Company information networks in the state of Alaska now have quick and affordable online access to Progent's qualified security engineers to help with the toughest security issues. Rates are competitive, charges are per minute, sign-up is fast, and service is unbeatable. Progent also offers help for complex projects that demand the expertise of seasoned security engineers with top security certifications.

In case your Alaska company is situated outside of larger urban areas like Anchorage, Juneau, or Fairbanks, access to local qualified security experts is often problematic during a security disaster. This can result in a loss of income for your business, angry customers, idle workers, and distracted management. By calling Progent, you can get in touch with a qualified security engineer who can provide expertise when you require it to keep your information system operating and restore your information.

Progent can help you at any level in your efforts to protect your IT environment with services ranging from security assessments to creating a comprehensive security strategy. Progent provides economical service to assist companies of any size to configure and maintain protected IT environments powered by Windows and Cisco products and that may include servers and desktops based on UNIX or Linux platforms plus BYOD users with Apple handhelds or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that incorporates the technology of top data security companies to provide web-based control and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and encryption. The onsite security gateway can also enable Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter.

Progent's certified professionals are available remotely or on site to provide a range of emergency or longer-term computer security services including:

  • Run automated network security evaluations
  • Clean up rapidly after virus and worm attacks
  • Install and troubleshoot firewalls
  • Configure safe solutions for remote and mobile connectivity
  • Install effective utilities for automatic defense against spam and DHAs
  • Develop a company-wide security strategy with round-the-clock network monitoring
  • Provide outsourced Call Center Services
  • Create a practical data backup and disaster recovery solution centered on Microsoft DPM automated backup capability
If your company has an immediate requirement for computer security support, go to Progent's Urgent Online Technical Help.

Progent's security experts offer advanced support in key fields of system protection including analysis, firewalls and VPN, and high-level security planning.

System Assessment
Progent's certified security engineers can evaluate the effectiveness of your current computer protection implementation by performing exhaustive remote automated testing based on sophisticated utilities and proven techniques. Progent's experience in this service saves you time and money and assures an objective picture of security holes. The knowledge your IT organization is provided can make up the basis of a network protection plan that will allow your network to operate dependably and react quickly to new threats.

Automated Vulnerability Evaluation
Progent provides expertise in the application of security evaluation utilities including MBSA and LANguard from GFI for economically running a set of automatic network auditing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of additional security analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can help you build security into your business operations, install scanning software, plan and implement a protected network architecture, and recommend policies to optimize the safety of your IT system. Progent's security consultants are able to assist you to configure a firewall, implement safe remote access to email and business applications, and integrate VPN. Learn additional information concerning Progent's network security assessment.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory packages intended to enable small companies to receive an objective network security assessment from a certified security consultant. With Progent's External Network Security Inventory Checkup, an engineer runs an extensive test of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from an authorized computer inside your firewall to evaluate the risk to inside attacks. The two security inventory services are configured and executed from a protected external location. The project is managed by a consultant who has earned top security credentials and who generates a document that details and interprets the data captured by the security scan and suggests cost-effective improvements if called for.

Stealth Intrusion Testing Support Services
Stealth intrusion checking is an important component of any serious network security strategy. Progent’s security professionals can run extensive intrusion checks without the awareness of your company's internal network support resources. Unannounced penetration checking shows whether current security monitoring tools such as intrusion detection alerts and event history analysis are properly configured and consistently monitored. Learn additional information on Progent's network security penetration testing consulting.

Firewall/VPN Solutions
Progent's expertise in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network products offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned important industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and remote access products provide a full range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Read more details about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and select the right technologies from multiple vendors to achieve your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily evade legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to address the complete malware attack lifecycle including filtering, detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows VSS and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection managed services deliver ultra-affordable multi-layer protection for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools incorporated within a single agent managed from a unified console. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP environment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent action. Progent can also help you to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup processes and enables fast restoration of critical data, applications and VMs that have become lost or damaged as a result of component failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security companies to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper level of inspection for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect data about your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can save up to half of time spent searching for vital information about your network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you’re planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more about ProSight IT Asset Management service.

Expert Security Planning
Every business ought to have a carefully considered security program that incorporates both proactive procedures and response planning. The proactive strategy is a set of procedures that help to minimize security weaknesses. The reactive plan assists your company's IT security personnel to assess the impact resulting from a security penetration, fix the system, document the event, and get the IT network restored as quickly as possible.

Progent's certified information security engineers are available to help your business to run a full risk evaluation and define a company-wide security strategy to implement security policies and mechanisms to minimize ongoing assaults and threats.

CISM Certified Information Security Engineering Services
The Certified Information Security Manager (CISM) committee defines the basic competencies and global standards of performance that information security managers are expected to master. It gives business management the confidence that those who have earned their CISM certification possess the experience and capability to provide effective security administration and consulting services. Progent offers the support of CISM qualified security professionals to assist companies with:

  • Information Security Governance
  • Risk Analysis
  • IS Security Implementation Management
  • Network Security Management
  • Recovery Planning
Find out additional information about Progent's CISM Qualified IS Security Support Services.

CISSP Accredited Security Engineering Services
The CISSP credential denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information protection defined by ISO 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security areas such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Read more information concerning Progent's CISSP-certified IS Security Consulting Services.

ISSAP Certified Secure Network Architecture Engineering Expertise
Progent's ISSAP certified system architecture professionals are consultants who have been awarded ISSAP status through thorough examination and significant experience with information security architecture. The ISSAP credential indicates proven mastery in the most complex requirements of information security architecture bounded by the broader scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all phases of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Cryptography Options
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Hardware Security
Read additional details about Progent's ISSAP Accredited Secure Network Architecture Engineering Professionals.

CISA Certified Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that indicates expertise in IS security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA information security audit consultants are available to assist your business in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Planning
Learn more details about Progent's CISA Qualified Security Auditing Engineering Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's skills to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and execute a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC network risk mitigation consultants can provide a variety of risk assessment services such as:

  • Collect information and review documentation to evaluate significant risk scenarios
  • Inventory statutory, industry, and business mandates and organizational policies related to your network to determine their possible impact on your strategic objectives
  • Identify potential vulnerabilities for your operational workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct seminars to make sure your stakeholders understand IT risk so they can assist with your risk control process
  • Match key risk vectors to related operational processes to help assign risk ownership
  • Determine risk tolerance with your senior management and key stakeholders to ensure they align
Find out more details about Progent's CRISC Consultants.

GIAC Accredited IS Security Consulting Support
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security experts. GIAC's goal is to assure that an accredited professional possesses the skills appropriate to deliver services in critical areas of network, data, and application software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit experts can assist your business with:

  • Auditing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more information concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Expert
To find out how to get in touch with a certified Progent security engineer for remote or on-premises assistance in Alaska, phone 1-800-993-9400 or go to Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.