For immediate remote assistance with network security problems, companies in Chicago, IL, can find world-class troubleshooting from Progent's certified security professionals. Progent's remote service consultants are available to provide effective and economical assistance with security emergencies that are impacting the productivity of your IT network. Progent's accredited security engineers are qualified to support systems powered by Microsoft Windows, Linux, Macintosh, Sun, and popular versions of UNIX. Progent's broad range of services encompasses firewall expertise, email security, secure network design, and disaster recovery planning. Progent's support staff has been awarded the industry's top security certifications including GIAC (Global Information Assurance Certification) and CISSP.

Progent offers online security expertise on a per-minute model with no minimum times and without additional fees for sign-up or off-hour service. By billing per minute and by providing top-level support, Progent's pricing policy keeps costs under control and eliminates scenarios where quick solutions entail big bills.

Our Network Has Been Hacked: What Are We Supposed to Do?
In case you are currently experiencing a network security emergency, refer to Progent's Emergency Remote Network Help to learn how to get immediate help.

For organizations who have prepared beforehand for a security breech, the formal post-attack response model outlined by Global Information Assurance Certification is Progent's approved method of handling a serious security incident.

Overview of Security Support Services
Coordinating computer protection plus planning for recovering critical information and systems following an attack demands an on-going effort involving an array of technologies and procedures. Progent's security engineers can support your business at all levels in your attempt to safeguard your IT system, from security audits to creating a comprehensive security program. Key areas covered by Progent's experts include Planning and Implementation, Information Recovery and Security Failure Analysis, and Outsourced Filtering of E-mail-Based Spam and Viruses.

Designing and Implementing Protected Networks
Any organization should develop a carefully thought out security plan that incorporates both proactive and responsive elements. The pre-attack strategy is a set of steps that works to minimize security gaps. The reactive strategy defines activities to assist IT personnel to assess the losses caused by an attack, remediate the damage, document the event, and restore network activity as quickly as possible. Progent can show you how to build protection into your business operations. Progent can set up scanning utilities, create and build a secure network architecture, and propose procedures and policies to maximize the protection of your computing environment. Progent's security experts are available to help you to set up a firewall, deploy secure remote connectivity to email and information, and configure an efficient virtual private network.

If you are looking for an economical option for outsourcing your network security management, Progent's Round-the-clock Network Support Services feature non-stop online system tracking and quick response to emergencies.

Hybrid Cloud Solutions
Progent can help your IT team you to design, implement, administer and repair enterprise hybrid cloud solutions that incorporate local and cloud infrastructure and that are compliant with government security standards. (Find out about Progent's Office 365 integration with on-premises installations of Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

Data Recovery and Security Forensics
Progent provides skill in restoring systems and devices that have been hacked, are quarantined, or have stopped working as a result of a security attack. Progent can show you how to assess the losses caused by the breach, restore normal functions, and retrieve information compromised as a result of the attack. Progent's certified specialists can also perform a comprehensive forensic analysis by going over activity logs and utilizing a variety of proven forensics techniques. Progent's experience with security issues minimizes your downtime and allows Progent to recommend efficient strategies to prevent or contain new attacks.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top data security companies to provide web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior analysis technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching AV tools. ProSight ASM protects on-premises and cloud resources and offers a unified platform to manage the complete malware attack lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and allows rapid recovery of critical files, apps and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard data about your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can eliminate up to half of time spent looking for vital information about your network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether you’re planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.

Special Security Services Offered by Progent
Progent's security engineers offer unique specialized help in key areas of network protection such as:

Information Risk Evaluation and Compliance Assessment
Progent provides expertise with security evaluation tools such as Microsoft Baseline Security Analyzer and LANguard for performing a set of comprehensive system tests to identify possible security holes. Progent has broad skills with testing utilities and can help you to understand assessment results and react efficiently. Progent's certified security consultants also provide web application validation and can perform thorough evaluation of enterprise-wide security to determine your organization's compliance with key global security specifications such as FISMA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless security including in-place wireless appliances plus portable devices. Learn additional details concerning Progent's Information Risk Audits and Compliance Assessment.

Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Support
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver in-depth technical expertise for Cisco's complete range of protection and VPN technologies such as PIX Series Firewalls and ASA 5500 Firewalls, Catalyst Firewall Services Module (FWSM), protected broadband and integrated services (IS) routers, Aironet wireless access points, Cisco Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Learn additional details concerning Cisco Protection, VPN and Aironet Wireless Support.

Other Firewall and VPN Solutions
In addition to supporting a wide array of security solutions available from Microsoft and Cisco, Progent offers organizations of any size advanced consulting for security products from other important firewall and VPN vendors. Progent's engineers can provide:

Unannounced Penetration Testing Services
Unannounced intrusion testing is a vital method for helping organizations to find out how vulnerable their IT systems are to potential threats by testing how thoroughly corporate security processes and mechanisms hold up to planned but unpublicized intrusion attempts instigated by veteran security specialists utilizing the latest hacking methods. Find out more details about Progent's Penetration Testing Services.

Certified Information Security Manager (CISM) Security Support Expertise
CISM Engineers for Chicago, IllinoisCertified Information Security Manager defines the basic competencies and worldwide standards of performance that information security managers are required to master. It provides business management the confidence that those who have been awarded their certification have the experience and skill to offer effective security administration and engineering support. Progent can provide a CISM-certified expert to help your organization in key security areas including data security governance, vulnerability management, data protection process management, and incident response management.

Find out the details concerning Progent's Certified Information Security Manager Security Support Services.

CISSP Security Consulting Services
CISSP Certified Network Security Engineers for Chicago, IllinoisProgent's CISSP experts are security specialists who have been awarded CISSP status through demonstrated professional work, rigorous study, and formal testing. CISSP Certification indicates expertise in a worldwide standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of expertise covered under CISSP include security administration procedures, security architecture and models, access control methodology, applications development security, business processes security, hardware security, encryption, telecommunications, network security, and business continuity planning.

Read the details concerning Progent's CISSP Consulting Expertise.

ISSAP-Qualified Consultants for Secure Network Architecture
ISSAP ISSAP Security Engineers for Chicago, IllinoisProgent's ISSAP qualified security experts are experts who have been awarded ISSAP accreditation following rigorous examination and significant hands-on work with network security design. ISSAP security experts have comprehensive understanding of access control mechanisms and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security.

Get the details about Progent's ISSAP Certified Protected System Infrastructure Consulting Services.

Certified Information Systems Auditor Professional Expertise
CISA Engineers for Chicago, IllinoisThe Certified Information Systems Auditor credential is an important qualification that represents mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants pass an exhaustive test administered by the ISACA professional association. Progent can provide the services of a CISA-certified security engineer able to assist companies in the areas of IS audit process, information technology governance, network assets and infrastructure planned useful life, information technology service delivery, protecting data assets, and business continuity preparedness.

Read more details concerning Progent's Certified Information Systems Auditor (CISA) Professional Services.

CRISC-certified Network Risk Mitigation Specialists
CRISC IT Risk Experts for Chicago, IllinoisThe CRISC certification program was initiated by ISACA to validate an IT professional's ability to design, implement, and maintain IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's network risk mitigation services are complementary to the support available from Progent's CISA-qualified consultants for objectively assessing your IT management design and with the expertise of Progent's CISM-certified experts for designing security policies and procedures.

Read additional information about Progent's CRISC Network Risk Management Services.

Global Information Assurance Certification Support Expertise
Security Experts with Global Information Assurance Certification for Chicago, IllinoisGIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security professionals. GIAC's goal is to verify that an accredited professional has the skills necessary to provide services in key areas of network, information, and software security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. NSA. Progent can provide the assistance of certified professionals for any of the security disciplines covered within GIAC certification topics including assessing security systems, incident handling, traffic analysis, web application security, and security information and event management (SIEM) solutions.

Find out more details concerning Progent's GIAC Information Assurance Expertise.

Contact Progent for Computer Security Help
If your company is located in Chicago or elsewhere in Illinois and you need network security support services, phone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.