Business IT networks in Delaware can now get prompt and economical remote technical support from Progent's qualified security experts to assist with complex security problems. The cost is competitive, billing is by the minute, engagement is immediate, and support is world class. Progent also provides help for complex engagements that demand the services of seasoned security engineers with high-level industry certifications.

In case your Delaware office is situated away from larger metropolitan neighborhoods like Wilmington, Dover, or Newark, support from local qualified security experts is often limited during an emergency. This can result in lost productivity for your business, angry customers, idle employees, and defocused management. By contacting Progent's online services, you can get in touch with a qualified security professional ready to offer assistance whenever you need it to keep your network running and restore your data.

Progent can assist you in a variety of ways in your initiatives to defend your network with support services that ranges from network security assessments to developing a comprehensive security plan. Progent offers affordable support to help small and midsize companies to design and maintain protected IT environments based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that uses the technology of leading information security companies to provide web-based management and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further level of inspection for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.

Progent's security engineers are accessible remotely or on site to provide a variety of urgent or project-based network security services such as:

If your business has an urgent need for IT security help, refer to Progent's Urgent Online Network Support.

Progent's support professionals offer advanced services in key areas of system protection including security assessment, firewall/VPN support, and high-level security planning.

System Security Assessment
Progent's expert security consultants can assess the effectiveness of your existing network security implementation by performing comprehensive remote automated testing via advanced software tools and proven techniques. Progent's skill in administering this service saves your company time and money and assures an accurate picture of security holes. The knowledge your IT organization is provided can make up the foundation of a network protection plan that will allow your information system to operate safely and react quickly to future risks.

Automated Vulnerability Assessment
Progent offers expertise in the use of security evaluation products such as MBSA and GFI LANguard for affordably performing a set of automatic network testing scans to uncover potential security gaps. Progent has broad knowledge of other security auditing products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.

Progent can show you how to build protection into your business operations, install scanning applications, define and implement a protected system environment, and suggest policies to maximize the safety of your network. Progent's security consultants are able to help you set up a firewall, implement safe remote access to email and business applications, and install virtual private network. Find out more concerning Progent's automated security assessment.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory packages designed to allow small companies to receive an independent security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive test of your network from beyond your company firewall to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a system scan from a secure computer inside your firewall to determine your exposure to internal attacks. Both security inventory packages are set up and executed from a protected remote location. The project is managed by a consultant with top security accreditations and who generates a document that details and interprets the data collected by the scan and proposes cost-effective remediation where called for.

Stealth Security Penetration Analysis Consulting
Stealth penetration checking is an important part of any successful network security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your company's internal IT resources. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion detection warnings and event log monitoring are correctly set up and consistently checked. Learn additional information about Progent's stealth penetration analysis support services.

Firewall/VPN Solutions
Progent's expertise in network security technology includes extensive familiarity with major firewalls and Virtual Private Network technology from multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Support Services
Cisco's network security and offsite access technology offer a full range of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Learn additional information concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select the right products from a variety of suppliers to support your security goals while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading data security companies to deliver web-based control and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper level of inspection for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to guard endpoints and servers and VMs against modern malware assaults such as ransomware and email phishing, which easily escape traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to address the complete malware attack progression including blocking, identification, containment, cleanup, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and allows rapid recovery of critical files, applications and VMs that have become unavailable or corrupted as a result of hardware failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect information about your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or domains. By updating and organizing your IT infrastructure documentation, you can eliminate up to 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a common location for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Planning
Every business should develop a thoroughly considered security strategy that incorporates both proactive processes and response planning. The proactive strategy is a set of steps intended to minimize security weaknesses. The reactive strategy assists your company's IT security engineers to evaluate the impact resulting from an attack, repair the system, document the event, and get the IT network running as quickly as possible.

Progent's certified IS security consultants can to help your company to perform a comprehensive vulnerability assessment and create a network security plan to establish security policies and controls to reduce ongoing attacks and threats.

CISM Accredited Information Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and global standards of skill that IT security managers are expected to learn. CISM gives business management the confidence that consultants who have earned their CISM credential possess the background and capability to deliver effective security administration and consulting services. Progent can provide the expertise of CISM qualified security professionals to help companies with:

  • Network Security Strategies
  • Vulnerability Management
  • Network Security Program Management
  • IS Security Administration
  • Recovery Management
Read additional details concerning Progent's CISM Accredited Network Security Support Professionals.

CISSP Qualified Security Consulting Services
The CISSP credential denotes expertise with a worldwide standard for data security. ANSI has awarded the CISSP credential recognition in the field of information protection defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Read more information concerning Progent's CISSP Qualified IS Security Support Expertise.

ISSAP Qualified Secure IT Architecture Consulting Services
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP status as a result of thorough examination and significant experience with information security design. The ISSAP certification represents proven competence in the most complex demands of information system security architecture within the broader scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • BCP and DRP
  • Hardware Security
Learn additional details about Progent's ISSAP Accredited Secure Network Architecture Support Professionals.

CISA Accredited IS Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a prestigious achievement that represents expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential has consultants pass an extensive examination given by the ISACA professional association. Progent's CISA-certified network security audit engineers are available to assist your business with:

  • IS Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle
  • IT Support
  • Safeguarding Data Resources
  • Business Continuity Planning
Read more details concerning Progent's CISA Accredited Information System Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate an IT professional's ability to plan, implement, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk management engineers can provide a variety of risk evaluation services such as:

  • Gather information and study documentation to help identify major vulnerabilities
  • Inventory statutory, regulatory, and contractual mandates and organizational standards related to your information system to assess their potential influence on your business objectives
  • Identify possible threats for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and conduct seminars to make sure your organization appreciate information system risk so they can contribute to your risk control process
  • Match identified risk scenarios to related business processes to help determine risk ownership
  • Validate risk tolerance with executive management and key stakeholders to make sure they match
Find out more details concerning Progent's CRISC Experts.

GIAC Qualified Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to certify the skill of IT security engineers. GIAC's mission is to assure that a certified security consultant possesses the skills appropriate to deliver support in vital categories of network, data, and application program security. GIAC certifications are recognized by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified information security audit consultants can assist your company with:

  • Assessing Security Systems
  • Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Specialist
To see how you can access a certified security consultant for online or on-premises support in Delaware, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.