Company IT networks in the state of Colorado can depend on prompt and affordable remote technical support from Progent's accredited network security experts to help with the toughest security problems. The cost is competitive, charges are by the minute, engagement is fast, and service is unbeatable. Progent also offers assistance for complex projects that demand the expertise of seasoned security engineers with high-level security certifications.

If your Colorado organization is away from more populated metropolitan areas including Denver, Colorado Springs, Aurora, or Lakewood, the availability of local qualified security engineers may be problematic during an emergency. This can result in a drop in productivity for your company, angry clients, idle employees, and defocused management. By calling Progent's online services, you have access to a certified security professional who can deliver expertise when you require it to keep your system operating and recover your information.

Progent can assist you in all your initiatives to defend your information system with support services ranging from network security checks to developing a company-wide security strategy. Progent offers economical support to help small and midsize companies to set up and maintain secure networks powered by Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide centralized control and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also enable Exchange Server to track and protect internal email traffic that stays inside your security perimeter.

Progent's certified experts are available online or in person to provide a variety of emergency or longer-term IT security services including:

If your business has an urgent need for computer security support, refer to Progent's Urgent Remote Technical Support.

Progent's security experts can deliver advanced support in key fields of network protection including security assessment, firewall and VPN solutions, and high-level security planning.

System Security Audits
Progent's certified security consultants can evaluate the strength of your current computer protection environment by performing exhaustive remote automated analysis via advanced utilities and tested procedures. Progent's skill in this testing saves your company money and offers an accurate portrayal of security holes. The knowledge your company is provided can be used as the basis of a network protection plan that will allow your information system to run safely and react quickly to future threats.

Automated Vulnerability Analysis
Progent provides consulting in the application of security analysis software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a set of programmed system testing scans to uncover possible security vulnerabilities. Progent has extensive experience with additional security auditing tools such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can help you build security into your company processes, install auditing tools, plan and implement a protected network architecture, and suggest policies to maximize the security of your network. Progent's security engineers are available to help you configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Find out additional information about Progent's automated security analysis.

Security Inventory Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to enable small companies to get an independent security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a security expert administers a comprehensive test of your network from beyond your firewalled perimeter to uncover potential weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from a secure machine inside your firewall to evaluate vulnerabilities to internal assaults. The two security inventory services are configured and executed from a protected remote site. The process is managed by an engineer with top security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and suggests cost-effective improvements if called for.

Stealth Security Penetration Testing Consulting
Stealth penetration checking is an important component of any successful IT system security strategy. Progentís security professionals can run extensive penetration tests without the awareness of your organization's internal network support staff. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion incident alerts and event history analysis are properly set up and actively checked. Learn additional information about Progent's network penetration testing consulting.

Firewall and Virtual Private Network Support
Progent's expertise in network security technology encompasses extensive field work with major firewalls and Virtual Private Network (VPN) products from a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned important industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to plan, integrate, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and VPN Support Services
Cisco's network security and remote connection products provide a full range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Read additional details about Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Appliances.

Support Services for Other Firewall and VPN Solutions
Progent offers small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and select the right products from a variety of suppliers to support your security goals while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a selection of low-cost, set-price monthly managed services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to provide web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper level of analysis for inbound email. For outbound email, the onsite gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based machine learning technology to guard endpoints and servers and VMs against new malware attacks like ransomware and email phishing, which easily escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the entire threat lifecycle including filtering, infiltration detection, mitigation, remediation, and forensics. Key features include one-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of vital data, applications and virtual machines that have become lost or damaged due to hardware failures, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class expertise to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Security Design
Every business ought to have a carefully considered security strategy that incorporates both pre-attack procedures and response planning. The proactive plan is a set of steps intended to reduce vulnerabilities. The post-attack plan assists your company's network security engineers to assess the damage caused by an attack, fix the system, record the event, and get the IT network running as rapidly as feasible.

Progent's certified IS security consultants can to assist your company to perform a complete vulnerability evaluation and create a network security strategy to implement security processes and mechanisms to reduce future attacks and dangers.

CISM Certified Security Support Assistance
The CISM organization defines the basic capabilities and worldwide standards of skill that information security managers are expected to master. CISM gives executive management the assurance that consultants who have earned their CISM certification have the experience and capability to deliver effective security administration and consulting consulting. Progent can provide the expertise of CISM qualified security consultants to assist companies with:

  • Network Security Governance
  • Vulnerability Analysis
  • IS Security Program Management
  • Information Security Administration
  • Response Management
Find out more details about Progent's CISM Information Security Support Professionals.

CISSP Accredited Security Engineering Assistance
CISSP denotes mastery of a global standard for data security. The American National Standards Institute has granted the CISSP credential recognition in the area of data security defined by ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Find out more details concerning Progent's CISSP Accredited Information Security Engineering Professionals.

ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's ISSAP certified network architecture professionals are consultants who have earned ISSAP status through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the most in-depth demands of information system security architecture within the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Phone System and Network Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Read more details concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Professionals.

CISA Qualified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a recognized qualification that represents mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test given by the ISACA international professional association. Progent's CISA security audit specialists are available to assist your IT organization with:

  • IS Audit Process
  • IT Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Get more details about Progent's CISA Certified Information System Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's ability to plan, deploy, and maintain IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and carry out a workplace continuity plan that follows leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management specialists can provide a variety of risk evaluation services such as:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Inventory legal, regulatory, and contractual mandates and company policies related to your network to determine their potential impact on your strategic goals
  • Identify possible threats for your business workflows to assist in evaluating your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IT risk so they can assist with your risk management process
  • Match key risk vectors to your associated business processes to help determine risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to make sure they are in agreement
Get additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to make sure that an accredited professional has the skills appropriate to deliver support in important categories of system, data, and application software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified information security audit experts are available to assist your company with:

  • Auditing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Specialist
To find out how to access a security consultant for online or onsite expertise in Colorado, call 1-800-993-9400 or go to Online Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.