To get fast online help with computer security problems, businesses in Baltimore, MD, can find expert support by contacting Progent's certified security professionals. Progent's online service consultants are ready to offer fast and affordable assistance with security crises that threaten the productivity of your IT network. Progent's security consultants are qualified to provide help for environments based on Microsoft Windows, Linux, Mac OS X, Solaris, and major derivatives of UNIX. Progent's broad range of services encompasses firewall configuration, email security, secure system infrastructure, and disaster recovery planning. Progent's support staff has been awarded the industry's top security credentials including Global Information Assurance Certification and ISSAP.
Progent provides online security help on a by-the-minute basis without minimum call duration and without additional fees for sign-up or after hours service. By billing by the minute and by providing top-level help, Progent's billing structure keeps costs under control and avoids scenarios where quick solutions entail big charges.
Our System Has Been Attacked: What Are We Supposed to Do?
In case you are currently experiencing a network security emergency, visit Progent's Emergency Online Computer Help to learn how to get immediate assistance.
For organizations who have planned in advance for an attack, the step-by-step incident response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's approved method of handling a serious security attack.
Overview of Security Services
Managing computer security as well as preparation for recovering vital information and functions following a security breach requires a continual program that entails a variety of tools and processes. Progent's security consultants can help your business at all levels in your efforts to safeguard your information network, from security assessments to designing a comprehensive security plan. Some areas covered by Progent's security engineers include Security Planning and Prevention, Data Restoration and Security Failure Analysis, and Managed Filtering of E-mail-Based Spam and Viruses.
Designing and Building Protected Environments
Every company ought to have a carefully thought out security plan that includes both proactive and responsive activity. The proactive strategy is a set of precautions that works to reduce security gaps. The reactive strategy defines activities to assist IT staff to assess the losses resulting from an attack, repair the damage, document the experience, and restore network activity as soon as possible. Progent can advise you how to build security into your business processes. Progent can set up auditing utilities, create and execute a safe computer architecture, and propose processes and policies that will maximize the protection of your information system. Progent's security experts are ready to assist you to set up a firewall, deploy protected online and mobile access to email and data, and configure an effective VPN.
If you are looking for an economical way for outsourcing your network security administration, Progent's Round-the-clock Monitoring Options feature continual online system tracking and fast resolution of problems.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, administer and repair enterprise hybrid cloud solutions that combine physical and cloud hosted resources and that are compliant with regulatory security standards. (Learn about Progent's Office 365 integration with on-premises installations of Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
System Restoration and Security Forensics
Progent provides expertise in recovering networks and computers that have been hacked, are in question, or have ceased to function as a result of a security breakdown. Progent can show you how to assess the losses caused by the assault, restore ordinary functions, and recover data lost as a result of the attack. Progent's security specialists can also manage a thorough forensic analysis by going over event logs and utilizing other proven forensics techniques. Progent's experience with security problems reduces your downtime and permits Progent to suggest effective strategies to prevent or mitigate future attacks.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security companies to provide web-based control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior analysis technology to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching AV products. ProSight ASM safeguards local and cloud resources and offers a single platform to address the entire malware attack progression including protection, identification, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of vital files, apps and virtual machines that have become unavailable or corrupted due to hardware failures, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can help you to recover your critical information. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard data about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as half of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you’re planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Special Security Services Available from Progent
Progent's security engineers can provide unique expertise in vital facets of network protection including:
Security Vulnerability Evaluation and Compliance Testing
Progent provides expertise with security evaluation tools such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of automatic system tests to uncover possible security holes. Progent has extensive skills with these and similar utilities and can assist you to analyze audit reports and react efficiently. Progent's certified security engineers also provide web software testing and can conduct thorough assessments of corporate-wide security to assess your company's compliance with important worldwide security standards such as FISMA, NIST, and ISO. Also, Progent can evaluate the strength of your wireless security including stationary wireless equipment as well as portable handsets. Read additional details about Progent's Information Risk Evaluation and Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wireless Help
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals (CCNPs) can provide in-depth consulting expertise for Cisco's complete family of protection and Virtual Private Network (VPN) solutions such as PIX 500 Firewalls and ASA Series Firewalls, Catalyst Firewall Services Module (FWSM), protected high-speed and IS routers, Aironet wireless access points, Cisco Meraki cloud-managed APs, and Catalyst family switches. Get additional details about Cisco Security, Virtual Private Network and Aironet Wireless Support.
Other Firewall and VPN Technologies
Unannounced Penetration Checking Consulting
In addition to supporting a broad array of security solutions from Microsoft and Cisco, Progent offers organizations of all sizes expert consulting for security products from other major firewall and Virtual Private Network (VPN) suppliers. Progent's engineers can provide:
Stealth intrusion checking is a key technique for helping companies to find out how vulnerable their information systems are to serious attacks by testing how well corporate protection procedures and technologies stand up against planned but unpublicized penetration efforts launched by seasoned security engineers utilizing advanced hacking techniques. Find out additional information concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager defines the fundamental skills and international standards of service that information security managers are expected to achieve. It provides business management the assurance that those who have been awarded their certification possess the experience and skill to offer effective security management and consulting services. Progent can provide a CISM-certified consultant to assist your enterprise in key security disciplines such as information protection governance, risk assessment, data security process control, and incident response management.
Find out the details concerning Progent's CISM Security Support Expertise.
Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification as a result of verified experience, rigorous study, and formal examination. CISSP Certification indicates mastery of a worldwide standard for information security. American National Standards Institute has granted the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of expertise included under CISSP include security management procedures, security design and test systems, connection control methodology, software development security, business processes security, hardware security, encryption, telecommunications, network security, and business continuity planning.
Find out more details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
ISSAP-Qualified Consultants for Secure System Architecture
Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP status after thorough examination and extensive experience. field experience with information security design. ISSAP consultants possess comprehensive knowledge of access control systems and techniques, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security specialists can assist your company with all aspects of architecture security.
Find out more details about Progent's ISSAP Accredited Protected IT Infrastructure Engineering Support.
Certified Information Systems Auditor Consulting Services
The Certified Information Systems Auditor accreditation is a recognized qualification that signifies mastery in IS security auditing. Accredited by ANSI, the CISA credential requires that candidates undergo an extensive test administered by the ISACA professional group. Progent offers the services of a CISA-certified security professional trained to assist businesses in the areas of IS audit services, IT administration, network assets and infrastructure lifecycle, IT service delivery, safeguarding data resources, and business continuity preparedness.
Find out more details about Progent's Certified Information Systems Auditor (CISA) Professional Expertise.
CRISC-certified Network Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and carry out a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's risk management expertise is complementary to the services available from Progent's CISA-certified consultants for objectively evaluating your IS management design and with the expertise of Progent's CISM-certified support professionals for designing security policies.
Learn additional information about Progent's CRISC IT Risk Mitigation Support.
GIAC Support Services
Global Information Assurance Certification was founded in 1999 to certify the knowledge of network security experts. GIAC's mission is to make sure that a certified professional possesses the knowledge needed to provide support in critical areas of system, data, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent offers the expertise of GIAC certified security engineers for any of the security capabilities addressed within GIAC certification programs such as assessing networks, incident handling, intrusion detection, web-based services security, and security information and event management (SIEM) solutions.
Read more information about Progent's GIAC Information Assurance Expertise.
Depend on Progent for Network Security Support
If your company is located in Baltimore or elsewhere in the state of Maryland and you want computer security consulting expertise, call Progent at 800-993-9400 or see Contact Progent.