Company networks in Delaware can now get prompt and affordable online help from Progent's accredited security engineers to assist with urgent security issues. Rates are reasonable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also offers assistance for complex engagements that requires the expertise of senior security consultants with high-level industry certifications.

In case your Delaware company is located some distance from more populated metropolitan areas like Wilmington, Dover, or Newark, access to nearby certified security consultants may be problematic when you have a crisis. This can cause lost revenue for your business, upset customers, unproductive workers, and distracted management. By calling Progent's online services, you can get in touch with a certified security consultant who can deliver expertise whenever you require it to keep your information system running and restore your data.

Progent can assist you in a variety of ways in your efforts to defend your network with support that ranges from security audits to creating a comprehensive security strategy. Progent provides affordable support to help businesses of all sizes to design and maintain secure networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux operating systems plus mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to provide centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further level of inspection for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified professionals are available online or on premises to provide a variety of emergency or project-based network security services including:

  • Perform automated security audits
  • Clean up quickly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Configure safe techniques for remote and mobile connectivity
  • Deploy advanced solutions for automatic defense against spam and directory harvest attacks
  • Develop a comprehensive security strategy with 24x7 security monitoring
  • Offer outsourced Call Center Services
  • Develop an effective data backup and business continuity solution built around Data Protection Manager automated backup technology
If your network has an emergency need for IT security support, go to Progent's Emergency Remote Network Help.

Progent's engineers offer advanced support in vital fields of system security including analysis, firewall/VPN support, and high-level security consulting.

System Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection implementation by performing comprehensive remote automated analysis based on advanced utilities and tested procedures. Progent's experience in this service saves you time and money and assures an accurate picture of gaps. The knowledge your company is provided can be used as the basis of a network protection plan that can permit your information system to run safely and respond rapidly to future threats.

Automated Network Vulnerability Analysis
Progent offers consulting in the application of security evaluation utilities including MBSA and GFI LANguard Network Security Scanner for economically running a set of programmed network auditing checks to identify potential security weaknesses. Progent has broad knowledge of other security analysis products such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to build protection into your business operations, install auditing tools, define and implement a protected system environment, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are able to show you how to configure a firewall, design safe remote access to email and data, and integrate VPN. Learn more on Progent's network security assessment.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles designed to allow small businesses to get an impartial security evaluation from a certified security engineer. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized machine inside your firewall to evaluate vulnerabilities to internal assaults. The two security inventory packages are configured and executed from a protected remote site. The project is managed by a consultant with high-level security accreditations and who produces a report that summarizes and interprets the information collected by the security scan and suggests cost-effective improvements where appropriate.

Stealth Penetration Testing Support Services
Stealth penetration testing is a key component of any serious IT system security strategy. Progent’s security experts can perform extensive intrusion checks without the knowledge of your organization's in-house IT staff. Stealth penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are properly set up and actively checked. Learn additional information on Progent's stealth penetration analysis support services.

Firewalls and VPN Support
Progent's background in network security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access products provide a comprehensive range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Read more details about Progent's Support Services for Cisco Security and VPN Products.

Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper, and Symantec. Progent can help you create a detailed security strategy and choose the right products from a variety of suppliers to achieve your security goals while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based machine learning technology to guard endpoints and servers and VMs against new malware assaults like ransomware and email phishing, which easily evade legacy signature-matching AV tools. ProSight ASM protects local and cloud resources and offers a unified platform to manage the entire malware attack lifecycle including filtering, detection, mitigation, remediation, and forensics. Key capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to security threats from all vectors. ProSight ESP provides firewall protection, penetration alarms, device management, and web filtering through leading-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP deployment that addresses your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry data security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent action. Progent's consultants can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup processes and enables rapid recovery of critical files, applications and virtual machines that have become lost or corrupted due to component breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to provide centralized management and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with a local gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or domains. By updating and organizing your IT infrastructure documentation, you can save as much as 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you’re planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Consulting
Any business ought to have a thoroughly considered security program that includes both pre-attack procedures and reaction planning. The proactive plan is a collection of steps that help to minimize vulnerabilities. The post-attack plan helps your company's IT security personnel to evaluate the damage resulting from an attack, fix the damage, document the event, and get the IT network operational as soon as feasible.

Progent's certified IS security engineers can to help you to run a complete risk evaluation and define a network security plan to establish security processes and mechanisms to mitigate ongoing assaults and dangers.

CISM Certified Security Support Services
The CISM organization describes the basic capabilities and global standards of skill that IT security managers are expected to learn. It provides business management the confidence that consultants who have qualified for their CISM credential possess the background and capability to deliver effective security management and consulting services. Progent can provide the services of CISM certified security professionals to assist companies with:

  • Information Security Strategies
  • Risk Management
  • Information Security Program Management
  • Information Security Administration
  • Recovery Management
Learn more details concerning Progent's CISM Certified Network Security Engineering Services.

CISSP Qualified Security Engineering Assistance
The CISSP credential recognizes mastery of an international standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data security under ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a variety security areas such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Learn more details concerning Progent's CISSP-certified Network Security Consulting Expertise.

CISSP-ISSAP Certified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP certified system architecture professionals are consultants who have been awarded ISSAP status through rigorous examination and significant experience with information security design. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the most challenging requirements of information security architecture within the broader field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecom and System Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read more details concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Services.

CISA Qualified Security Auditing Consulting Support
The Certified Information Systems Auditor credential is an important achievement that signifies expertise in network security auditing. Accredited by ANSI, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA professional group. Progent's CISA-qualified network security audit engineers are available to help your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Assets
  • Business Continuity Planning
Find out additional information about Progent's CISA Accredited IS Security Auditing Engineering Expertise.

CRISC Experts
The CRISC certification program was initiated by ISACA to validate an IT professional's ability to design, implement, and maintain IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC network risk management specialists can provide a variety of risk identification services such as:

  • Collect information and study documentation to identify significant vulnerabilities
  • Identify legal, regulatory, and contractual mandates and organizational policies associated with your network to assess their potential impact on your strategic goals
  • Identify possible threats for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness program and provide training to ensure your stakeholders understand IT risk so they can contribute to your risk control process
  • Match key risk scenarios to your associated business processes to help determine risk ownership
  • Determine risk tolerance with your senior management and major stakeholders to make sure they align
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Information System Security Engineering Expertise
GIAC was established in 1999 to validate the skill of computer security experts. GIAC's mission is to ensure that a certified professional possesses the knowledge necessary to provide services in critical categories of system, data, and software security. GIAC certifications are acknowledged by companies and institutions around the world including and the U.S. NSA. Progent's GIAC-certified information security audit engineers can help your company with:

Find out additional information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Engineer
To see how you can access a Progent security consultant for online or onsite assistance in Delaware, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.