To get immediate remote help with computer security problems, businesses in Pittsburgh, PA, have access to world-class support by contacting Progent's certified security engineers. Progent's online service consultants are available to provide efficient and low-cost assistance with security problems that are impacting the viability of your IT network. Progent's accredited security engineers are certified to provide help for environments based on Microsoft, Linux, Apple, Sun, and popular versions of UNIX. Progent's wide selection of consulting services encompasses firewall technology, email security, secure system architecture, and business continuity preparedness. Progent's support team has been awarded the industry's top security accreditations including Global Information Assurance Certification and ISSAP.

Progent provides online security assistance on a by-the-minute basis with no minimum times and no additional charges for sign-up or off-hour service. By billing per minute and by providing top-level expertise, Progent's pricing structure keeps expenses under control and eliminates scenarios where simple fixes result in big expenses.

Our Network Has Been Hacked: What Do We Do Now?
In case your business is currently fighting a security emergency, go to Progent's Emergency Online Computer Support to see how to get fast help.

For businesses who have planned in advance for a security breech, the formal incident response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's preferred method of handling a major security incident.

Introduction to Progent's Security Services
Managing data protection as well as preparation for restoring critical information and functions following a security breach demands an on-going effort that entails a variety of tools and procedures. Progent's certified engineers can support your organization at any level in your attempt to guard your information system, ranging from security evaluation to designing a complete security strategy. Some areas supported by Progent's security engineers include Security Planning and Implementation, Data Recovery and Security Forensics, and Outsourced Protection from Email-Based Attacks.

Planning and Building Secure Networks
Any business ought to develop a carefully thought out security plan that incorporates both proactive and reactive elements. The proactive plan is a collection of precautions that helps to minimize vulnerabilities. The reactive plan defines activities to assist security staff to evaluate the losses caused by an attack, repair the damage, record the event, and restore business activity as quickly as possible. Progent can advise you how to design security into your business processes. Progent can install scanning software, define and execute a safe network architecture, and propose processes and policies that will maximize the protection of your information system. Progent's security professionals are available to assist you to set up a firewall, design safe online and mobile access to email and data, and configure an effective virtual private network.

If you are looking for an affordable option for outsourcing your security administration, Progent's Round-the-clock Network Support Packages include continual online system monitoring and quick resolution of emergencies.

Hybrid Cloud Solutions
Progent can assist your IT team you to plan, implement, manage and repair enterprise hybrid cloud solutions that combine physical and cloud resources and that are compliant with regulatory data security standards. (Learn about Progent's Office 365 integration with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

System Restoration and Failure Analysis
Progent has skill in restoring systems and servers that have been hacked, are suspect, or have failed as a result of a security attack. Progent can show you how to assess the losses caused by the attack, restore ordinary business operations, and recover data compromised as a result of the attack. Progent's security specialists can also perform a comprehensive forensic analysis by examining activity logs and using other advanced assessment tools. Progent's background with security consulting minimizes your business disruption and permits Progent to recommend effective measures to avoid or contain new attacks.

Fault Tolerant Data Backup and Recovery Strategies Based on Data Protection Manager (DPM)
Microsoft Data Protection Manager is a revolutionary data backup and restore technology based on disk-to-disk systems to maximize fault tolerance, performance, and ease of administration. Progent's certified Data Protection Manager support professionals can help your company to create an effective disaster recovery plan, design a cost-effective fault-tolerant network infrastructure, configure a Microsoft Data Protection Manager-based recovery system, comprehensively validate your system, teach your administrative personnel or local consultants how to maintain Microsoft DPM, or provide complete information technology outsourcing including off-site housing of Microsoft Data Protection Manager machines in Progent's secure data center. To learn more, visit Data Protection Manager (DPM) Consulting.

Spam and Virus Filtering and Email Encryption
Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and keeps most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Specialized Security Expertise Offered by Progent
Progent's veteran engineers offer unique expertise in key facets of computer protection such as:

Security Vulnerability Evaluation and Compliance Testing
Progent offers experience with information risk evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard for conducting a variety of automatic network tests to reveal potential security gaps. Progent has extensive skills with testing tools and can assist you to understand audit results and react appropriately. Progent's certified security consultants also provide web software testing and can conduct expert evaluation of corporate-wide security to assess your organization's compliance with major worldwide security specifications such as HIPAA, PCI, and ISO. In addition, Progent can evaluate the strength of your wireless security covering stationary wireless appliances as well as portable handsets. Read more information about Progent's Information Risk Evaluation and Security Compliance Assessment.

