For immediate remote assistance with network security problems, businesses in Columbus, OH, have access to expert expertise from Progent's certified security engineers. Progent's online support staff is available to offer fast and economical help with security emergencies that are impacting the productivity of your network. Progent's security engineers are qualified to provide help for systems powered by Windows, Linux, Apple, Solaris, and popular versions of UNIX. Progent's broad selection of consulting services covers firewall expertise, email security, secure network architecture, and disaster recovery planning. Progent's technical support team has been awarded the industry's most advanced security accreditations including Certified Information Systems Auditor and CISSP.

Progent offers remote security expertise on a by-the-minute model with no minimum call duration and without extra fees for sign-up or off-hour service. By charging by the minute and by providing world-class support, Progent's pricing model keeps expenses low and eliminates scenarios where quick solutions result in major charges.

Our System Has Been Attacked: What Are We Supposed to Do Now?
If your network is now fighting a network security crisis, refer to Progent's Emergency Remote Network Help to see how to get immediate aid.

For businesses who have planned beforehand for an attack, the formal post-attack handling procedure outlined by GIAC (Global Information Assurance Certification) is Progent's approved method of responding to a serious security penetration.

Overview of Progent's Security Expertise
Coordinating data protection and preparation for recovering vital information and functions after a security breach demands an on-going process that entails an array of technologies and processes. Progent's certified security consultants can support your business at whatever level in your efforts to secure your information system, from security audits to creating a comprehensive security plan. Key technologies supported by Progent's experts include Security Planning and Implementation, Data Restoration and Security Failure Analysis, and Outsourced Filtering of E-mail-Based Attacks.

Designing and Building Protected Environments
Every business should develop a thoroughly considered security strategy that incorporates both proactive and reactive steps. The pre-attack plan is a collection of precautions that helps to minimize security gaps. The post-attack plan defines procedures to help security personnel to inventory the losses resulting from an attack, remediate the damage, document the event, and revive business functions as quickly as possible. Progent can advise you how to incorporate protection into your company processes. Progent can set up scanning utilities, define and execute a secure network architecture, and recommend procedures and policies to enhance the safety of your computing environment. Progent's security professionals are available to help you to set up a firewall, design safe online and mobile connectivity to e-mail and information, and configure an efficient VPN.

If your company is interested in an affordable way for jobbing out your network security management, Progent's 24x7 Monitoring Packages feature continual remote network tracking and fast resolution of emergencies.

Hybrid Cloud Solutions
Progent can help your company you to design, implement, administer and troubleshoot enterprise hybrid cloud solutions that incorporate physical and cloud hosted infrastructure and that comply with government and industry security requirements. (Find out about Progent's Office 365 integration solutions with on-premises Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

System Recovery and Security Forensics
Progent provides skill in recovering systems and devices that have been compromised, are in question, or have failed following a security attack. Progent can help assess the damage resulting from the breach, restore ordinary business operations, and retrieve information compromised as a result of the attack. Progent's security specialists can also oversee a comprehensive forensic evaluation by going over activity logs and using a variety of proven forensics techniques. Progent's experience with security consulting minimizes your downtime and allows Progent to suggest effective ways to avoid or contain new attacks.

Fault Tolerant Backup and Recovery Planning Powered by Data Protection Manager (DPM)
System Center Data Protection Manager is a powerful data backup and recovery technology based on disk-to-disk subsystems to optimize availability, speed, and ease of administration. Progent's expert Data Protection Manager support professionals can help your company to develop a practical workplace recovery plan, implement a cost-effective high-availability network infrastructure, install a Microsoft Data Protection Manager-powered backup and restore solution, thoroughly validate your DPM system, teach your IT personnel or regular service providers how to manage Data Protection Manager, or provide extensive IT outsourcing including off-site housing of DPM machines in Progent's world-class data center facility. To read more, visit Data Protection Manager Consulting and Support Services.

Spam and Virus Filtering Service and Email Encryption
Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top information security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.

Special Security Services Offered by Progent
Progent's veteran consultants offer world-class expertise in vital facets of network protection such as:

Information Risk Audits and Security Compliance Assessment
Progent offers expertise with security evaluation software such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive system tests to reveal possible security holes. Progent has extensive experience with testing tools and can help you to analyze assessment reports and react efficiently. Progent's certified security consultants also can perform web software validation and can perform expert evaluation of corporate-wide security to determine your organization's compliance with key worldwide security specifications such as FISMA, NIST, and ISO 17799. Also, Progent can assess the strength of your wireless protection covering stationary wireless equipment plus portable handsets. Read additional details about Progent's Security Vulnerability Evaluation and Security Compliance Assessment.

