Small business networks in the state of Delaware can now get fast and affordable remote access to Progent's certified security experts to help with urgent security issues. The cost is reasonable, charges are by the minute, engagement is immediate, and support is world class. Progent also provides assistance for long-term projects that demand the services of senior security consultants with high-level industry certifications.

In case your Delaware company is situated some distance from major urban areas including Wilmington, Dover, or Newark, the availability of nearby accredited network security consultants could be limited when there's a security disaster. This can cause a loss of revenue for your business, upset customers, idle employees, and distracted executives. By calling Progent, you have access to a certified security engineer who can provide help when you need it to keep your information system operating and salvage your information.

Progent can assist you in all your initiatives to defend your network with support services ranging from security assessments to developing a company-wide security strategy. Progent offers affordable support to help companies of any size to set up and manage safe IT environments powered by Microsoft Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide web-based control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a further level of inspection for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's certified experts are available remotely or on site to provide a variety of emergency or longer-term computer security services including:

  • Perform automated network security evaluations
  • Recover rapidly after attacks
  • Install and troubleshoot firewalls
  • Configure secure techniques for remote and mobile access
  • Install effective applications for automatic defense against viruses, spam and DHAs
  • Develop a company-wide security strategy with proactive network monitoring
  • Offer outsourced Help Desk Support
  • Create an effective data backup and disaster recovery plan built around Data Protection Manager backup/restore capability
If your business has an immediate requirement for IT security support, refer to Progent's Urgent Online Network Help.

Progent's security experts offer advanced support in vital areas of network security including security evaluation, firewalls and VPN, and high-level security consulting.

System Security Assessment
Progent's certified security consultants can assess the effectiveness of your existing computer security implementation by performing exhaustive remote automated analysis based on advanced utilities and tested procedures. Progent's experience in this testing saves you money and assures an accurate portrayal of system vulnerability. The knowledge your company gains can make up the foundation of a security plan that will allow your information system to operate dependably and react quickly to future threats.

Automated Network Vulnerability Evaluation
Progent provides expertise in the use of security analysis products such as Microsoft's MBSA and LANguard from GFI for affordably performing a set of programmed network testing scans to identify potential security weaknesses. Progent has extensive knowledge of additional security auditing products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can show you how to build protection into your company processes, install scanning tools, define and deploy a secure system environment, and recommend procedures to maximize the safety of your network. Progent's security engineers are available to help you set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Find out additional information about Progent's automated security audits.

Security Inventory Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to allow small businesses to receive a professional network security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, a security engineer runs an extensive test of your network from beyond your company firewall to uncover possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from a secure computer within your firewall to evaluate the risk to internal attacks. The two security inventory services are set up and run from a protected remote site. The process is overseen by an engineer who has earned top security credentials and who produces a report that summarizes and analyzes the data collected by the security scan and suggests practical improvements if appropriate.

Network Penetration Testing Consulting
Stealth intrusion testing is a key part of any comprehensive IT system security strategy. Progentís security professionals can perform thorough penetration checks without the knowledge of your organization's in-house IT staff. Stealth penetration checking uncovers whether current security monitoring tools such as intrusion incident alerts and event history monitoring are correctly set up and actively checked. Find out additional information on Progent's network security penetration analysis support services.

Firewall/VPN Solutions
Progent's background in security technology includes extensive familiarity with major firewalls and Virtual Private Network technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to manage your legacy PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, tune, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower configuration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's security and remote connection products offer a complete range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Learn additional information concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Products.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select the right technologies from a variety of vendors to support your security goals while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent offers a selection of affordable, fixed-price monthly services intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to deliver centralized control and world-class security for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis tools to guard endpoints as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely get by traditional signature-matching AV products. ProSight ASM protects local and cloud-based resources and offers a single platform to automate the entire malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and forensics. Top features include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates and monitors your backup processes and enables rapid restoration of critical files, apps and virtual machines that have become unavailable or damaged due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide world-class expertise to configure ProSight Data Protection Services to be compliant with regulatory requirements like IPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

Expert Network Security Planning
Every company should have a carefully considered security program that includes both proactive processes and reaction plans. The proactive strategy is a collection of mechanisms designed to reduce security weaknesses. The reactive plan assists your company's security personnel to evaluate the impact resulting from a security penetration, repair the system, document the event, and get the IT network running as rapidly as possible.

Progent's certified information security consultants can to assist you to perform a complete vulnerability evaluation and create a network security strategy to implement security processes and mechanisms to reduce ongoing attacks and dangers.

CISM Certified Security Consulting Expertise
The CISM committee defines the core capabilities and global standards of skill that information security professionals are required to master. It gives executive management the confidence that those who have earned their CISM certification have the experience and knowledge to provide effective security management and support services. Progent offers the expertise of CISM certified security professionals to assist companies with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Program Management
  • Information Security Administration
  • Response Management
Learn more information concerning Progent's CISM Accredited Network Security Support Professionals.

CISSP Accredited Security Engineering Support
CISSP certification recognizes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of data security under ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a variety security fields including:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Read additional details concerning Progent's CISSP Accredited IS Security Support Services.

ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's ISSAP qualified network architecture professionals are consultants who have been awarded ISSAP status through rigorous examination and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the more in-depth requirements of information security architecture bounded by the wider field of IS security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Infrastructure Security
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Read more details about Progent's ISSAP Qualified Secure IT Architecture Support Expertise.

CISA Accredited Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a prestigious achievement that signifies expertise in IS security auditing. Certified by ANSI, the CISA accreditation has candidates undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA-certified security audit consultants can assist your IT organization with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Planning
Get the details concerning Progent's CISA Certified Network Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to verify an IT professional's ability to plan, implement, and support IS controls to reduce network risk. Progent can provide the services of a CRISC-certified engineer to help you to create and execute a workplace continuity plan that follows industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk mitigation engineers can provide a range of risk identification services including:

  • Gather data and study documentation to evaluate major risk scenarios
  • Identify legal, regulatory, and contractual requirements and company policies related to your information system to determine their possible impact on your business goals
  • Point out possible threats for your operational workflows to help in evaluating your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization appreciate IT risk so they can contribute to your risk management program
  • Connect identified risk scenarios to your associated business procedures to help assign risk ownership
  • Validate risk appetite with executive management and major stakeholders to ensure they are in agreement
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Expertise
GIAC was established in 1999 to validate the skill of computer security experts. GIAC's mission is to make sure that a certified security consultant has the skills appropriate to deliver services in vital categories of system, data, and application software security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC IS security audit experts can help your business with:

  • Auditing Perimeters
  • Security Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Learn additional details about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Expert
To find out how to get in touch with a Progent security consultant for online or on-premises support in Delaware, call 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.