To get fast online help with network security problems, businesses in Louisville, KY, have access to world-class troubleshooting from Progent's security professionals. Progent's remote service staff is available to offer effective and low-cost help with security crises that are impacting the productivity of your information system. Progent's accredited security consultants are certified to provide help for systems powered by Microsoft Windows, Linux, Mac OS X, Sun Solaris, and popular derivatives of UNIX. Progent's broad selection of consulting services encompasses firewall technology, email filtering and encryption, secure system infrastructure, and disaster recovery planning. Progent's technical support team has earned the world's top security credentials including Certified Information Security Manager and Certified Information Systems Security Professional.

Progent provides remote security expertise on a per-minute basis without minimum call duration and no additional fees for setup or after hours service. By charging by the minute and by delivering top-level expertise, Progent's billing policy keeps costs low and eliminates scenarios where quick solutions entail big bills.

Our System Has Been Hacked: What Are We Supposed to Do?
In case your network is now fighting a network security crisis, refer to Progent's Emergency Remote Network Help to find out how to get fast help.

For companies that have prepared beforehand for being hacked, the formal post-attack response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's preferred method of responding to a serious security incident.

Introduction to Security Support Services
Coordinating data protection plus preparation for recovering critical data and systems following an attack demands an on-going process that entails an array of technologies and processes. Progent's security consultants can support your organization at whatever level in your efforts to guard your information system, ranging from security evaluation to creating a complete security strategy. Key areas supported by Progent's security engineers include Planning and Prevention, Data Recovery and Security Failure Analysis, and Managed Filtering of E-mail-Borne Attacks.

Designing and Building Protected Networks
Any company ought to develop a carefully thought out security plan that incorporates both preventive and reactive steps. The proactive strategy is a set of precautions that works to minimize vulnerabilities. The reactive plan defines activities to help security staff to evaluate the damage caused by a breach, repair the damage, record the experience, and revive business activity as quickly as possible. Progent can advise you how to build protection into your business operations. Progent can set up auditing software, define and build a secure network architecture, and recommend procedures and policies that will optimize the protection of your network. Progent's security professionals are ready to help you to set up a firewall, design protected online and mobile access to e-mail and information, and configure an efficient virtual private network.

If you are looking for an affordable option for outsourcing your security management, Progent's Round-the-clock Monitoring Services feature non-stop online network monitoring and quick response to problems.

Hybrid Cloud Solutions
Progent can assist your IT team you to plan, deploy, manage and repair enterprise hybrid cloud solutions that include physical and cloud infrastructure and that comply with government security requirements. (Find out about Progent's Office 365 integration solutions with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

System Recovery and Failure Analysis
Progent offers skill in restoring networks and devices that have been hacked, are in question, or have stopped working as a result of a security penetration. Progent can show you how to determine the damage caused by the assault, restore ordinary business operations, and recover data lost owing to the event. Progent's security specialists can also oversee a comprehensive forensic evaluation by going over event logs and utilizing a variety of advanced forensics techniques. Progent's experience with security consulting minimizes your downtime and allows Progent to propose efficient strategies to avoid or contain future attacks.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further level of analysis for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior machine learning tools to defend endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely escape traditional signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to automate the complete threat progression including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates your backup processes and enables fast restoration of vital files, applications and VMs that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Read more about ProSight DPS Managed Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to half of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you’re planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Find out more about ProSight IT Asset Management service.

Specialized Security Services Offered by Progent
Progent's certified engineers offer world-class consulting support in key facets of IT protection including:

Vulnerability Audits and Security Compliance Assessment
Progent offers experience with information risk auditing tools like Microsoft Baseline Security Analyzer and LANguard from GFI for performing a variety of automatic network tests to identify possible security problems. Progent has extensive skills with testing utilities and can help your company to analyze audit reports and respond efficiently. Progent's security consultants also can perform web application testing and can perform expert evaluation of corporate-wide security to determine your company's compliance with major worldwide security specifications including FISMA, PCI, and ISO. In addition, Progent can evaluate the effectiveness of your wireless protection covering in-place wireless appliances plus portable devices. Read more information concerning Progent's Security Vulnerability Audits and Security Compliance Assessment.

