Small business networks in the state of Colorado can now get fast and economical online help from Progent's certified security engineers to fix the toughest security issues. Rates are competitive, billing is by the minute, sign-up is immediate, and support is unbeatable. Progent also offers help for complex projects that demand the services of seasoned security engineers with top security credentials.

If your Colorado network is situated away from more populated metropolitan neighborhoods including Denver, Colorado Springs, Aurora, or Lakewood, access to nearby certified network security support specialists is often limited when there's a security disaster. This can cause a drop in income for your business, angry clients, unproductive employees, and defocused executives. By calling Progent's online services, you have access to a certified security professional ready to offer assistance when you need it to get your computer network running and restore your data.

Progent can help you at any level in your initiatives to guard your information system with services ranging from network security checks to creating a company-wide security strategy. Progent offers affordable service to help small and midsize companies to configure and manage secure IT environments powered by Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security vendors to deliver centralized control and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of inspection for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter.

Progent's certified engineers are accessible remotely or in person to provide a range of emergency or project-based IT security services including:

If your network has an emergency requirement for IT security support, refer to Progent's Emergency Online Network Support.

Progent's security experts provide world-class services in key fields of system security including analysis, firewalls and VPN, and high-level security planning.

Security Audits
Progent's expert security engineers can evaluate the effectiveness of your current network security implementation by performing exhaustive remote automated testing via advanced software tools and proven techniques. Progent's experience in administering this service saves your company money and assures a detailed picture of security holes. The knowledge your IT organization is provided can form the basis of a network protection strategy that will allow your information system to operate safely and adapt quickly to future threats.

Automated Security Audits
Progent offers consulting in the application of security analysis products including Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a variety of automatic system auditing scans to uncover possible security gaps. Progent has broad knowledge of additional network analysis tools such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you build protection into your company operations, configure auditing tools, define and implement a protected network architecture, and suggest procedures to optimize the security of your IT system. Progent's security consultants are able to show you how to configure a firewall, implement safe remote connectivity to email and business applications, and install VPN. Learn additional information on Progent's network security analysis.

Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory bundles designed to allow small businesses to get a professional security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your network from outside your firewalled perimeter to determine possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from a secure machine within your firewall to assess the risk to inside attacks. The two security inventory packages are configured and executed from a protected remote site. The project is directed by an engineer with high-level security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and suggests cost-effective improvements where called for.

Network Penetration Analysis Support Services
Stealth intrusion testing is a key part of any serious network security plan. Progent’s security experts can run thorough penetration tests without the awareness of your company's in-house IT resources. Unannounced penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event history analysis are correctly configured and actively checked. Find out additional information concerning Progent's network security penetration analysis support services.

Firewalls and VPN Expertise
Progent's background in security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with important networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and offsite access products represent a complete range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company goals. Find out additional information concerning Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies including WatchGuard, Juniper, and SonicWALL. Progent can help you design a comprehensive security strategy and select appropriate technologies from multiple vendors to support your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based machine learning technology to guard endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to address the entire threat progression including blocking, identification, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services offer ultra-affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, device management, and web filtering through cutting-edge tools packaged within a single agent managed from a single console. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that allows you demonstrate compliance with government and industry information protection regulations. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent's consultants can also help you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical files, apps and virtual machines that have become lost or damaged as a result of component failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security companies to provide centralized management and world-class security for all your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of analysis for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported easily to a different hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and safeguard data about your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to half of time spent looking for vital information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to develop a thoroughly considered security strategy that includes both pre-attack processes and response planning. The proactive strategy is a collection of steps intended to reduce vulnerabilities. The reactive plan assists your company's security engineers to evaluate the impact caused by a security penetration, fix the damage, record the event, and get business functions operational as soon as possible.

Progent's expert information security consultants are available to help your company to perform a complete risk assessment and define a computer security strategy to implement security processes and mechanisms to mitigate ongoing assaults and dangers.

CISM Certified Security Consulting Services
The CISM organization describes the basic capabilities and worldwide standards of skill that information security professionals are expected to learn. CISM provides business management the assurance that those who have earned their CISM credential have the experience and knowledge to provide effective security administration and support consulting. Progent can provide the expertise of CISM certified security professionals to assist companies with:

  • Information Security Strategies
  • Risk Management
  • Information Security Program Management
  • Information Security Administration
  • Response Management
Find out additional details concerning Progent's CISM Accredited Information Security Support Professionals.

CISSP Certified Security Consulting Expertise
CISSP certification recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data protection defined by ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your business in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Read more information about Progent's CISSP-certified Information Security Support Services.

CISSP-ISSAP Accredited Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP certified information system architecture engineers are experts who have been awarded ISSAP status as a result of thorough examination and extensive experience with information security design. The ISSAP certification represents demonstrated skill in the most challenging requirements of information security architecture within the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and DRP
  • Hardware Security
Read more details concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.

CISA Certified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a prestigious achievement that indicates mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass an extensive test given by the ISACA international professional association. Progent's CISA-qualified security audit engineers can assist your company in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Assets
  • Disaster Recovery Planning
Find out additional details concerning Progent's CISA Qualified IS Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to validate an IT professional's skills to plan, implement, and maintain IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity plan that follows industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation engineers offer a variety of risk evaluation services including:

  • Gather data and review documentation to help identify major vulnerabilities
  • Identify legal, regulatory, and contractual requirements and company standards related to your information system to determine their possible influence on your business goals
  • Identify possible threats for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to ensure your stakeholders understand information system risk so they can contribute to your risk control program
  • Match key risk scenarios to your associated business processes to help determine risk ownership
  • Determine risk tolerance with executive management and major stakeholders to ensure they match
Find out additional details about Progent's CRISC Risk Management Experts.

GIAC Accredited Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to assure that a certified professional has the knowledge necessary to provide support in key areas of system, data, and application security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified network security audit experts can help your company in the areas of:

Learn additional details about Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Expert
To see how to get in touch with a Progent security consultant for remote or onsite help in Colorado, call 1-800-993-9400 or visit Remote Network Support.

© 2002- 2019 Progent Corporation. All rights reserved.