To get fast online help with computer security issues, companies in Chicago, IL, can find world-class troubleshooting by contacting Progent's security engineers. Progent's remote service staff is available to provide effective and economical help with security problems that threaten the productivity of your information system. Progent's accredited security engineers are certified to support systems based on Windows, Linux, Apple macOS and OS X, Sun, and major versions of UNIX. Progent's wide array of services covers firewall technology, email filtering and encryption, protected network architecture, and business continuity preparedness. Progent's technical support team has earned the world's top security credentials including GIAC and CISSP.

Progent offers online security help on a per-minute model with no minimum call duration and no extra charges for sign-up or off-hour service. By charging by the minute and by delivering top-level expertise, Progent's pricing model keeps costs under control and avoids situations where quick solutions result in major expenses.

We've Been Hacked: What Should We Do?
If you are currently fighting a security emergency, go to Progent's Emergency Online Network Help to learn how to get fast aid.

For businesses that have planned carefully for an attack, the formal incident handling procedure promoted by Global Information Assurance Certification is Progent's approved method of handling a major security attack.

Introduction to Security Services
Managing computer security as well as preparation for restoring vital data and systems after a security breach requires an on-going program involving a variety of tools and procedures. Progent's certified professionals can help your organization at any level in your attempt to guard your information network, ranging from security assessments to creating a complete security plan. Important areas supported by Progent's security consultants include Security Planning and Prevention, Information Recovery and Security Failure Analysis, and Outsourced Filtering of E-mail-Borne Attacks.

Planning and Implementing Protected Environments
Every company ought to have a thoroughly considered security strategy that incorporates both preventive and reactive activity. The pre-attack strategy is a collection of precautions that works to reduce security gaps. The post-attack plan specifies activities to assist security staff to inventory the losses resulting from an attack, remediate the damage, record the event, and restore business functions as quickly as feasible. Progent can show you how to incorporate security into your business operations. Progent can set up auditing utilities, define and execute a secure IT infrastructure, and recommend procedures and policies that will enhance the safety of your information system. Progent's security experts are ready to assist you to set up a firewall, deploy safe online and mobile connectivity to e-mail and information, and install an efficient virtual private network (VPN).

If your company is interested in an affordable option for outsourcing your network security management, Progent's Round-the-clock Monitoring Options feature continual remote system tracking and immediate resolution of emergencies.

Hybrid Cloud Solutions
Progent can assist your company you to plan, deploy, administer and troubleshoot enterprise hybrid cloud solutions that incorporate physical and cloud resources and that comply with government data security standards. (Find out about Progent's Office 365 integration solutions with on-premises Exchange deployments, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

System Recovery and Failure Analysis
Progent offers skill in recovering networks and devices that have been hacked, are in question, or have ceased to function as a result of a security breakdown. Progent can help evaluate the damage resulting from the attack, return your company to ordinary functions, and recover information compromised owing to the attack. Progent's certified engineers can also oversee a thorough failure analysis by examining event logs and using other proven forensics tools. Progent's experience with security problems minimizes your off-air time and allows Progent to propose efficient ways to avoid or contain future attacks.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes next generation behavior analysis technology to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily escape legacy signature-based AV products. ProSight ASM protects local and cloud resources and provides a unified platform to address the complete malware attack lifecycle including blocking, detection, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering via leading-edge tools packaged within a single agent managed from a unified control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP deployment that meets your company's specific needs and that helps you prove compliance with government and industry data protection regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for urgent action. Progent's consultants can also help your company to install and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows fast restoration of vital files, applications and virtual machines that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading information security vendors to provide centralized management and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hardware environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you’re planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more details about ProSight IT Asset Management service.

Specialized Security Expertise Available from Progent
Progent's certified security engineers can provide world-class support in key facets of computer security including:

Security Vulnerability Audits and Security Compliance Testing
Progent provides expertise with information risk auditing software like Microsoft Baseline Security Analyzer or LANguard for performing a variety of comprehensive network scans to reveal possible security gaps. Progent has broad experience with these tools and can assist you to understand assessment results and respond efficiently. Progent's certified security consultants also can perform web software validation and can perform expert assessments of enterprise-wide security to assess your organization's compliance with important industry security standards including HIPAA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless appliances as well as portable devices. Find out more details about Progent's Security Vulnerability Evaluation and Security Compliance Assessment.

Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wi-Fi Consulting
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals (CCNPs) can deliver in-depth consulting services for Cisco's complete range of protection and VPN products such as PIX 500 Firewalls and ASA 5500 Series Firewalls, the Catalyst Firewall Services Module (FWSM), protected broadband and integrated services (IS) routers, Aironet wireless access points and bridges, Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Get more information concerning Cisco Security, VPN and Wireless Support.

Other Firewall and VPN Solutions
As well as being expert in a broad array of network security technologies available from Microsoft and Cisco, Progent can provide businesses of any size advanced engineering services for security products from other important firewall and Virtual Private Network suppliers. Progent's consultants offer:

Unannounced Penetration Testing Services
Stealth penetration testing is a valuable method for allowing businesses to determine how exposed their IT environments are to serious threats by showing how well corporate security policies and mechanisms hold up against planned but unannounced intrusion attempts launched by veteran security specialists utilizing advanced intrusion methods. Learn more details concerning Progent's Penetration Testing Services.

Certified Information Security Manager (CISM) Security Support Expertise
Certified Information Security Manager Engineers for Chicago, IllinoisCertified Information Security Manager (CISM) defines the fundamental skills and international standards of performance that information technology security managers are expected to achieve. CISM provides executive management the confidence that consultants who have been awarded their CISM have the experience and knowledge to offer effective security management and engineering services. Progent can offer a CISM expert to help your organization in vital security areas such as data protection governance, risk assessment, information security process management, and crisis response support.

Learn the details about Progent's CISM Security Support Expertise.

CISSP Security Support Services
CISSP Qualified System Security Specialists for Chicago, IllinoisProgent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP status as a result of demonstrated professional work, rigorous study, and formal examination. CISSP qualification recognizes mastery of an international standard for information security. ANSI has granted the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management practices, security architecture and models, access control systems, applications development security, business processes security, hardware security, encryption, telecommunications, network security, and business continuity planning.

Find out additional details about Progent's CISSP Support Expertise.

ISSAP-Certified Engineers for Secure System Architecture
ISSAP ISSAP Security Engineers for Chicago, IllinoisProgent's ISSAP qualified security experts are consultants who have been awarded ISSAP status after thorough testing and extensive experience. field experience with information security architecture. ISSAP security experts have acquired comprehensive knowledge of access management systems and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security experts can assist your business with all phases of secure network architecture.

Find out more details about Progent's ISSAP Certified Protected IT Infrastructure Consulting Support.

Certified Information Systems Auditor (CISA) Support Services
Certified Information Systems Auditor Consultants for Chicago, IllinoisThe Certified Information Systems Auditor accreditation is an important achievement that represents expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass a comprehensive test administered by the ISACA international professional group. Progent offers the services of a CISA-qualified security audit engineer trained to help businesses in the areas of IS audit services, information technology enforcement, systems and infrastructure lifecycle, IT support, safeguarding information assets, and disaster recovery preparedness.

Learn additional information concerning Progent's CISA Consulting Services.

CRISC IT Risk Management Specialists
CRISC-certified Risk Experts for Chicago, IllinoisThe Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's ability to design, deploy, and maintain IS controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk management expertise is a good fit the support available from Progent's CISA-certified security engineers for objectively evaluating your IS control mechanisms and also with the services of Progent's CISM consultants for implementing company-wide security policies and procedures.

Learn more details concerning Progent's CRISC Network Risk Management Support.

Global Information Assurance Certification Support Services
Network Security Experts with Global Information Assurance Certification for Chicago, IllinoisGIAC was established in 1999 to certify the knowledge of network security experts. GIAC's goal is to verify that a certified professional has the skills needed to provide services in key areas of system, information, and software security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent can provide the support of GIAC certified security engineers for any of the network security services covered within GIAC accreditation programs such as auditing perimeters, security incident response, intrusion detection, web services security, and security information and event management (SIEM) solutions.

Read more information about Progent's GIAC Information Assurance Expertise.

Depend on Progent for Network Security Expertise
If your organization is located in Chicago or elsewhere in Illinois and you're looking for security support services, telephone Progent at 800-993-9400 or visit Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.