Small business networks in the state of Alaska can have prompt and economical online help from Progent's qualified security consultants to fix the toughest security issues. Rates are competitive, charges are per minute, engagement is immediate, and service is unbeatable. Progent also provides assistance for long-term projects that requires the knowledge of seasoned security engineers with top industry certifications.

In case your Alaska office is based away from larger metropolitan neighborhoods including Anchorage, Juneau, or Fairbanks, access to local qualified security experts may be problematic when you have a security disaster. This can result in a loss of revenue for your business, angry customers, unproductive workers, and distracted management. By utilizing Progent, you can get in touch with a certified security consultant ready to provide help whenever you need it to keep your computer network running and recover your information.

Progent can help you in a variety of ways in your initiatives to protect your information system with support services that can range from network security audits to developing a company-wide security plan. Progent provides affordable support to help companies of any size to set up and maintain safe networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX or Linux operating systems as well as BYOD users with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading information security companies to provide centralized control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter.

Progent's security experts are accessible online or in person to offer a range of emergency or project-based computer security services such as:

If your network has an urgent need for IT security support, refer to Progent's Emergency Online Technical Help.

Progent's engineers can deliver world-class support in vital fields of system protection that include auditing, firewall and VPN expertise, and advanced security planning.

System Evaluation
Progent's certified security consultants can assess the strength of your existing computer security systems through comprehensive remote automated analysis based on sophisticated utilities and proven techniques. Progent's skill in administering this service saves you money and assures an accurate portrayal of system vulnerability. The information your company is provided can be used as the foundation of a network protection plan that will allow your network to run dependably and react quickly to new threats.

Automated Network Vulnerability Analysis
Progent offers expertise in the application of security testing products such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically running a variety of programmed system auditing checks to uncover possible security weaknesses. Progent has extensive experience with additional network auditing products including NMAP, AMAP application mapper, eEye, plus utilities like Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can show you how to build protection into your business processes, configure scanning software, define and deploy a protected system architecture, and recommend procedures to optimize the security of your IT system. Progent's security professionals are ready to help you configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Find out more on Progent's automated security audits.

Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to allow small businesses to receive a professional security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to determine possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your firewall to determine vulnerabilities to internal threats. The two security inventory services are configured and executed from a protected external site. The process is directed by an engineer with high-level security credentials and who produces a document that summarizes and interprets the data captured by the scan and proposes practical remediation where called for.

Network Security Penetration Testing Support Services
Stealth intrusion testing is an important component of any comprehensive network security strategy. Progentís security experts can run thorough penetration tests without the knowledge of your company's in-house network support resources. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident alerts and event history analysis are properly set up and actively checked. Find out additional information concerning Progent's network security penetration analysis support services.

Firewalls and VPN Expertise
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network products offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important industry accreditations including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your legacy PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and offsite connection technology provide a complete range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and CCNP certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Read additional details concerning Progent's Consulting Services for Cisco Security Technology and VPN Appliances.

Support Services for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose the right technologies from multiple suppliers to achieve your security goals while sticking within your spending limits.

Certified Network Security Planning
Every business ought to develop a carefully considered security strategy that includes both preventive processes and response planning. The proactive plan is a collection of steps designed to minimize vulnerabilities. The reactive strategy helps your security engineers to evaluate the impact resulting from an attack, fix the system, document the event, and get the IT network running as soon as possible.

Progent's expert IT security engineers can to assist you to run a comprehensive vulnerability assessment and define a company-wide security plan to establish security policies and controls to mitigate ongoing attacks and threats.

CISM Qualified Security Engineering Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of performance that information security professionals are expected to learn. It gives business management the assurance that those who have qualified for their CISM credential possess the background and knowledge to deliver effective security administration and consulting consulting. Progent offers the expertise of CISM qualified security consultants to help companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • Information Security Administration
  • Recovery Management
Find out additional details concerning Progent's CISM Certified Security Engineering Professionals.

CISSP Certified Security Consulting Assistance
CISSP certification recognizes expertise with a worldwide standard for network security. ANSI has awarded the CISSP credential accreditation in the field of information security defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Learn additional information concerning Progent's CISSP Accredited Security Support Professionals.

ISSAP Certified Secure Network Architecture Engineering Services
Progent's ISSAP qualified network architecture professionals are experts who have earned ISSAP status as a result of thorough examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven mastery in the more challenging demands of information security architecture within the broader field of IS security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Phone System and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Read more information about Progent's ISSAP Certified Secure Information System Architecture Support Professionals.

CISA Certified IS Security Auditing Consulting Support
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass a comprehensive test administered by the ISACA professional association. Progent's CISA security audit specialists can help your company with:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Architecture Lifecycle Planning
  • IT Support
  • Protecting Data Assets
  • Business Continuity Preparedness
Get more details concerning Progent's CISA Qualified Network Security Auditing Consulting Support.

CRISC Experts
The CRISC certification program was established by ISACA to verify an IT professional's ability to plan, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation experts can provide a variety of risk identification services such as:

  • Gather data and review documentation to help identify significant vulnerabilities
  • Inventory legal, industry, and business mandates and organizational standards related to your network to assess their potential influence on your strategic objectives
  • Point out possible vulnerabilities for your business workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide training to ensure your organization appreciate information system risk so they can assist with your risk management process
  • Connect key risk scenarios to your associated operational processes to help assign risk ownership
  • Determine risk appetite with your senior management and key stakeholders to ensure they are in agreement
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to make sure that a certified security consultant has the skills necessary to deliver support in key categories of network, information, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit specialists can assist your company with:

  • Assessing Security Systems
  • Security Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Find out more details about Progent's GIAC Information Assurance Services.

Talk to a Certified Security Expert
To see how to get in touch with a certified security engineer for online or on-premises assistance in Alaska, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.