consulting Firms Detroit, MI, Grand Rapids, MI, Warren, MI, Lansing, MI
  • Durham, North Carolina Support Team Durham IT Solution Providers

  • Small Business WAP571 Onsite Technical Support
    Remote IT Consulting Small Business 500 AP

    Cisco's Small Business 100, 300 and 500 family of wireless access points are Linux-based units designed as entry-level wireless APs for light workloads. Progent's Cisco CCIE-certified wireless network consultants can provide remote or on-premises integration and debugging support to assist you to design, implement, update, optimize, manage and debug Cisco Small Business Wi-Fi access point deployments of any size or architecture.

  • Emergency Baton Rouge Ryuk CryptoLocker Assessment and Removal Port of Baton Rouge Baton Rouge Critical Ransomware Remediation Consultants Baton Rouge, Capital Park
  • Cybersecurity Organization Network Security
  • Emergency Midtown Manhattan Ransomware Remediation New York City-Hells Kitchen, NY Crypto Remediation Consultants
  • Emergency Work at Home Employees Consulting Services near Sacramento - Cloud Technology Consultants Sacramento Airport SMF Sacramento Work from Home Employees Cloud Integration Solutions Consultants Sacramento - Citrus Heights

  • Cisco Repairing
    Cisco Router Information Technology Outsourcing Firm

    Progent can provide rapid remote support from Cisco-certified CCIE networking experts. Progent's CCIE consultants can connect to your network via advanced remote support utilities to provide quick and economical analysis and remediation of urgent network issues.

  • Eugene Offsite Workforce Management Solutions Guidance Eugene Springfield Eugene Eugene Remote Workforce Endpoint Management Systems Consulting
  • Exchange 2003 Server IT Consulting Company Knoxville Tennessee, US Network Services Microsoft Exchange Server 2007 Knoxville, TN
  • Fair Oaks Network Repair Service Emergency Citrus Heights Outsourcing Technical Support
  • Fargo-Bismarck, North Dakota Offsite Workforce Assistance near Sarasota - Security Systems Consultants 24/7/365 Remote Workforce Sarasota Assistance - Security Solutions Consulting Experts Fargo-Grand Forks, North Dakota

  • Risk Mitigation Professional
    Risk Assessment Network Consulting

    Progent's disaster recovery support and business continuity engineers can help you design a disaster recovery strategy to prepare for an IT system disaster. Progent can help you create a complete disaster recovery plan that incorporates periodic disaster recovery assessments and testing. Progent's Microsoft and Cisco-authorized consultants can also help you create an affordable, high-availability system architecture that addresses availability issues involving a broad range of infrastructure technologies and procedures.

  • Firewall Audit Firewall Philadelphia, PA Technical Support Services CISSP Pennsylvania

  • Zero Downtime Data Center Specialist
    Internet Data Center Specialist

    Progent's Data Center engineers can show you how to select fault-tolerant data centers that meet the particular needs of your company. Fault tolerant Internet Data Centers are particularly attractive to small organizations due to of their affordability and simplified logistics compared to pursuing a do-it-yourself strategy. Trying to design an on-site data center with even a basic level of fault tolerance is too costly for typical small businesses. Progent can show you how to get all the advantages of non-stop data centers and fault tolerant colo sites by providing a complete range of consulting and support services.

  • Fort Collins Remote Workforce Cybersecurity Solutions Guidance Fort Collins Colorado Fort Collins Work from Home Employees Cybersecurity Solutions Consultants Fort Collins
  • Fremont Software Consulting Services Cisco Certified Experts Newark Small Office Computer Consulting

  • SQL Server 2022 Always Encrypted Technical Support Services
    SQL Server 2022 Analysis Services Configuration

    Progent's Microsoft-certified SQL Server 2022 consultants can help you to assess the advantages for upgrading to SQL Server 2022 and can provide rapid online or onsite access to experts in solution design and deployment, application development, database administration, and cybersecurity.

  • Garland Dharma Crypto-Ransomware Damage Assessment and Removal Garland, TX Garland Crypto Cleanup Garland Texas
  • Garland, TX Garland Egregor Ransomware Data-Recovery Garland Conti Ransomware Removal Garland, TX, America

  • Wi-Fi RF Coverage Maps Technology Consulting
    Wi-Fi RF Coverage Maps Online Support

    Progent's Wi-Fi site survey services make it easy to design, deploy and troubleshoot a Wi-Fi LAN adapted to your facilities, providing your business a wireless solution that has the coverage, speed, capacity, QoS, security, and hand-off ability your company needs. Wireless survey services from Progent include online predictive analysis for planning a wireless network and on-premises survey services for validating, optimizing, and debugging a functioning Wi-Fi LAN.