Cisco Network Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Consulting
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can provide world-class consulting services for Cisco's entire range of protection and Virtual Private Network (VPN) products including PIX 500 Series Firewalls and ASA 5500 Series Firewalls, the Catalyst Firewall Services Module (FWSM), secure high-speed and integrated services (IS) routers, wireless access points and bridges, Cisco Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Read additional details about Cisco Protection, Virtual Private Network and Wireless Expertise.

Other Firewall and Virtual Private Network (VPN) Solutions
As well as being expert in a broad range of protection solutions from Microsoft and Cisco, Progent can provide organizations of all sizes advanced consulting for technologies from other important firewall and Virtual Private Network (VPN) vendors. Progent's engineers offer:

Stealth Penetration Checking Services
Stealth penetration checking is a key technique for helping businesses to find out how vulnerable their IT environments are to potential attacks by testing how thoroughly corporate security policies and technologies hold up against planned but unannounced penetration efforts instigated by veteran security engineers utilizing advanced hacking methods. Find out additional details concerning Progent's Penetration Testing Services.

Certified Information Security Manager (CISM) Security Support Services
Certified Information Security Manager Experts for Pittsburgh, PennsylvaniaCertified Information Security Manager (CISM) defines the core competencies and international benchmarks of performance that information technology security professionals are expected to master. CISM offers business management the assurance that those who have been awarded their CISM possess the experience and skill to offer efficient security management and consulting services. Progent can provide a CISM-certified expert to help your organization in key security disciplines including data security governance, risk assessment, information protection process control, and crisis response management.

Find out additional details about Progent's Certified Information Security Manager (CISM) Security Support Services.

CISSP Security Consulting Expertise
CISSP Qualified Network Security Experts for Pittsburgh, PennsylvaniaProgent's CISSP experts are security engineers who have been awarded CISSP accreditation as a result of verified professional work, extensive study, and formal examination. CISSP Certification recognizes mastery of an international standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration procedures, security architecture and models, connection control systems, applications development security, business processes security, physical security, encryption, communications, network security, and disaster recovery planning.

Learn additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

ISSAP-Qualified Consultants for Secure System Infrastructure
ISSAP ISSAP Security Engineers for Pittsburgh, PennsylvaniaProgent's ISSAP certified security experts are consultants who have been awarded ISSAP certification as a result of rigorous examination and extensive hands-on work with information security architecture. ISSAP security experts possess comprehensive knowledge of access management systems and methodologies, telecommunications and network protection, cryptography, requirements analysis, BCP and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security specialists can help your company with all aspects of architecture security.

Find out more details about Progent's ISSAP Accredited Protected System Infrastructure Consulting Services.

Certified Information Systems Auditor (CISA) Support Expertise
Certified Information Systems Auditor Engineers for Pittsburgh, PennsylvaniaThe CISA credential is a globally recognized achievement that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive test overseen by the ISACA international professional group. Progent can provide the services of a CISA-certified security consultant able to help companies in the fields of IS audit services, IT governance, systems and architecture lifecycle, information technology service delivery, safeguarding information resources, and business continuity preparedness.

Read more details concerning Progent's Certified Information Systems Auditor Professional Services.

CRISC-certified IT Risk Management Experts
CRISC IT Risk Consultants for Pittsburgh, PennsylvaniaThe Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and support information system controls to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's risk mitigation expertise is complementary to the services available from Progent's CISA-certified consultants for impartially auditing your IT management design and also with the services of Progent's CISM consultants for designing company-wide security policies.

Find out additional information concerning Progent's CRISC Risk Mitigation Services.

Global Information Assurance Certification Professional Services
Security Experts with GIAC Certification for Pittsburgh, PennsylvaniaGlobal Information Assurance Certification was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to ensure that a certified security consultant has the skills necessary to deliver services in critical categories of system, information, and application program security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency. Progent can provide the assistance of GIAC certified consultants for any of the security capabilities addressed within GIAC certification topics including assessing perimeters, security incident response, intrusion detection, web-based application security, and SIEM solutions.

Find out additional details about Progent's GIAC Information Assurance Services.

Contact Progent for Computer Security Expertise
If your business is situated in Pittsburgh or elsewhere in Pennsylvania and you're looking for computer security consulting, call Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.