Cisco Network Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Expertise
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can provide world-class technical expertise for Cisco's entire range of security and VPN products including PIX Series Firewalls and ASA Series Firewalls, the Catalyst Firewall Services Module (FWSM), protected high-speed and integrated services routers, wireless access points and bridges, Cisco Meraki cloud-managed APs, and Catalyst Series switches. Read more details concerning Cisco Protection, Virtual Private Network (VPN) and Wireless Expertise.

Additional Firewall and VPN Solutions
In addition to supporting a wide range of protection solutions from Microsoft and Cisco, Progent can provide organizations of any size expert support for products from other popular firewall and Virtual Private Network vendors. Progent's engineers offer:

Unannounced Penetration Testing Consulting
Stealth penetration checking is a valuable technique for allowing organizations to understand how exposed their IT systems are to potential threats by revealing how well corporate protection procedures and mechanisms hold up to planned but unpublicized penetration efforts instigated by seasoned security specialists utilizing the latest intrusion techniques. Get the details about Progent's Penetration Testing Services.

CISM Security Support Services
Certified Information Security Manager (CISM) Consultants for Columbus, OhioCertified Information Security Manager (CISM) defines the basic competencies and worldwide standards of performance that information technology security professionals are expected to achieve. CISM provides business management the assurance that those who have earned their certification have the experience and knowledge to provide effective security administration and consulting services. Progent can offer a CISM-certified expert to assist your organization in key security disciplines such as information protection governance, risk assessment, information security program management, and incident response support.

Get the details about Progent's CISM Security Support Expertise.

Certified Information Systems Security Professionals (CISSP) Security Support Services
CISSP Qualified Network Security Professionals for Columbus, OhioProgent's CISSP experts are security specialists who have earned CISSP status as a result of verified professional work, rigorous study, and formal examination. CISSP Certification recognizes mastery of an international standard for information security. ANSI has given the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security administration procedures, security architecture and models, connection permission systems, software development security, operations security, physical security, encryption, telecommunications, network security, and disaster recovery planning.

Read more details concerning Progent's CISSP Support Services.

ISSAP-Certified Consultants for Secure Network Infrastructure
ISSAP Information Systems Security Architecture Professionals for Columbus, OhioProgent's ISSAP qualified security experts are consultants who have been awarded ISSAP status after rigorous examination and substantial experience. field experience with information security architecture. ISSAP security experts possess in-depth understanding of access management mechanisms and techniques, phone system and network security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture.

Read additional information about Progent's ISSAP Accredited Protected IT Infrastructure Engineering Support.

Certified Information Systems Auditor (CISA) Support Services
CISA Experts for Columbus, OhioThe Certified Information Systems Auditor (CISA) credential is an important qualification that represents mastery in network security auditing. Certified by ANSI, the CISA credential requires that candidates undergo a comprehensive examination overseen by the ISACA professional group. Progent offers the expertise of a CISA-certified security consultant able to assist companies in the fields of information systems audit services, IT administration, network assets and architecture lifecycle, information technology service delivery, protecting information resources, and disaster recovery planning.

Find out more details concerning Progent's Certified Information Systems Auditor Professional Expertise.

CRISC-certified IT Risk Management Specialists
CRISC-certified Risk Consultants for Columbus, OhioThe Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help you to create and execute a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and IT budget. Progent's network risk mitigation expertise is a good fit the services provided by Progent's CISA-qualified security engineers for objectively assessing your IT control design and with the services of Progent's CISM-certified experts for designing company-wide security policies and procedures.

Find out the details about Progent's CRISC Network Risk Management Consulting.

Global Information Assurance Certification Support Expertise
Network Security Consultants with Global Information Assurance Certification for Columbus, OhioGIAC was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to make sure that an accredited security consultant possesses the knowledge appropriate to deliver services in vital categories of system, data, and program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. NSA. Progent can provide the assistance of certified security engineers for any of the security disciplines addressed within GIAC certification topics such as auditing IT infrastructure, incident response, intrusion detection, web application security, and security information and event management (SIEM) solutions.

Find out additional information about Progent's GIAC Information Assurance Services.

Contact Progent for Network Security Consulting Services
If your business is located in Columbus or elsewhere in the state of Ohio and you need network security support services, telephone Progent at 800-993-9400 or see Contact Progent.














© 2002- 2017 Progent Corporation. All rights reserved.