  • Huntington Beach California Huntington Beach Lockbit Crypto-Ransomware Forensics Investigation Huntington Beach Maze Ransomware Forensics Huntington Beach
  • Information Technology Consulting Group Microsoft SQL 2014 Bakersfield, Kern County Configuration Microsoft SQL Server Bakersfield, Kern County, USA

  • Exchange 2003 Server Upgrade
    Microsoft Exchange 2003 Technology Consulting Services

    Progent's expert support team can show you how to define and implement a smooth in-place Exchange Server 2003 migration strategy that minimizes network disruption, reduces ongoing service demands, and makes your Exchange 2003 Server easy to manage. For complex multiple server or multi-site upgrades, Progent has the background to complete your project rapidly and economically. Progent's Exchange 2003 help, troubleshooting, and consulting offerings include assistance with the configuration of third-party add-ons to Microsoft Exchange Server 2003 that are best aligned to your business goals.

  • Network Consultants Backup Exec
  • Lansing, Ingham County Network Support Technician Microsoft Computer Remote Help Desk Online Troubleshooting Lansing
  • Microsoft SharePoint Server 2013 Integration London Borough of Hammersmith and Fulham SharePoint 2013 Specialist London
  • Midland Ransomware Ryuk Readiness Report Midland Odessa Midland Crypto-Ransomware Review Midland County Texas

  • 24/7 Horizon3.ai NodeZero Certified PEN Testing Security Group
    Horizon3.ai NodeZero Certified Cybersecurity Penetration Testing Cybersecurity Consultancy

    Progent's certified cybersecurity consultants can run NodeZero-powered penetration tests to verify your security monitoring and protection tools and policies are correctly configured and effective.

  • Mission Viejo Remote Workers Cloud Integration Technology Consulting and Support Services Mission Viejo-San Clemente Mission Viejo At Home Workers Cloud Systems Assistance Mission Viejo

  • Catalyst Wi-Fi 6 AP Management IT Consultant
    Catalyst AP Management Specialists

    Progent's Cisco-certified Catalyst 802.11ax Access Point consultants offer economical remote and onsite help for Catalyst Wi-Fi 6 wireless APs.

  • Network Consulting Company Baton Rouge, Louisiana East Baton Rouge Parish Software Outsourcing Consultant
  • New Orleans Hermes Ransomware Negotiation Experts New Orleans New Orleans Crypto-Ransomware Settlement Negotiation Services New Orleans, LA
  • New Orleans, LA Remote Workers New Orleans Guidance - Security Solutions Consulting and Support Services At Home Workers Assistance nearby New Orleans - Security Systems Consultants New Orleans, LA
  • Offsite Workforce San Diego UCSD Consultants - Integration Consulting San Diego CA, USA 24x7 Remote Workers San Diego UCSD Consulting - Integration Assistance San Diego-UCSD, CA
  • Oxford, South East England Windows Server 2016 Information Technology Consulting Firms Oxford Microsoft Windows Server 2019 Computer Service
  • PC Consulting Microsoft Exchange 2016 New England Network Support Company Exchange 2016 Boston, Suffolk County

  • CrashPlan Backup Consultant Services
    Professional Mozy

    Progent offers economical remote access to engineers with expertise in a wide range of utilities and technologies that deliver solutions for protecting Windows, Mac, and Linux servers and desktops plus notebooks and smartphones. Progent can provide consulting support for all major data protection products such as Acronis, Barracuda Backup, Altaro VM Backup, Backup Exec, BackupAssist, CrashPlan, Double-Take Software, MozyPro, Retrospect for Macintosh, Apple Time Machine, VMware Data Recovery (VDR), and Solaris FLARs. Progent can help you to install, upgrade, or maintain backup solutions for a variety of environments including on-premises, remote, cloud-based, or hybrid.

