Company networks in the state of Delaware can depend on quick and economical online technical support from Progent's accredited security professionals to resolve the toughest security problems. The cost is competitive, charges are by the minute, sign-up is immediate, and support is unbeatable. Progent also provides assistance for complex projects that demand the expertise of seasoned security engineers with high-level security certifications.

If your Delaware business is located some distance from major metropolitan neighborhoods like Wilmington, Dover, or Newark, access to local certified security experts may be problematic when there's a crisis. This can result in a loss of productivity for your business, upset customers, idle employees, and defocused executives. By utilizing Progent's remote support, you can get in touch with a certified security professional ready to provide expertise whenever you need it to keep your system on line and recover your information.

Progent can assist you in all your efforts to guard your information system with support that ranges from network security audits to creating a comprehensive security strategy. Progent provides affordable support to help businesses of all sizes to set up and manage secure networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to provide web-based control and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's certified engineers are accessible online or on premises to provide a range of emergency or project-based IT security services including:

If your network has an emergency need for IT security help, refer to Progent's Urgent Online Technical Help.

Progent's engineers can deliver advanced support in vital areas of computer protection that include auditing, firewalls and VPN, and high-level security planning.

System Security Audits
Progent's expert security engineers can assess the effectiveness of your current network protection implementation by performing exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's experience in administering this testing saves your company consulting fees and assures a detailed picture of system vulnerability. The knowledge your company gains can be used as the basis of a security plan that can allow your network to run dependably and adapt rapidly to new threats.

Automated Vulnerability Audits
Progent offers expertise in the use of security auditing software including Microsoft's MBSA and GFI LANguard for affordably performing a variety of programmed network testing checks to identify possible security weaknesses. Progent has broad knowledge of other network auditing products such as NMAP, AMAP, eEye Vulnerability Scanner, as well as utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build security into your company processes, configure scanning software, plan and deploy a protected system environment, and suggest policies to maximize the safety of your network. Progent's security engineers are able to show you how to set up a firewall, implement secure remote access to email and data, and integrate VPN. Learn more concerning Progent's automated security audits.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages intended to allow small companies to receive an impartial network security assessment from a certified security expert. With Progent's External Network Security Inventory Scan, an engineer administers a comprehensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a system scan from an authorized machine inside your company firewall to uncover vulnerabilities to inside assaults. The two security inventory services are set up and executed from a protected remote site. The project is directed by a consultant with top security credentials and who produces a document that summarizes and interprets the information collected by the security scan and proposes cost-effective remediation if appropriate.

Network Intrusion Analysis Support Services
Stealth intrusion testing is an important component of any successful IT system security strategy. Progentís security professionals can run extensive penetration tests without the awareness of your company's internal IT resources. Unannounced penetration checking shows whether existing security defense tools such as intrusion detection alerts and event log analysis are properly set up and actively checked. Learn additional information on Progent's network security penetration analysis support services.

Firewall and Virtual Private Network Solutions
Progent's background in security technology encompasses in-depth field work with leading firewalls and VPN products from multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with important industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to manage your existing PIX or ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower Services integration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and remote connection technology represent a complete line of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Learn additional information about Progent's Engineering Expertise for Cisco Security Solutions and VPN Products.

Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security plan and choose appropriate technologies from a variety of suppliers to achieve your security goals while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-based AV tools. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to address the complete threat lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent managed from a single console. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP environment that meets your company's specific needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also assist you to install and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of critical files, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to provide web-based control and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard combines cloud-based filtering with a local gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported immediately to an alternate hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can save as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Design
Every company ought to have a thoroughly considered security program that includes both proactive procedures and reaction planning. The pre-attack plan is a set of steps designed to reduce security weaknesses. The reactive plan assists your company's IT security engineers to evaluate the impact resulting from an attack, fix the network, document the experience, and get the IT network restored as quickly as feasible.

Progent's certified IS security consultants can to assist you to run a complete risk evaluation and create a computer security plan to implement security policies and controls to reduce future assaults and dangers.

CISM Qualified Information Security Consulting Expertise
The CISM organization defines the core competencies and worldwide standards of skill that IT security managers are expected to master. It provides executive management the assurance that consultants who have earned their CISM credential possess the background and knowledge to deliver efficient security administration and support consulting. Progent offers the support of CISM certified security consultants to assist businesses with:

  • Information Security Governance
  • Risk Management
  • Network Security Program Management
  • Information Security Management
  • Recovery Planning
Learn additional information concerning Progent's CISM IS Security Engineering Expertise.

CISSP Accredited Security Engineering Support
CISSP recognizes mastery of a global standard for network security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of information security stipulated by ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Learn more details about Progent's CISSP Accredited IS Security Support Services.

ISSAP Certified Secure Information System Architecture Engineering Assistance
Progent's ISSAP certified IT architecture professionals are consultants who have earned ISSAP status as a result of rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the more complex demands of information system security architecture bounded by the broader field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecom and Network Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Guidelines
  • BCP and DRP
  • Physical Security
Find out more details about Progent's ISSAP Accredited Secure IT Architecture Engineering Services.

CISA Accredited IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a globally recognized qualification that signifies mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive examination administered by the ISACA international professional group. Progent's CISA-certified network security audit experts are available to assist your company in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Information Assets
  • Disaster Recovery Preparedness
Get additional details concerning Progent's CISA Accredited IS Security Auditing Consulting Services.

CRISC Consultants
The CRISC certification program was initiated by ISACA to verify an IT professional's ability to plan, deploy, and support IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a workplace continuity plan that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation experts can provide a variety of risk identification services including:

  • Gather information and study documentation to identify major vulnerabilities
  • Inventory statutory, industry, and business requirements and company standards related to your network to assess their potential influence on your business goals
  • Identify potential threats for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness program and provide seminars to ensure your organization understand IS risk so they can assist with your risk management program
  • Match identified risk vectors to your associated operational procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to ensure they match
Get more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Engineering Services
Global Information Assurance Certification was founded in 1999 to certify the knowledge of network security experts. GIAC's mission is to verify that an accredited professional possesses the knowledge needed to provide services in important categories of system, information, and software security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. NSA. Progent's GIAC information security audit specialists can help your IT organization in the areas of:

  • Auditing Networks
  • Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Engineer
To find out how to access a certified Progent security engineer for remote or onsite support in Delaware, phone 1-800-993-9400 or go to Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.