Small business computer networks in Alaska can now get quick and affordable online help from Progent's qualified network security experts to help with complex security problems. Rates are affordable, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also provides assistance for complex projects that demand the knowledge of seasoned security consultants with high-level industry credentials.

If your Alaska business is situated far from major urban areas such as Anchorage, Juneau, or Fairbanks, help from local qualified network security consultants may be problematic when you have an emergency. This could mean a drop in income for your company, upset customers, idle workers, and defocused management. By contacting Progent's online services, you have access to a qualified security consultant ready to offer expertise whenever you require it to get your network on line and recover your data.

Progent can help you in a variety of ways in your initiatives to defend your IT environment with support that ranges from network security audits to developing a comprehensive security plan. Progent offers economical service to help small and midsize companies to set up and maintain secure IT environments powered by Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security companies to deliver centralized management and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further level of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's security experts are accessible remotely or on premises to provide a range of urgent or project-based network security services such as:

  • Perform thorough security audits
  • Clean up promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Configure secure methods for remote and mobile connectivity
  • Install effective applications for protection against spam and directory harvest attacks
  • Develop a comprehensive security plan with proactive monitoring
  • Provide outsourced Help Desk Support
  • Help Create a practical data backup and restore solution centered on System Center Data Protection Manager backup technology
If your business has an urgent need for computer security support, go to Progent's Emergency Remote Technical Support.

Progent's security experts provide advanced support in key areas of system security including analysis, firewall and VPN solutions, and advanced security planning.

System Assessment
Progent's expert security consultants can assess the effectiveness of your current computer security environment by performing exhaustive remote automated testing based on sophisticated utilities and tested techniques. Progent's experience in this testing saves your company time and money and offers an accurate portrayal of security holes. The knowledge your business is provided can form the foundation of a network protection plan that will allow your information system to operate safely and respond quickly to future threats.

Automated Vulnerability Evaluation
Progent offers consulting in the use of security analysis utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a set of automatic system testing scans to uncover possible security weaknesses. Progent has extensive experience with additional network auditing utilities such as NMAP, AMAP application mapper, eEye, as well as utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can help you build security into your company operations, install auditing software, plan and deploy a protected system architecture, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are ready to show you how to set up a firewall, implement secure remote access to email and data, and install virtual private network. Learn more about Progent's network security assessment.

Security Inventory Scanning Bundles for Small Companies
Progent offers two ultra-affordable security inventory bundles designed to enable small businesses to receive a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your network from outside your firewalled perimeter to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from an authorized machine inside your firewall to evaluate vulnerabilities to inside assaults. Both security inventory services are set up and executed from a protected remote site. The process is directed by a consultant with high-level security credentials and who produces a document that summarizes and analyzes the data collected by the scan and suggests cost-effective improvements if appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion checking is an important component of any serious network security plan. Progentís security experts can run extensive penetration tests without the knowledge of your company's internal network support staff. Stealth penetration checking uncovers whether current security defense systems such as intrusion detection warnings and event history monitoring are properly configured and consistently checked. Learn additional information on Progent's network security penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in network security solutions encompasses in-depth field work with leading firewalls and VPN technology offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to maintain your legacy PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Network Security and VPN Engineering Services
Cisco's security and offsite access products offer a full range of manageable security products to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business goals. Find out additional information concerning Progent's Support Expertise for Cisco Security and Virtual Private Network Appliances.

Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you create a detailed security plan and select the right products from multiple suppliers to achieve your security goals while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top data security vendors to provide web-based management and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper layer of inspection for incoming email. For outbound email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email that stays inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily evade traditional signature-matching anti-virus products. ProSight ASM protects local and cloud-based resources and offers a unified platform to manage the entire malware attack progression including protection, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly price, ProSight DPS automates your backup processes and enables rapid restoration of vital files, applications and VMs that have become lost or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect information related to your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time spent searching for critical information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Design
Any company ought to have a thoroughly thought out security strategy that includes both proactive procedures and response planning. The proactive strategy is a collection of mechanisms that help to reduce security weaknesses. The post-attack strategy helps your network security engineers to assess the damage resulting from an attack, fix the damage, record the experience, and get the IT network restored as rapidly as possible.

Progent's expert IS security engineers are available to assist your company to run a comprehensive risk evaluation and create a network security strategy to implement security policies and controls to reduce ongoing assaults and threats.

CISM Qualified System Security Consulting Assistance
The Certified Information Security Manager (CISM) organization describes the core capabilities and worldwide standards of performance that IT security managers are expected to master. It provides business management the assurance that those who have earned their CISM credential have the experience and knowledge to provide efficient security management and support consulting. Progent can provide the support of CISM qualified security professionals to assist companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Implementation Management
  • Information Security Management
  • Response Management
Read additional details about Progent's CISM Accredited Network Security Consulting Expertise.

CISSP Certified Security Engineering Assistance
CISSP certification denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data protection defined by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security areas including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISSP-certified Network Security Engineering Professionals.

ISSAP Certified Secure System Architecture Engineering Expertise
Progent's ISSAP certified IT architecture professionals are experts who have earned ISSAP status as a result of thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more complex demands of information system security architecture within the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Find out more information about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.

CISA Accredited Network Security Auditing Consulting Expertise
The CISA credential is a prestigious achievement that signifies expertise in IS security audit and control. Certified by ANSI, the CISA credential requires that candidates undergo an extensive test administered by the ISACA international professional group. Progent's CISA information security audit specialists are available to assist your company with:

  • IS Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Find out additional information about Progent's CISA Accredited IS Security Auditing Consulting Services.

CRISC Consultants
The CRISC program was established by ISACA to validate an IT professional's skills to design, deploy, and maintain information system controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity plan that follows industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists offer a range of risk evaluation services including:

  • Collect information and review documentation to evaluate major vulnerabilities
  • Identify statutory, regulatory, and business requirements and organizational standards associated with your network to assess their possible influence on your strategic goals
  • Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct training to make sure your organization understand information system risk so they can contribute to your risk control program
  • Match identified risk scenarios to related operational processes to help determine risk ownership
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
Learn additional details concerning Progent's CRISC Experts.

GIAC Qualified IS Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to make sure that a certified security consultant has the skills needed to deliver services in key categories of system, information, and application security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC IS security audit consultants are available to assist your IT organization in the areas of:

  • Auditing IT Infrastructure
  • Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn more information concerning Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Engineer
To find out how you can get in touch with a security consultant for online or on-premises assistance in Alaska, call 1-800-993-9400 or visit Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.