  • Plano Ransomware Incident Reporting Plano - Addison Plano Locky Crypto-Ransomware Forensics Investigation
  • Position Microsoft Support Microsoft MCTS Support Job Melbourne
  • Ransomware Data Restore Ryuk Ransomware Hot Line Research Triangle North Carolina, US
  • Ransomware Removal and Data Recovery Salinas MongoLock Ransomware Hot Line Salinas Monterey County
  • Remote Cisco Firepower 2100 Series Firewalls Network Consultant On-site Technical Support ASA Firewalls with Firepower
  • SQL Server 2012 Network Setup SQL Server 2012 Computer Network Support Companies Cincinnati Milford, United States
  • Salem Spora Ransomware Mitigation Salem Nephilim Crypto-Ransomware Rollback Salem, OR

  • Exchange Server 2016 Migration Remote Consulting
    Computer Consulting Microsoft Exchange Server 2016 Upgrade

    Progent can help you in all phases of your migration to Microsoft Exchange Server 2016 such as designing high availability system topology for an on-premises, Microsoft cloud connected or hybrid deployment; licensing requirements for Exchange Server and Windows Server 2012 R2+; migrating mailboxes; Hyper-V virtualization strategy; determining storage requirements for your virtual machines (VMs), mailbox databases and logs; configuring hardware load balancing for fault-tolerant client access services; designing, configuring and validating Exchange and Windows Servers and Database Availability Groups (DAGs); setting up collaboration with SharePoint Server or SharePoint Online; preparing the firewall; resolving SSL issues; performing client integration with Office desktop or Microsoft 365; and setting up Outlook on the web.

  • Consultant Cisco PIX
  • Security Information Technology Consulting Fort Myers Firewall Protection Fort Myers Florida
  • Security Management Practices Cybersecurity Firms
  • Security Network Security Auditing Springfield Massachusetts, United States Consulting Services Security Springfield Massachusetts
  • Security Technical Support Newark, Essex County Firewall Security Consultant Newark, Essex County
  • SharePoint 2013 Online Technical Support Southern California San Diego, America Integration Services Microsoft SharePoint Southern California San Diego
  • SharePoint Server 2019 Specialists Omaha Council Bluffs, US Microsoft SharePoint Server 2007 Support and Setup Omaha
  • Solano County, America MCSE MCSA MCDBA MCIPT MCA Consultant Remote Support Job Vacaville Microsoft Consulting Openings

  • SharePoint 2019 PowerShell IT Services
    SharePoint 2019 OneDrive Sync Client Network Consultants

    Progent's Microsoft-certified SharePoint Server 2019 and SharePoint Online experts can provide affordable online and on-premises consulting expertise, software development, and troubleshooting services for businesses of all sizes who want to upgrade to SharePoint Server 2019 or SharePoint Online from older versions of SharePoint. Progent can assist customers plan and execute a cost-effective migration to SharePoint 2019 on prem, SharePoint Online, or a hybrid environment that combines local and cloud-based components into a seamless intranet system.

  • Symantec Raptor Cybersecurity Contractors Symantec VPN Security Consulting
  • Technical Support Exchange 2019 Lower Manhattan Exchange 2003 Server Small Business Network Consultant NYC-Tribeca, New York
  • Network Intrusion Penetration Testing Ingate
  • Teleworkers San Antonio Guidance - Collaboration Technology Assistance Bexar County Texas At Home Workers Expertise nearby San Antonio - Collaboration Technology Consulting Experts San Antonio Airport SAT
  • Urgent Microsoft Teams compliance Consultants Specialists Microsoft Teams and iPad
  • Vacaville California, America Teleworkers Vacaville Consulting and Support Services - Help Desk Outsourcing Consulting Vacaville Work at Home Employees Call Desk Augmentation Consulting Services Vacaville Solano County
  • Valencia Crypto-Ransomware Hermes Preparedness Consultation Valencia, California Valencia Ransomware Computer-Virus Susceptibility Assessment Valencia-Sylmar, California, USA
  • Windows Hyper-V 2016 Hybrid Cloud On-site Support Windows Hyper-V 2016 Private Cloud Network Consulting
  • Work at Home Employees Consultants nearby Fremont - Management Systems Consulting Experts Fremont, CA Work from Home Employees Consulting near Fremont - Management Tools Consulting
  • Work from Home Employees Eugene Consulting Services - Collaboration Technology Consulting Services Eugene, Lane County Best Offsite Workforce Consulting and Support Services nearby Eugene - Collaboration Technology Assistance Eugene, OR, United States

  • © 2002-2025 Progent Corporation. All rights reserved.