Business networks in the state of Colorado can depend on quick and economical online access to Progent's qualified network security professionals to assist with urgent security issues. Rates are affordable, charges are by the minute, engagement is immediate, and service is world class. Progent also provides assistance for complex engagements that requires the expertise of seasoned security engineers with high-level industry credentials.

In case your Colorado network is based some distance from larger urban neighborhoods including Denver, Colorado Springs, Aurora, or Lakewood, the availability of local certified security professionals is often limited when you have an urgent situation. This could mean a drop in productivity for your business, upset clients, idle workers, and defocused management. By contacting Progent's online services, you have access to a qualified security professional who can provide expertise whenever you require it to keep your system on line and restore your data.

Progent can assist you in all your initiatives to defend your information system with services that can range from network security assessments to developing a company-wide security strategy. Progent provides affordable support to assist companies of any size to design and manage secure networks based on Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the technology of top data security companies to provide web-based control and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also enable Exchange Server to monitor and protect internal email that stays inside your corporate firewall.

Progent's security professionals are accessible remotely or in person to offer a range of urgent or project-based IT security services including:

  • Perform automated network security evaluations
  • Clean up quickly after attacks
  • Install hardware and software firewalls
  • Configure safe methods for offsite and mobile connectivity
  • Deploy effective solutions for automatic protection against spam and DHAs
  • Help create a comprehensive security plan with round-the-clock monitoring
  • Provide outsourced Call Center Support
  • Develop a practical data backup and business continuity plan built around Data Protection Manager (DPM) backup capability
If your company has an urgent need for computer security support, refer to Progent's Emergency Remote Network Support.

Progent's security experts can deliver advanced support in key areas of computer security including security assessment, firewall and VPN expertise, and advanced security planning.

System Security Audits
Progent's certified security consultants can evaluate the strength of your current network security systems through comprehensive remote automated analysis via advanced software tools and proven techniques. Progent's skill in this testing saves your company consulting fees and offers an accurate picture of weaknesses. The information your company gains can form the basis of a security plan that will allow your information system to run safely and react rapidly to future threats.

Automated Security Assessment
Progent provides expertise in the use of security evaluation packages including Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a set of programmed system auditing scans to uncover potential security gaps. Progent has extensive experience with additional network analysis utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can show you how to design security into your business operations, install auditing software, plan and deploy a secure system architecture, and recommend policies to optimize the safety of your network. Progent's security engineers are available to assist you to set up a firewall, implement safe remote access to email and business applications, and install virtual private network. Find out more about Progent's network security evaluation.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory bundles intended to allow small businesses to receive an independent security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your IT infrastructure from beyond your firewall to uncover potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized machine within your firewall to assess the risk to internal attacks. The two security inventory services are set up and run from a protected external location. The project is managed by a consultant with top security credentials and who generates a document that details and interprets the data captured by the security scan and proposes cost-effective improvements if appropriate.

Stealth Intrusion Analysis Support Services
Stealth intrusion testing is an important part of any serious IT system security strategy. Progent’s security professionals can run extensive intrusion checks without the awareness of your company's in-house IT resources. Stealth penetration testing shows whether existing security monitoring systems such as intrusion detection warnings and event history monitoring are properly set up and consistently checked. Find out additional information concerning Progent's network penetration testing consulting.

Firewalls and VPN Expertise
Progent's expertise in network security technology includes in-depth field work with leading firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote connection technology represent a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Read additional information about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.

Engineering Expertise for Other Firewall and VPN Solutions
Progent provides small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can help you design a comprehensive security strategy and select appropriate technologies from a variety of suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to guard endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a single platform to address the complete malware attack lifecycle including protection, detection, containment, remediation, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge tools packaged within one agent managed from a single console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP deployment that addresses your organization's specific requirements and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate attention. Progent can also assist your company to install and verify a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates your backup activities and allows fast restoration of critical data, applications and virtual machines that have become lost or corrupted due to component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can help you to recover your business-critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security companies to provide centralized management and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of analysis for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as half of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you’re planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Any company ought to develop a carefully considered security strategy that includes both proactive procedures and response planning. The pre-attack plan is a collection of steps that help to minimize security weaknesses. The post-attack strategy helps your company's IT security personnel to evaluate the damage caused by a security penetration, repair the damage, record the experience, and get business functions running as quickly as feasible.

Progent's certified IT security engineers are available to help you to run a full vulnerability assessment and define a network security strategy to establish security processes and controls to minimize ongoing assaults and dangers.

CISM Accredited Security Consulting Services
The CISM committee defines the basic capabilities and global standards of performance that IT security managers are required to learn. CISM provides executive management the assurance that those who have qualified for their CISM credential possess the background and capability to provide efficient security management and consulting consulting. Progent offers the support of CISM certified security consultants to assist companies with:

  • Information Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Administration
  • Response Planning
Learn more information about Progent's CISM Accredited Information Security Support Professionals.

CISSP Qualified Security Consulting Expertise
CISSP certification recognizes mastery of an international standard for data security. The American National Standards Institute has granted certification recognition in the field of information security under ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your business in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional details about Progent's CISSP Security Support Expertise.

ISSAP Certified Secure System Architecture Engineering Assistance
Progent's ISSAP qualified system architecture engineers are experts who have earned ISSAP status through thorough testing and extensive work with information security design. The ISSAP certification indicates proven skill in the most challenging requirements of information security architecture bounded by the wider field of IS security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out additional details about Progent's ISSAP Certified Secure Information System Architecture Support Professionals.

CISA Accredited IS Security Auditing Engineering Assistance
The CISA accreditation is a recognized qualification that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass an extensive test administered by the ISACA international professional group. Progent's CISA-qualified information security audit consultants are available to assist your business in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Read additional details about Progent's CISA Accredited Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to validate an IT professional's skills to design, deploy, and support information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a range of risk assessment services such as:

  • Gather data and study documentation to help identify significant risk scenarios
  • Inventory statutory, regulatory, and business mandates and company standards related to your information system to determine their potential influence on your strategic objectives
  • Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
  • Develop a risk awareness program and conduct seminars to make sure your stakeholders understand IT risk so they can contribute to your risk management process
  • Connect key risk scenarios to related business processes to help determine risk ownership
  • Validate risk appetite with your senior management and major stakeholders to ensure they match
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Security Engineering Support
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to ensure that a certified professional possesses the knowledge appropriate to deliver support in important areas of network, information, and program security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit experts can help your company with:

Find out additional information about Progent's GIAC Information Assurance Services.

Talk to a Progent Security Engineer
To see how you can get in touch with a certified Progent security engineer for remote or on-premises help in Colorado, call 1-800-993-9400 or go to Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.