For fast online help with data security issues, businesses in Boston, MA, have access to expert support by contacting Progent's security engineers. Progent's online service staff is available to offer fast and economical help with security problems that threaten the productivity of your network. Progent's security consultants are qualified to support environments based on Microsoft, Linux, Apple, Sun Solaris, and major versions of UNIX. Progent's wide array of services encompasses firewall configuration, email filtering and encryption, protected system architecture, and disaster recovery preparedness. Progent's technical support team has been awarded the industry's most advanced security certifications including CISM and Certified Information Systems Security Professional.

Progent offers remote security support services on a per-minute basis without minimum minutes and no additional charges for setup or after hours support. By billing per minute and by providing world-class support, Progent's billing model keeps expenses under control and avoids situations where simple fixes turn into major expenses.

Our System Has Been Attacked: What Are We Supposed to Do?
In case your network is currently fighting a security crisis, go to Progent's Emergency Online Technical Support to see how to get fast aid.

For organizations who have planned in advance for a security breech, the step-by-step incident response model outlined by Global Information Assurance Certification is Progent's approved method of reacting to a major security incident.

Overview of Progent's Security Services
Coordinating data protection as well as preparation for restoring critical data and functions following an attack demands an on-going program involving an array of tools and processes. Progent's certified consultants can assist your organization at all levels in your attempt to safeguard your information network, from security evaluation to creating a complete security program. Key areas supported by Progent's experts include Security Planning and Implementation, Data Recovery and Security Failure Analysis, and Outsourced Protection from E-mail-Borne Attacks.

Designing and Implementing Protected Networks
Any business ought to develop a carefully thought out security strategy that includes both proactive and reactive elements. The pre-attack strategy is a collection of steps that helps to minimize vulnerabilities. The reactive plan specifies procedures to help IT personnel to inventory the damage caused by a breach, repair the damage, document the event, and restore network activity as soon as feasible. Progent can advise you how to build protection into your business processes. Progent can set up auditing utilities, create and execute a secure computer architecture, and recommend procedures and policies that will maximize the safety of your network. Progent's security experts are ready to assist you to set up a firewall, design secure remote access to email and data, and install an effective virtual private network.

If your company is looking for an affordable way for jobbing out your network security administration, Progent's Round-the-clock Monitoring Packages include continual online server monitoring and fast response to emergencies.

Hybrid Cloud Solutions
Progent can assist your company you to design, deploy, manage and repair enterprise hybrid cloud solutions that combine physical and cloud hosted resources and that are compliant with government and industry security requirements. (Learn about Progent's Office 365 integration solutions with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

Data Restoration and Failure Analysis
Progent offers expertise in restoring systems and servers that have been compromised, are in question, or have ceased to function following a security attack. Progent can show you how to evaluate the damage resulting from the attack, restore normal business operations, and recover information lost as a result of the breach. Progent's security specialists can also perform a comprehensive failure evaluation by going over event logs and utilizing other proven assessment techniques. Progent's background with security consulting reduces your off-air time and allows Progent to propose efficient strategies to avoid or contain future attacks.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security companies to deliver web-based control and comprehensive security for your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely escape traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to address the complete malware attack progression including filtering, identification, containment, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of vital data, applications and virtual machines that have become lost or damaged due to component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and safeguard data related to your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates or domains. By updating and managing your IT documentation, you can eliminate as much as half of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a common location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether you’re planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more details about ProSight IT Asset Management service.

Special Security Expertise Available from Progent
Progent's seasoned engineers can provide unique support in key areas of network protection such as:

Security Vulnerability Audits and Compliance Testing
Progent provides experience with information risk auditing utilities like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a set of automatic system tests to reveal potential security problems. Progent has extensive skills with these utilities and can help you to analyze audit results and react appropriately. Progent's certified security consultants also offer web application testing and can conduct thorough evaluation of corporate-wide security to assess your company's compliance with major worldwide security specifications such as FISMA, PCI, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering stationary wireless equipment plus mobile handsets. Find out more details about Progent's Information Risk Audits and Compliance Testing.

