For immediate online assistance with data security problems, businesses in Louisville, KY, can find world-class troubleshooting from Progent's security professionals. Progent's remote support consultants are available to offer efficient and affordable help with security emergencies that are impacting the viability of your information system. Progent's accredited security engineers are certified to provide help for systems powered by Microsoft, Linux, macOS and OS X, Solaris, and major derivatives of UNIX. Progent's wide range of services encompasses firewall expertise, email security, secure system infrastructure, and disaster recovery planning. Progent's technical support team has earned the world's top security certifications including Certified Information Systems Auditor and Certified Information Systems Security Professional.

Progent offers remote security assistance on a per-minute model without minimum minutes and without extra fees for setup or off-hour service. By charging by the minute and by delivering top-level expertise, Progent's billing structure keeps costs low and eliminates scenarios where simple fixes entail major expenses.

We've Been Attacked: What Do We Do Now?
In case your network is currently experiencing a security crisis, visit Progent's Urgent Remote Network Help to see how to get immediate assistance.

For companies who have planned carefully for a security breech, the formal post-attack handling procedure promoted by GIAC is Progent's approved method of handling a major security penetration.

Introduction to Progent's Security Support Services
Managing computer protection plus planning for recovering vital data and systems following an attack demands a continual process involving a variety of tools and procedures. Progent's certified security experts can help your business at any level in your efforts to guard your information network, ranging from security audits to designing a comprehensive security plan. Important areas supported by Progent's security consultants include Security Planning and Prevention, Information Recovery and Security Forensics, and Managed Filtering of E-mail-Based Attacks.

Designing and Building Secure Environments
Every organization ought to develop a carefully thought out security strategy that includes both preventive and reactive elements. The pre-attack plan is a set of precautions that works to minimize vulnerabilities. The post-attack strategy specifies activities to assist security staff to assess the losses resulting from a breach, remediate the damage, document the experience, and restore business activity as soon as possible. Progent can show you how to build protection into your company processes. Progent can configure scanning utilities, define and build a secure computer architecture, and propose procedures and policies to optimize the safety of your computing environment. Progent's security experts are ready to assist you to set up a firewall, design secure remote connectivity to email and data, and configure an efficient virtual private network (VPN).

If your company is looking for an economical way for jobbing out your network security administration, Progent's 24x7 Network Support Packages feature automated online system monitoring and immediate resolution of problems.

Hybrid Cloud Solutions
Progent can help your company you to plan, implement, manage and troubleshoot enterprise hybrid cloud solutions that incorporate local and cloud-based infrastructure and that comply with regulatory data security standards. (Learn about Progent's Office 365 Exchange Online integration with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

System Recovery and Security Forensics
Progent has skill in restoring systems and servers that have been compromised, are quarantined, or have ceased to function because of a security attack. Progent can help evaluate the damage caused by the breach, restore normal business operations, and recover information compromised owing to the attack. Progent's certified specialists can also oversee a thorough forensic analysis by going over activity logs and utilizing other advanced assessment tools. Progent's experience with security consulting minimizes your off-air time and allows Progent to recommend effective ways to avoid or mitigate future attacks.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior machine learning tools to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily escape traditional signature-based AV products. ProSight ASM protects on-premises and cloud resources and offers a unified platform to manage the entire malware attack lifecycle including protection, detection, containment, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device management, and web filtering through cutting-edge technologies packaged within one agent accessible from a unified control. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP deployment that meets your company's specific requirements and that allows you demonstrate compliance with government and industry data security standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services so you can recover rapidly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates and monitors your backup processes and allows rapid restoration of critical files, apps and virtual machines that have become unavailable or damaged as a result of hardware failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical information. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security vendors to deliver centralized management and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard integrates cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further level of analysis for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hardware solution without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard data related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSLs or domains. By updating and managing your IT documentation, you can eliminate as much as 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you’re planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require when you need it. Learn more about Progent's ProSight IT Asset Management service.

Special Security Expertise Available from Progent
Progent's security consultants can provide world-class consulting support in vital facets of IT protection such as:

Information Risk Evaluation and Compliance Testing
Progent offers experience with security evaluation tools like Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic network scans to identify possible security gaps. Progent has extensive skills with testing tools and can help you to analyze assessment results and respond appropriately. Progent's certified security consultants also can perform web application validation and can perform thorough assessments of corporate-wide security to determine your company's compliance with important worldwide security specifications such as HIPAA, NIST, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless protection covering stationary wireless appliances as well as portable devices. Get additional information about Progent's Security Vulnerability Audits and Compliance Testing.

