Small business computer networks in Alaska can now get fast and economical remote help from Progent's certified security professionals to resolve the toughest security problems. Rates are affordable, charges are by the minute, engagement is quick, and support is world class. Progent also offers assistance for long-term engagements that demand the knowledge of senior security engineers with high-level industry credentials.

In case your Alaska small business is outside of larger urban areas such as Anchorage, Juneau, or Fairbanks, the availability of local qualified security professionals is often limited when there's an urgent situation. This could mean lost productivity for your company, angry clients, unproductive employees, and defocused management. By contacting Progent's online services, you have access to a qualified security engineer who can provide help when you need it to get your network on line and salvage your data.

Progent can help you at any level in your efforts to defend your information system with services ranging from network security audits to creating a comprehensive security strategy. Progent offers affordable service to help small and midsize companies to design and maintain secure IT environments based on Microsoft Windows and Cisco products and that can include computers running UNIX or Linux platforms plus mobile clients with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security companies to deliver centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a deeper level of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also enable Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.

Progent's security professionals are available online or on site to offer a range of urgent or longer-term computer security services which include:

If your network has an emergency requirement for computer security support, refer to Progent's Emergency Online Network Support.

Progent's consultants offer advanced services in key fields of system protection that include analysis, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's certified security consultants can evaluate the strength of your current computer security environment through comprehensive remote automated analysis based on advanced utilities and tested techniques. Progent's skill in administering this service saves your company time and money and assures a detailed portrayal of weaknesses. The knowledge your company is provided can be used as the foundation of a network protection strategy that will allow your information system to run dependably and react rapidly to future threats.

Automated Network Vulnerability Analysis
Progent provides expertise in the use of security testing utilities such as Microsoft's MBSA and GFI LANguard for economically running a variety of programmed network testing scans to uncover potential security holes. Progent has extensive knowledge of other security analysis tools including NMAP, AMAP, eEye, plus utilities like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you build protection into your business processes, install auditing applications, plan and implement a secure system environment, and suggest policies to maximize the safety of your network. Progent's security engineers are able to help you set up a firewall, design safe remote connectivity to email and business applications, and install virtual private network. Find out more on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles intended to allow small companies to receive an objective network security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, a security expert runs a comprehensive examination of your network from outside your firewalled perimeter to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from a secure computer within your company firewall to uncover vulnerabilities to inside assaults. Both security inventory services are set up and run from a protected external location. The process is overseen by a consultant who has earned high-level security credentials and who generates a document that details and analyzes the information captured by the scan and proposes practical remediation if appropriate.

Network Security Penetration Analysis Consulting
Stealth penetration checking is a key component of any serious IT system security plan. Progentís security professionals can run extensive intrusion checks without the awareness of your organization's in-house network support staff. Unannounced penetration testing shows whether existing security defense tools such as intrusion detection alerts and event log analysis are properly configured and actively monitored. Learn more on Progent's stealth penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important networking certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Network Security and VPN Support Expertise
Cisco's security and offsite access technology represent a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Find out more information concerning Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.

Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security strategy and select appropriate technologies from multiple suppliers to support your security objectives while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis technology to guard endpoints and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus tools. ProSight ASM safeguards local and cloud-based resources and offers a single platform to address the entire malware attack progression including filtering, identification, mitigation, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of critical data, applications and VMs that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.

Expert Security Design
Any company ought to have a carefully thought out security program that includes both pre-attack processes and response planning. The proactive strategy is a set of procedures designed to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to evaluate the impact resulting from an attack, repair the network, record the experience, and get the IT network operational as soon as possible.

Progent's certified IS security engineers can to assist you to run a full vulnerability evaluation and create a company-wide security plan to implement security processes and controls to minimize future attacks and dangers.

CISM Certified Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of skill that information security managers are expected to learn. CISM gives executive management the assurance that those who have earned their CISM credential have the background and knowledge to provide effective security management and consulting services. Progent offers the expertise of CISM certified security consultants to assist companies with:

  • IS Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • IS Security Administration
  • Recovery Management
Find out more information about Progent's CISM Qualified Information Security Engineering Expertise.

CISSP Qualified Security Engineering Assistance
The CISSP credential recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information security defined by ISO 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Find out additional information concerning Progent's CISSP Qualified Information Security Engineering Services.

ISSAP Certified Secure IT Architecture Consulting Support
Progent's ISSAP qualified IT architecture professionals are consultants who have been awarded ISSAP Certification through rigorous testing and extensive work with network security architecture. The ISSAP credential indicates demonstrated skill in the most complex requirements of IS security architecture within the wider scope of information system security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Phone System and System Infrastructure Protection
  • Cryptography Options
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional details about Progent's ISSAP Qualified Secure IT Architecture Support Expertise.

CISA Certified Information System Security Auditing Engineering Services
The CISA credential is an important qualification that signifies expertise in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-certified IS security audit consultants can assist your business with:

  • Information Systems Audit Services
  • IT Administration
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Preparedness
Find out more information concerning Progent's CISA Accredited Information System Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's skills to plan, deploy, and support IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to assist your company to develop and carry out a business continuity strategy that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk management specialists can provide a variety of risk assessment services such as:

  • Gather information and review documentation to evaluate significant risk scenarios
  • Identify legal, industry, and business mandates and company standards associated with your network to determine their possible influence on your strategic objectives
  • Identify potential vulnerabilities for your business processes to help in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to make sure your organization understand information system risk so they can assist with your risk management program
  • Match identified risk scenarios to your associated business processes to help determine risk ownership
  • Validate risk appetite with your senior management and key stakeholders to make sure they align
Read additional details concerning Progent's CRISC Experts.

GIAC Certified IS Security Engineering Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security experts. GIAC's mission is to assure that a certified professional possesses the skills needed to deliver services in critical areas of network, information, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified security audit experts can help your company in the areas of:

  • Auditing Security Systems
  • Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Learn more information concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Expert
To find out how you can contact a certified Progent security consultant for online or on-premises support in Alaska, phone 1-800-993-9400 or visit Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.