For immediate online help with network security problems, companies in Baltimore, MD, have access to expert expertise from Progent's certified security professionals. Progent's remote support staff is ready to offer effective and low-cost assistance with security emergencies that are impacting the viability of your information system. Progent's accredited engineers are certified to provide help for environments based on Windows, Linux, Macintosh, Sun Solaris, and major derivatives of UNIX. Progent's wide array of consulting services addresses firewall configuration, email filtering and encryption, secure system infrastructure, and business continuity preparedness. Progent's technical support team has been awarded the industry's most advanced security certifications including Global Information Assurance Certification and Information System Security Architecture Professional (ISSAP).

Progent provides online security assistance on a by-the-minute model without minimum times and no additional charges for sign-up or after hours service. By billing by the minute and by providing top-level help, Progent's pricing model keeps costs under control and eliminates situations where quick fixes result in major bills.

Our System Has Been Attacked: What Are We Supposed to Do?
In case your network is now faced with a network security crisis, go to Progent's Emergency Remote Computer Help to find out how to get fast aid.

For organizations who have planned beforehand for being hacked, the formal post-attack handling model outlined by GIAC is Progent's recommended method of reacting to a serious security incident.

Introduction to Progent's Security Expertise
Coordinating network security plus preparedness for restoring vital data and functions after a security breach requires an on-going process that entails an array of technologies and procedures. Progent's security consultants can help your business at whatever level in your attempt to protect your IT network, ranging from security audits to creating a complete security program. Key areas covered by Progent's experts include Security Planning and Implementation, Information Restoration and Security Forensics, and Managed Protection from Email-Based Spam and Viruses.

Designing and Building Protected Networks
Any business ought to have a thoroughly thought out security strategy that includes both proactive and responsive steps. The pre-attack plan is a set of steps that helps to minimize security gaps. The post-attack strategy specifies procedures to help security personnel to assess the damage caused by a breach, repair the damage, document the event, and revive network functions as quickly as possible. Progent can advise you how to build protection into your business operations. Progent can install scanning utilities, define and build a secure IT infrastructure, and propose procedures and policies to maximize the protection of your computing environment. Progent's security professionals are available to assist you to configure a firewall, deploy secure remote connectivity to e-mail and data, and configure an effective VPN.

If you are interested in an economical option for outsourcing your security management, Progent's 24x7 Network Support Options feature automated online system tracking and immediate resolution of emergencies.

Hybrid Cloud Solutions
Progent can assist your company you to design, implement, administer and troubleshoot enterprise hybrid cloud solutions that include physical and cloud-based infrastructure and that are compliant with regulatory security standards. (Find out about Progent's Office 365 Exchange Online integration with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

System Recovery and Security Forensics
Progent provides expertise in recovering systems and computers that have been hacked, are suspect, or have stopped working because of a security breakdown. Progent can show you how to evaluate the damage caused by the breach, return your company to ordinary functions, and recover data lost owing to the breach. Progent's certified engineers can also manage a comprehensive forensic analysis by going over activity logs and using a variety of proven assessment tools. Progent's experience with security issues reduces your downtime and allows Progent to recommend effective measures to prevent or contain new assaults.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a collection of low-cost, fixed-price monthly managed services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security companies to provide centralized management and world-class protection for all your email traffic. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further level of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning technology to guard endpoint devices and servers and VMs against modern malware assaults like ransomware and file-less exploits, which routinely get by legacy signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to manage the entire threat lifecycle including protection, detection, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, applications and virtual machines that have become unavailable or corrupted due to component failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can help you to restore your critical information. Learn more about ProSight DPS Managed Backup.

Specialized Security Expertise Available from Progent
Progent's veteran consultants can provide world-class expertise in vital areas of network protection including:

Vulnerability Audits and Security Compliance Testing
Progent provides expertise with information risk evaluation software such as Microsoft Baseline Security Analyzer and LANguard for conducting a set of comprehensive system tests to identify potential security gaps. Progent has broad experience with these tools and can assist you to analyze audit reports and react appropriately. Progent's security consultants also can perform web software validation and can perform expert evaluation of corporate-wide security to determine your organization's compliance with key worldwide security standards including HIPAA, PCI, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless security including stationary wireless equipment plus portable devices. Learn additional information concerning Progent's Security Vulnerability Audits and Compliance Assessment.

