To get immediate online assistance with computer security issues, businesses in Pittsburgh, PA, have access to expert expertise from Progent's security professionals. Progent's remote service staff is available to provide effective and economical assistance with security problems that threaten the productivity of your IT network. Progent's accredited security consultants are certified to provide help for environments based on Microsoft, Linux, macOS and OS X, Solaris, and popular versions of UNIX. Progent's wide array of services addresses firewall expertise, email filtering and encryption, secure system architecture, and disaster recovery preparedness. Progent's technical support team has been awarded the world's top security credentials including GIAC and CISSP.

Progent provides online security support services on a by-the-minute basis with no minimum minutes and no extra charges for sign-up or off-hour support. By billing by the minute and by providing world-class support, Progent's billing structure keeps expenses under control and eliminates situations where simple solutions entail big charges.

Our Network Has Been Attacked: What Can We Do Now?
If your network is currently experiencing a network security crisis, refer to Progent's Emergency Remote Network Support to find out how to receive fast assistance.

For companies that have prepared carefully for being hacked, the formal incident handling model outlined by GIAC (Global Information Assurance Certification) is Progent's recommended method of reacting to a major security attack.

Overview of Progent's Security Services
Coordinating computer security and planning for restoring vital data and systems after a security breach requires a continual program that entails an array of tools and processes. Progent's certified professionals can help your business at whatever level in your attempt to guard your information network, ranging from security assessments to creating a comprehensive security plan. Key technologies supported by Progent's security engineers include Planning and Implementation, Data Restoration and Security Failure Analysis, and Outsourced Protection from E-mail-Based Attacks.

Planning and Building Secure Networks
Every company ought to have a carefully considered security plan that includes both proactive and responsive activity. The pre-attack strategy is a set of precautions that works to minimize security gaps. The reactive strategy defines activities to help IT personnel to inventory the losses resulting from an attack, remediate the damage, record the experience, and restore business activity as quickly as feasible. Progent can advise you how to build protection into your company operations. Progent can set up scanning software, define and execute a secure IT architecture, and recommend procedures and policies to maximize the protection of your network. Progent's security professionals are ready to assist you to set up a firewall, design safe online and mobile access to email and data, and configure an efficient VPN.

If your company is interested in an economical option for jobbing out your security management, Progent's 24x7 Monitoring Options include automated online server tracking and immediate resolution of problems.

Hybrid Cloud Solutions
Progent can help your company you to plan, deploy, manage and repair enterprise hybrid cloud solutions that incorporate physical and cloud-based resources and that are compliant with government security requirements. (Find out about Progent's Office 365 integration with on-premises Exchange deployments, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

Data Restoration and Security Forensics
Progent offers expertise in recovering systems and servers that have been hacked, are in question, or have stopped working following a security breach. Progent can help assess the damage caused by the attack, return your company to normal business operations, and recover data lost as a result of the breach. Progent's certified engineers can also oversee a thorough forensic analysis by examining activity logs and using other proven forensics techniques. Progent's experience with security issues minimizes your off-air time and permits Progent to recommend efficient measures to avoid or contain new assaults.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight series of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices and servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud-based resources and offers a single platform to address the complete threat progression including filtering, identification, containment, cleanup, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge tools packaged within one agent managed from a single control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP deployment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent action. Progent's consultants can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of critical files, apps and virtual machines that have become lost or corrupted due to component failures, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security vendors to deliver centralized control and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be ported easily to an alternate hardware solution without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can eliminate up to half of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you’re planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.

Specialized Security Expertise Offered by Progent
Progent's veteran engineers offer unique expertise in vital facets of computer protection such as:

Security Vulnerability Audits and Security Compliance Testing
Progent provides experience with information risk evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard for conducting a set of automatic network scans to identify potential security gaps. Progent has broad skills with testing utilities and can help your company to understand assessment reports and respond appropriately. Progent's security engineers also provide web application testing and can perform expert evaluation of corporate-wide security to determine your company's compliance with key industry security specifications including FISMA, PCI, and ISO. Also, Progent can assess the strength of your wireless protection covering in-place wireless equipment as well as mobile devices. Find out more information about Progent's Security Vulnerability Evaluation and Security Compliance Testing.

Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts and Cisco CCNP experts can deliver in-depth technical support for Cisco's entire family of security and Virtual Private Network (VPN) products such as PIX 500 Series Firewalls and ASA Series Firewalls, Catalyst FWSM, secure broadband and integrated services (IS) routers, Aironet wireless access points and bridges, Cisco Meraki cloud-managed access points, and Catalyst Series switches. Learn more information about Cisco Protection, VPN and Aironet Wireless Support.

Additional Firewall and Virtual Private Network (VPN) Solutions
As well as being expert in a wide array of network security solutions from Microsoft and Cisco, Progent can provide businesses of all sizes top-level support for security products from other popular firewall and VPN vendors. Progent's engineers offer:

Unannounced Penetration Checking Services
Stealth intrusion checking is a valuable technique for allowing businesses to determine how exposed their IT systems are to real-world threats by testing how well corporate protection processes and technologies hold up to planned but unannounced intrusion attempts instigated by seasoned security engineers utilizing advanced hacking techniques. Find out additional details about Progent's Penetration Testing Services.

Certified Information Security Manager Security Support Services
Certified Information Security Manager (CISM) Engineers for Pittsburgh, PennsylvaniaCISM identifies the core competencies and international benchmarks of performance that information security managers are expected to master. It provides business management the confidence that those who have been awarded their CISM possess the experience and knowledge to provide efficient security administration and engineering services. Progent can provide a CISM-certified support professional to assist your organization in key security disciplines such as information security governance, risk management, information security process management, and crisis handling support.

Get more details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

Certified Information Systems Security Professionals (CISSP) Security Consulting Services
CISSP Certified Network Security Engineers for Pittsburgh, PennsylvaniaProgent's CISSP consultants are security specialists who have been awarded CISSP certification through demonstrated professional work, extensive study, and exhaustive examination. CISSP Certification indicates mastery of an international standard for information security. American National Standards Institute has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include security management practices, security design and test systems, connection control systems, software development security, business processes security, physical security, encryption, telecommunications, network security, and disaster recovery planning.

Get more information about Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

ISSAP-Certified Engineers for Secure Network Infrastructure
ISSAP Information Systems Security Architecture Professionals (ISSAP) for Pittsburgh, PennsylvaniaProgent's ISSAP certified security experts are consultants who have been awarded ISSAP accreditation after thorough examination and extensive hands-on work with network security architecture. ISSAP consultants have acquired in-depth knowledge of access control mechanisms and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity and DRP, and physical security integration. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security.

Read more details concerning Progent's ISSAP Certified Secure System Infrastructure Engineering Support.

Certified Information Systems Auditor Consulting Expertise
Certified Information Systems Auditor Consultants for Pittsburgh, PennsylvaniaThe CISA accreditation is an important qualification that signifies expertise in IS security auditing. Accredited by ANSI, the CISA credential has consultants pass an extensive test overseen by the ISACA professional group. Progent can provide the expertise of a CISA-qualified security professional able to assist businesses in the fields of IS audit services, IT enforcement, systems and architecture lifecycle, IT support, safeguarding data assets, and business continuity preparedness.

Read the details about Progent's CISA Professional Expertise.

CRISC-certified IT Risk Management Specialists
CRISC Network Risk Consultants for Pittsburgh, PennsylvaniaThe Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate a consultant's skills to design, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's risk management expertise is complementary to the services available from Progent's CISA-certified security engineers for objectively assessing your IT control design and also with the expertise of Progent's CISM-certified support professionals for implementing security policies and procedures.

Find out additional details concerning Progent's CRISC Risk Management Services.

Global Information Assurance Certification Consulting Expertise
Security Engineers with GIAC (Global Information Assurance Certification) for Pittsburgh, PennsylvaniaGlobal Information Assurance Certification was established in 1999 to certify the knowledge of computer security experts. GIAC's goal is to verify that an accredited professional has the knowledge necessary to provide services in key areas of network, information, and application program security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency. Progent offers the assistance of certified security engineers for all of the network security services covered within GIAC accreditation topics such as assessing perimeters, security incident response, traffic analysis, web-based services security, and security information and event management (SIEM) solutions.

Learn more information about Progent's GIAC Information Assurance Expertise.

Contact Progent for Computer Security Help
If your organization is situated in Pittsburgh or anywhere in the state of Pennsylvania and you need network security engineering help, call Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.