Cisco Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wi-Fi Support
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals (CCNPs) can provide world-class consulting services for Cisco's entire family of security and VPN technologies including PIX Series Firewalls and ASA Series Firewalls, the Catalyst FWSM, protected broadband and integrated services (IS) routers, wireless access points and bridges, Meraki cloud-managed APs, and Catalyst switches. Learn more details concerning Cisco Security, Virtual Private Network and Aironet Wireless Help.

Additional Firewall and Virtual Private Network (VPN) Technologies
As well as being expert in a broad array of network security solutions from Microsoft and Cisco, Progent can provide organizations of any size top-level consulting for solutions from other important firewall and Virtual Private Network vendors. Progent's consultants can provide:

Stealth Penetration Checking Consulting
Unannounced intrusion testing is a key technique for helping businesses to determine how vulnerable their information systems are to real-world threats by revealing how effectively network protection procedures and technologies hold up against authorized but unpublicized penetration efforts instigated by veteran security engineers utilizing advanced hacking methods. Read additional details concerning Progent's Penetration Testing Services.

Certified Information Security Manager (CISM) Security Consulting Expertise
CISM Engineers for Louisville, KentuckyCISM identifies the fundamental competencies and worldwide benchmarks of performance that IT security managers are required to master. CISM provides executive management the assurance that consultants who have been awarded their certification possess the experience and knowledge to offer effective security management and consulting support. Progent can provide a CISM-certified consultant to assist your enterprise in key security disciplines including information protection governance, risk assessment, information security process control, and crisis response management.

Find out more information concerning Progent's Certified Information Security Manager (CISM) Security Support Services.

Certified Information Systems Security Professionals (CISSP) Security Support Services
CISSP Qualified System Security Specialists for Louisville, KentuckyProgent's CISSP experts are security engineers who have been awarded CISSP accreditation through verified professional work, rigorous study, and formal testing. CISSP Certification indicates mastery of an international standard for IT security. American National Standards Institute has given the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration practices, security design and models, access control systems, applications development security, business processes security, physical security, cryptography, communications, network security, and disaster recovery planning.

Read additional information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

ISSAP-Qualified Engineers for Secure Network Infrastructure
ISSAP Information Systems Security Architecture Professionals (ISSAP) for Louisville, KentuckyProgent's ISSAP qualified security experts are consultants who have been awarded ISSAP accreditation as a result of thorough examination and significant hands-on work with network security design. ISSAP consultants have acquired in-depth knowledge of access management systems and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's ISSAP-qualified security consultants can help your business with all phases of secure network architecture.

Find out more information about Progent's ISSAP Accredited Secure IT Infrastructure Consulting Services.

Certified Information Systems Auditor Professional Expertise
CISA Engineers for Louisville, KentuckyThe Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA international professional group. Progent can provide the services of a CISA-qualified security audit professional trained to assist companies in the fields of information systems audit process, IT administration, network assets and infrastructure lifecycle, information technology service delivery, safeguarding data assets, and disaster recovery preparedness.

Read more information concerning Progent's Certified Information Systems Auditor (CISA) Consulting Expertise.

CRISC Risk Management Specialists
CRISC-certified Network Risk Consultants for Louisville, KentuckyThe Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's skills to design, implement, and support information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity plan based on industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's network risk mitigation expertise is a good fit the support provided by Progent's CISA-qualified consultants for objectively auditing your IS control design and also with the expertise of Progent's CISM-certified consultants for designing security policies and procedures.

Learn additional information concerning Progent's CRISC Network Risk Mitigation Expertise.

GIAC Professional Expertise
Security Consultants with GIAC (Global Information Assurance Certification) for Louisville, KentuckyGIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to assure that a certified professional possesses the skills needed to deliver services in critical categories of network, information, and application program security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent offers the support of certified security engineers for any of the security capabilities covered within GIAC accreditation topics such as auditing IT infrastructure, incident handling, traffic analysis, web services security, and security information and event management (SIEM) solutions.

Read more details about Progent's GIAC Information Assurance Services.

Depend on Progent for Computer Security Support
If your organization is situated in Louisville or anywhere in the state of Kentucky and you're trying to find computer security help, call Progent at 800-993-9400 or see Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.