Company computer networks in Delaware can now get quick and economical online help from Progent's accredited network security consultants to assist with critical security problems. Rates are reasonable, charges are per minute, engagement is quick, and support is world class. Progent also provides help for complex engagements that requires the knowledge of seasoned security consultants with top security certifications.

If your Delaware business is based outside of larger metropolitan neighborhoods like Wilmington, Dover, or Newark, contact with nearby certified network security support specialists is often limited during an urgent situation. This can result in a drop in revenue for your company, angry clients, unproductive employees, and distracted management. By utilizing Progent's online services, you have access to a qualified security professional who can deliver help when you require it to get your computer network on line and recover your information.

Progent can assist you at any level in your efforts to guard your network with services that ranges from security assessments to developing a company-wide security plan. Progent offers economical support to assist small and midsize companies to set up and manage protected IT environments powered by Microsoft Windows and Cisco products and that may include computers running UNIX or Linux platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to deliver centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter.

Progent's security professionals are accessible online or on premises to provide a variety of urgent or longer-term IT security services such as:

If your business has an immediate requirement for IT security support, go to Progent's Emergency Remote Technical Support.

Progent's consultants offer advanced support in key facets of computer security that include security evaluation, firewall and VPN expertise, and advanced security planning.

Security Audits
Progent's certified security consultants can evaluate the vulnerability of your existing computer protection implementation through comprehensive remote automated analysis based on advanced utilities and tested procedures. Progent's skill in this service saves you consulting fees and assures an accurate picture of security holes. The information your IT organization is provided can make up the foundation of a network protection strategy that will permit your information system to run safely and respond rapidly to future threats.

Automated Network Vulnerability Evaluation
Progent offers consulting in the application of security auditing utilities including Microsoft Baseline Security Analyzer and GFI LANguard for economically running a variety of programmed network auditing scans to identify potential security weaknesses. Progent has extensive knowledge of additional security auditing products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you build protection into your company processes, configure scanning tools, define and deploy a protected system environment, and recommend policies to maximize the safety of your network. Progent's security engineers are able to help you configure a firewall, design secure remote access to email and business applications, and install virtual private network. Find out additional information concerning Progent's network security analysis.

Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles designed to enable small businesses to receive an objective network security assessment from an accredited security specialist. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive test of your network from outside your firewall to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from an authorized computer within your firewall to assess the risk to internal attacks. The two security inventory packages are configured and executed from a secured external location. The process is overseen by a consultant with high-level security credentials and who generates a document that details and analyzes the data collected by the scan and proposes practical remediation where appropriate.

Network Intrusion Analysis Consulting
Stealth intrusion checking is an important component of any comprehensive IT system security strategy. Progentís security experts can run extensive intrusion checks without the knowledge of your organization's in-house network support resources. Unannounced penetration testing shows whether existing security defense tools such as intrusion detection alerts and event history monitoring are correctly set up and actively checked. Learn additional information concerning Progent's network penetration testing consulting.

Firewall/VPN Expertise
Progent's expertise in security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote connection technology provide a comprehensive range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business objectives. Find out more information about Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select appropriate products from a variety of vendors to support your security objectives while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security companies to deliver web-based management and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a deeper level of inspection for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to automate the complete threat lifecycle including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of critical files, applications and virtual machines that have become lost or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can provide world-class support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical data. Read more about ProSight DPS Managed Backup.

Certified Security Design
Every business should have a carefully considered security program that includes both proactive processes and response plans. The proactive plan is a collection of procedures that help to minimize security weaknesses. The reactive strategy assists your company's network security personnel to assess the damage resulting from an attack, fix the network, record the experience, and get business functions running as rapidly as possible.

Progent's expert IT security engineers are available to assist your business to run a comprehensive vulnerability evaluation and create a computer security strategy to implement security policies and mechanisms to reduce future attacks and threats.

CISM Qualified Information Security Engineering Services
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of performance that IT security professionals are expected to master. It gives business management the confidence that consultants who have qualified for their CISM certification have the background and capability to deliver effective security administration and support services. Progent can provide the expertise of CISM certified security consultants to assist businesses with:

  • Network Security Processes
  • Risk Analysis
  • Network Security Implementation Management
  • Information Security Administration
  • Response Planning
Read additional details about Progent's CISM Qualified Security Support Expertise.

CISSP Accredited Security Consulting Support
CISSP certification denotes mastery of a global standard for network security. ANSI has granted the CISSP credential recognition in the area of information protection defined by ISO 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Read additional information about Progent's CISSP Qualified Security Support Professionals.

ISSAP Qualified Secure System Architecture Engineering Services
Progent's ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP status through thorough testing and extensive experience with information security architecture. The ISSAP certification indicates demonstrated skill in the more challenging requirements of information security architecture bounded by the wider scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Read additional details about Progent's ISSAP Certified Secure Information System Architecture Consulting Expertise.

CISA Accredited Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA professional association. Progent's CISA information security audit specialists are available to assist your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Infrastructure Planned Useful Life
  • IT Support
  • Safeguarding Data Resources
  • Business Continuity Planning
Learn additional details about Progent's CISA Qualified Network Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to validate an IT professional's skills to design, implement, and maintain information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity plan that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers can provide a variety of risk evaluation services including:

  • Gather data and study documentation to help identify significant vulnerabilities
  • Identify statutory, industry, and contractual requirements and organizational policies related to your network to assess their potential influence on your business goals
  • Identify potential vulnerabilities for your business processes to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct training to ensure your organization appreciate information system risk so they can assist with your risk management program
  • Connect identified risk scenarios to your associated business procedures to help determine risk ownership
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Read more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Engineering Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security professionals. GIAC's mission is to assure that an accredited professional possesses the skills appropriate to provide support in vital areas of system, information, and application program security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified IS security audit engineers are available to help your business with:

Read more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Security Expert
To find out how to get in touch with a certified security consultant for online or on-premises help in Delaware, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.