Cisco Network Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Consulting
Progent's Cisco Certified Internetwork Experts and Cisco CCNP experts can deliver in-depth consulting services for Cisco's entire family of protection and Virtual Private Network (VPN) solutions such as PIX 500 Series Firewalls and ASA 5500 Series Firewalls, the Catalyst FWSM, secure high-speed and IS routers, Aironet wireless access points and bridges, Meraki cloud-managed access points, and Catalyst family switches. Learn more information concerning Cisco Security, Virtual Private Network and Wireless Support.

Other Firewall and Virtual Private Network (VPN) Solutions
As well as being expert in a broad array of protection technologies available from Microsoft and Cisco, Progent offers businesses of any size top-level engineering services for security products from other important firewall and Virtual Private Network (VPN) suppliers. Progent's engineers offer:

Unannounced Penetration Checking Services
Stealth intrusion checking is a valuable method for helping businesses to understand how exposed their IT systems are to serious threats by testing how thoroughly network protection procedures and technologies hold up against authorized but unpublicized intrusion attempts instigated by seasoned security engineers utilizing advanced intrusion techniques. Learn more details concerning Progent's Penetration Testing Services.

CISM Security Consulting Services
CISM Consultants for Boston, MassachusettsCertified Information Security Manager (CISM) identifies the fundamental competencies and worldwide standards of performance that information technology security professionals are required to achieve. It provides business management the confidence that consultants who have earned their CISM possess the background and skill to provide efficient security administration and engineering services. Progent can provide a CISM expert to assist your enterprise in key security disciplines such as information protection governance, risk assessment, data security process control, and incident handling support.

Find out additional information concerning Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

CISSP Security Support Services
CISSP Certified Network Security Engineers for Boston, MassachusettsProgent's CISSP consultants are security engineers who have been awarded CISSP accreditation through demonstrated experience, extensive study, and exhaustive testing. CISSP Certification indicates mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management practices, security architecture and test systems, connection permission methodology, software development security, operations security, hardware security, encryption, communications, network security, and business continuity planning.

Learn the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.

ISSAP-Certified Engineers for Secure Network Architecture
ISSAP Information Systems Security Architecture Professionals (ISSAP) for Boston, MassachusettsProgent's ISSAP qualified security experts are experts who have earned ISSAP accreditation as a result of rigorous testing and extensive hands-on work with information security architecture. ISSAP consultants have comprehensive knowledge of access control systems and methodologies, phone system and network infrastructure protection, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture.

Find out more information concerning Progent's ISSAP Certified Secure System Infrastructure Engineering Support.

CISA Professional Expertise
CISA Consultants for Boston, MassachusettsThe Certified Information Systems Auditor accreditation is an important qualification that represents mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive examination overseen by the ISACA international professional group. Progent can provide the services of a CISA-certified security professional trained to assist companies in the areas of information systems audit services, information technology governance, network assets and infrastructure planned useful life, IT support, safeguarding information resources, and disaster recovery planning.

Get additional information about Progent's CISA Professional Expertise.

CRISC Risk Management Consultants
CRISC IT Risk Consultants for Boston, MassachusettsThe CRISC program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's risk mitigation services are complementary to the support available from Progent's CISA-certified consultants for objectively evaluating your IT control design and with the expertise of Progent's CISM-certified experts for implementing security policies.

Get additional details about Progent's CRISC-certified IT Risk Management Services.

GIAC (Global Information Assurance Certification) Professional Expertise
Network Security Engineers with GIAC Certification for Boston, MassachusettsGIAC was founded in 1999 to certify the skill of network security professionals. GIAC's goal is to make sure that a certified professional has the knowledge appropriate to deliver support in critical categories of network, information, and program security. GIAC accreditations are recognized by companies and institutions around the world including and the United States National Security Agency (NSA). Progent offers the expertise of GIAC certified security engineers for all of the security disciplines addressed within GIAC certification programs including assessing perimeters, incident handling, traffic analysis, web-based application security, and SIEM solutions.

Learn more information concerning Progent's GIAC Information Assurance Support.

Contact Progent for Network Security Expertise
If your organization is located in Boston or elsewhere in the state of Massachusetts and you need network security expertise, call Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.