Company networks in the state of Alaska can now get quick and economical online access to Progent's qualified network security support specialists to fix complex security issues. Rates are reasonable, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also provides assistance for long-term projects that requires the knowledge of senior security engineers with top industry certifications.

In case your Alaska business is located away from more populated metropolitan neighborhoods such as Anchorage, Juneau, or Fairbanks, the availability of local qualified network security support specialists may be limited during a security disaster. This can result in lost income for your company, upset customers, unproductive workers, and defocused management. By calling Progent, you can get in touch with a certified security professional who can offer assistance whenever you require it to keep your system operating and restore your data.

Progent can assist you at any level in your initiatives to protect your network with support services that ranges from security checks to developing a company-wide security strategy. Progent offers affordable support to assist businesses of all sizes to design and maintain secure networks powered by Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the technology of leading data security companies to deliver web-based management and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam protection, DLP, and encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.

Progent's security experts are accessible online or in person to offer a variety of urgent or longer-term computer security services including:

If your business has an immediate need for computer security support, refer to Progent's Urgent Online Technical Support.

Progent's consultants provide advanced support in key fields of network protection including security evaluation, firewall/VPN support, and advanced security planning.

System Security Assessment
Progent's certified security consultants can assess the strength of your current computer protection systems by performing comprehensive remote automated analysis based on sophisticated software tools and proven techniques. Progent's skill in this testing saves your company consulting fees and assures an objective picture of weaknesses. The information your business is provided can be used as the basis of a network protection plan that can allow your network to operate safely and respond rapidly to future risks.

Automated Network Vulnerability Analysis
Progent offers expertise in the use of security evaluation packages such as MBSA and GFI LANguard Network Security Scanner for affordably running a variety of programmed network testing scans to uncover possible security vulnerabilities. Progent has extensive knowledge of other security analysis tools such as NMAP, AMAP Application Scanner, eEye, as well as utilities such as Metasploit Framework, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you build protection into your business processes, configure auditing software, define and deploy a protected network environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are ready to show you how to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Find out more about Progent's automated security evaluation.

Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to enable small companies to receive an independent network security evaluation from an accredited security specialist. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from a secure computer inside your company firewall to assess vulnerabilities to internal attacks. Both security inventory packages are configured and run from a secured external location. The process is managed by a consultant who has earned top security credentials and who generates a document that summarizes and analyzes the information collected by the security scan and proposes cost-effective improvements if called for.

Stealth Intrusion Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive IT system security plan. Progentís security experts can run extensive penetration tests without the awareness of your organization's internal IT staff. Stealth penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event log monitoring are properly set up and actively monitored. Find out more about Progent's network penetration analysis support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes extensive field work with leading firewalls and VPN products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and remote access products provide a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business objectives. Learn more information concerning Progent's Support Services for Cisco Security Solutions and VPN Products.

Consulting Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and medium size organizations expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose the right technologies from multiple vendors to achieve your security objectives while sticking within your budget restraints.

Certified Security Design
Every business ought to develop a thoroughly considered security program that includes both preventive processes and response plans. The proactive plan is a set of steps designed to reduce security weaknesses. The post-attack plan assists your security personnel to evaluate the impact caused by a security penetration, fix the system, document the experience, and get the IT network operational as soon as possible.

Progent's certified IT security engineers can to help you to perform a comprehensive risk evaluation and create a computer security plan to implement security processes and mechanisms to minimize ongoing attacks and dangers.

CISM Certified Security Consulting Assistance
The CISM organization defines the basic competencies and global standards of performance that IT security managers are expected to learn. CISM gives executive management the confidence that those who have earned their CISM credential possess the background and knowledge to deliver effective security administration and support consulting. Progent offers the expertise of CISM certified security consultants to assist businesses with:

  • Information Security Governance
  • Vulnerability Management
  • Information Security Program Management
  • Information Security Management
  • Response Planning
Learn more details concerning Progent's CISM Qualified Information Security Consulting Services.

CISSP Qualified Security Consulting Assistance
The CISSP credential recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of data protection stipulated by ISO 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Preparedness
Find out more details about Progent's CISSP-certified Information Security Support Services.

ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the more in-depth demands of information system security architecture bounded by the broader scope of information security expertise required for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your business with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Cryptography Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Read more details about Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.

CISA Qualified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is an important achievement that signifies expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass an extensive test administered by the ISACA international professional association. Progent's CISA-qualified information security audit consultants are available to assist your company with:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Learn additional details about Progent's CISA Qualified Security Auditing Engineering Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to design, implement, and support IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk management specialists can provide a range of risk evaluation services including:

  • Gather information and review documentation to evaluate significant risk scenarios
  • Inventory legal, regulatory, and contractual requirements and organizational standards associated with your network to assess their potential influence on your business goals
  • Point out possible threats for your business processes to assist in analyzing your enterprise risk
  • Develop a risk awareness program and conduct training to ensure your organization understand IT risk so they can assist with your risk management program
  • Connect identified risk vectors to your associated business procedures to help determine risk responsibility
  • Validate risk appetite with executive management and major stakeholders to ensure they align
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Engineering Support
GIAC was established in 1999 to certify the skill of computer security professionals. GIAC's goal is to assure that a certified professional possesses the skills appropriate to provide support in vital categories of system, data, and application security. GIAC accreditations are recognized by businesses and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified information security audit experts are available to assist your company with:

Find out more information about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Progent Security Engineer
To see how you can get in touch with a Progent security engineer for online or on-premises help in Alaska, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.