Cisco Network Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Help
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can deliver in-depth consulting services for Cisco's entire range of security and VPN products including PIX Series Firewalls and ASA 5500 Series Firewalls, Catalyst FWSM, protected broadband and integrated services routers, Aironet wireless access points and bridges, Meraki cloud-managed Wi-Fi access points, and Catalyst switches. Find out the details about Cisco Security, VPN and Aironet Wireless Expertise.

Additional Firewall and VPN Technologies
As well as supporting a broad array of network security technologies available from Microsoft and Cisco, Progent offers companies of any size expert engineering services for security products from other important firewall and Virtual Private Network (VPN) suppliers. Progent's engineers can provide:

Unannounced Penetration Testing Services
Unannounced intrusion checking is a vital technique for allowing organizations to understand how vulnerable their information systems are to potential attacks by revealing how thoroughly corporate protection processes and technologies stand up to authorized but unannounced intrusion attempts launched by veteran security engineers utilizing the latest intrusion methods. Find out more information concerning Progent's Penetration Testing Services.

Certified Information Security Manager (CISM) Security Consulting Services
Certified Information Security Manager (CISM) Engineers for Baltimore, MarylandCertified Information Security Manager (CISM) defines the fundamental competencies and international benchmarks of performance that IT security professionals are expected to master. CISM offers executive management the assurance that those who have been awarded their certification possess the experience and knowledge to provide effective security management and consulting services. Progent can provide a CISM-certified support professional to assist your organization in vital security areas including information security governance, vulnerability assessment, data protection program control, and incident handling management.

Learn the details concerning Progent's Certified Information Security Manager Security Consulting Expertise.

Certified Information Systems Security Professionals (CISSP) Security Support Expertise
CISSP Certified Network Security Specialists for Baltimore, MarylandProgent's CISSP experts are security specialists who have been awarded CISSP certification as a result of verified professional work, rigorous study, and exhaustive testing. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of expertise included under CISSP include security administration procedures, security architecture and models, connection permission systems, applications development security, operations security, hardware security, encryption, communications, network security, and business continuity planning.

Read more details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

ISSAP-Qualified Consultants for Secure System Infrastructure
ISSAP Information Systems Security Architecture Professionals for Baltimore, MarylandProgent's ISSAP certified security experts are experts who have been awarded ISSAP certification as a result of thorough examination and substantial experience. field experience with information security architecture. ISSAP consultants have acquired in-depth knowledge of access control systems and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture.

Find out additional details concerning Progent's ISSAP Certified Secure Network Infrastructure Engineering Services.

Certified Information Systems Auditor (CISA) Support Services
CISA Consultants for Baltimore, MarylandThe Certified Information Systems Auditor (CISA) accreditation is an important achievement that indicates mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive test administered by the ISACA international professional group. Progent can provide the services of a CISA-certified security engineer trained to help companies in the areas of IS audit process, information technology enforcement, network assets and infrastructure planned useful life, information technology support, protecting information assets, and disaster recovery planning.

Find out more information concerning Progent's Certified Information Systems Auditor Professional Expertise.

CRISC Risk Management Experts
CRISC-certified Risk Consultants for Baltimore, MarylandThe Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate an IT professional's skills to design, implement, and maintain IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a business continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's risk management expertise is complementary to the support provided by Progent's CISA-qualified consultants for objectively assessing your IS control design and with the expertise of Progent's CISM experts for designing company-wide security policies and procedures.

Read additional information about Progent's CRISC Network Risk Mitigation Support.

GIAC (Global Information Assurance Certification) Support Expertise
Security Engineers with GIAC Certification for Baltimore, MarylandGlobal Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's mission is to make sure that an accredited security consultant possesses the skills necessary to deliver support in key areas of network, information, and application program security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent offers the help of certified security engineers for any of the security disciplines covered under GIAC certification programs including auditing networks, security incident response, intrusion detection, web-based application security, and SIEM solutions.

Find out additional details about Progent's GIAC Information Assurance Support.

Get in Touch with Progent for Computer Security Expertise
If your business is situated in Baltimore or anywhere in the state of Maryland and you want security help, call Progent at 800-993-9400 or refer to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.