Cisco Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Consulting
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals can deliver world-class consulting services for Cisco's complete range of protection and Virtual Private Network solutions such as PIX Series Firewalls and ASA 5500 Series Firewalls, the Catalyst FWSM, protected high-speed and integrated services (IS) routers, Aironet wireless access points, Meraki cloud-managed Wi-Fi access points, and Catalyst family switches. Get additional information about Cisco Protection, Virtual Private Network (VPN) and Wireless Expertise.

Additional Firewall and Virtual Private Network Solutions
In addition to being expert in a broad range of protection solutions from Microsoft and Cisco, Progent can provide organizations of all sizes top-level support for products from other popular firewall and VPN vendors. Progent's engineers offer:

Unannounced Intrusion Checking Services
Unannounced intrusion checking is a valuable technique for allowing companies to understand how vulnerable their IT systems are to serious threats by revealing how well corporate security processes and mechanisms hold up to authorized but unannounced intrusion attempts instigated by veteran security specialists utilizing advanced hacking techniques. Read more details concerning Progent's Penetration Testing Services.

CISM Security Support Expertise
CISM Engineers for Louisville, KentuckyCertified Information Security Manager identifies the core skills and worldwide standards of performance that information security professionals are expected to achieve. CISM offers business management the confidence that consultants who have earned their CISM possess the background and knowledge to provide efficient security administration and engineering services. Progent can offer a CISM-certified expert to assist your enterprise in key security areas such as data protection governance, vulnerability management, information protection process control, and crisis handling management.

Find out additional information about Progent's CISM Security Support Expertise.

Certified Information Systems Security Professionals (CISSP) Security Consulting Services
CISSP Certified Network Security Consultants for Louisville, KentuckyProgent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP accreditation as a result of verified experience, rigorous study, and formal examination. CISSP qualification indicates expertise in an international standard for information security. ANSI has given the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security management practices, security architecture and test systems, access control methodology, applications development security, business processes security, physical security, cryptography, communications, Internet security, and business continuity planning.

Find out more information concerning Progent's CISSP Support Expertise.

ISSAP-Certified Consultants for Secure Network Infrastructure
ISSAP ISSAP Security Engineers for Louisville, KentuckyProgent's ISSAP certified security experts are experts who have earned ISSAP accreditation after thorough testing and significant experience. field experience with network security architecture. ISSAP security experts have acquired in-depth understanding of access control mechanisms and methodologies, telecommunications and network security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's ISSAP-certified security experts can help your company with all phases of secure network architecture.

Learn additional information concerning Progent's ISSAP Accredited Protected IT Infrastructure Engineering Services.

Certified Information Systems Auditor (CISA) Consulting Services
Certified Information Systems Auditor Experts for Louisville, KentuckyThe CISA accreditation is a prestigious achievement that indicates mastery in network security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates undergo an exhaustive examination overseen by the ISACA professional association. Progent can provide the expertise of a CISA-certified security consultant trained to assist companies in the fields of information systems audit process, information technology governance, systems and infrastructure planned useful life, information technology support, protecting data resources, and disaster recovery preparedness.

Read more information concerning Progent's CISA Professional Expertise.

CRISC-certified IT Risk Mitigation Specialists
CRISC Risk Experts for Louisville, KentuckyThe CRISC program was established by ISACA in 2010 to verify a consultant's ability to plan, implement, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a business continuity plan based on leading practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's risk management services are complementary to the support provided by Progent's CISA-certified consultants for objectively assessing your IT management design and with the services of Progent's CISM-certified support professionals for defining company-wide security policies.

Find out additional information about Progent's CRISC-certified Risk Mitigation Support.

Global Information Assurance Certification Professional Services
Security Engineers with GIAC (Global Information Assurance Certification) for Louisville, KentuckyGlobal Information Assurance Certification was founded in 1999 to validate the skill of information technology security professionals. GIAC's mission is to assure that an accredited security consultant has the skills needed to provide support in key categories of system, data, and application security. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent can provide the help of certified consultants for all of the network security capabilities addressed within GIAC certification programs such as auditing perimeters, security incident response, intrusion detection, web-based services security, and SIEM solutions.

Find out more details about Progent's GIAC Information Assurance Services.

Contact Progent for Network Security Expertise
If your company is located in Louisville or elsewhere in Kentucky and you're trying to find computer security support services, telephone Progent at 800-993-9400 or visit Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.