Company networks in Delaware can now get fast and affordable remote access to Progent's qualified network security support specialists to assist with complex security issues. The cost is competitive, charges are by the minute, sign-up is fast, and support is unbeatable. Progent also provides help for complex engagements that requires the services of senior security consultants with top security credentials.

If your Delaware network is based far from larger urban neighborhoods such as Wilmington, Dover, or Newark, access to local qualified network security professionals is often limited during an urgent situation. This can result in a drop in productivity for your company, upset customers, idle workers, and defocused executives. By calling Progent, you have access to a certified security professional who can deliver assistance when you need it to get your information system running and salvage your information.

Progent can assist you in a variety of ways in your initiatives to defend your IT environment with services ranging from security audits to developing a company-wide security plan. Progent offers affordable service to assist companies of any size to design and maintain secure IT environments powered by Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security vendors to deliver web-based management and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also help Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's security professionals are accessible remotely or on site to provide a range of urgent or longer-term network security services including:

If your network has an urgent requirement for computer security help, go to Progent's Emergency Online Network Support.

Progent's security experts offer world-class services in vital facets of computer security including auditing, firewall and VPN expertise, and advanced security planning.

System Security Assessment
Progent's expert security engineers can evaluate the effectiveness of your existing computer security systems by performing exhaustive remote automated testing based on sophisticated software tools and proven techniques. Progent's skill in administering this service saves you time and money and offers an accurate picture of security holes. The information your IT organization gains can be used as the basis of a network protection strategy that will permit your information system to operate safely and react rapidly to new risks.

Automated Security Evaluation
Progent offers expertise in the use of security analysis packages such as MBSA and GFI LANguard Network Security Scanner for affordably performing a set of programmed network testing checks to identify possible security gaps. Progent has broad experience with additional network analysis utilities including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can help you build security into your company operations, install auditing applications, define and deploy a protected system architecture, and suggest policies to maximize the safety of your network. Progent's security consultants are ready to help you configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Find out more on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages intended to allow small companies to get a professional security assessment from an accredited security consultant. With Progent's External Network Security Inventory Checkup, an engineer administers an extensive test of your network from beyond your company firewall to determine possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from an authorized machine inside your company firewall to determine vulnerabilities to inside threats. The two security inventory packages are configured and executed from a secured remote location. The process is overseen by an engineer who has earned high-level security accreditations and who produces a document that summarizes and analyzes the information captured by the security scan and suggests practical remediation where appropriate.

Network Security Penetration Analysis Consulting
Stealth penetration testing is a key component of any successful network security strategy. Progent’s security professionals can run thorough intrusion tests without the awareness of your company's in-house network support resources. Unannounced penetration testing shows whether current security monitoring systems such as intrusion incident warnings and event history analysis are correctly configured and actively checked. Find out additional information on Progent's stealth penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's background in security technology includes extensive familiarity with leading firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your existing PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote connection technology represent a comprehensive range of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Learn additional details concerning Progent's Engineering Expertise for Cisco Security Solutions and VPN Appliances.

Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security strategy and select the right products from multiple suppliers to support your security goals while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior analysis technology to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to manage the entire threat lifecycle including protection, detection, containment, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP environment that addresses your organization's unique needs and that allows you prove compliance with legal and industry information protection standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also assist your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates your backup processes and enables rapid recovery of critical files, applications and virtual machines that have become unavailable or corrupted due to component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email that stays inside your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure Tier III data center on a fast virtual host configured and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can save as much as half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether you’re planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Planning
Every company should have a thoroughly considered security program that incorporates both preventive procedures and response planning. The proactive plan is a set of steps that help to minimize security weaknesses. The post-attack strategy assists your company's IT security personnel to assess the impact resulting from a security penetration, repair the system, document the experience, and get business functions running as quickly as feasible.

Progent's expert IS security consultants are available to assist you to run a full vulnerability evaluation and define a network security strategy to implement security processes and controls to reduce ongoing assaults and threats.

CISM Accredited System Security Support Expertise
The CISM committee describes the core capabilities and international standards of skill that information security managers are expected to learn. It provides executive management the assurance that those who have qualified for their CISM certification have the experience and knowledge to deliver effective security administration and consulting consulting. Progent offers the services of CISM certified security professionals to assist companies with:

  • Network Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • Information Security Administration
  • Recovery Management
Read additional information concerning Progent's CISM IS Security Support Services.

CISSP Qualified Security Consulting Services
The CISSP credential recognizes expertise with an international standard for data security. ANSI has awarded certification recognition in the field of information security stipulated by ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Read more details about Progent's CISSP Qualified Security Engineering Professionals.

ISSAP Certified Secure Network Architecture Consulting Services
Progent's ISSAP certified network architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous testing and extensive experience with network security design. The ISSAP credential indicates demonstrated competence in the most complex requirements of IS security architecture bounded by the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all aspects of architecture security such as.

  • Access Management Systems and Methodologies
  • Phone System and System Infrastructure Security
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Learn additional information about Progent's ISSAP Qualified Secure Network Architecture Engineering Services.

CISA Qualified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo a comprehensive examination administered by the ISACA professional group. Progent's CISA-certified network security audit specialists can help your business with:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Learn the details concerning Progent's CISA Accredited Network Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to plan, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist you to create and carry out a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk management engineers can provide a range of risk evaluation services including:

  • Collect data and review documentation to evaluate major vulnerabilities
  • Inventory statutory, industry, and contractual mandates and company standards associated with your information system to determine their potential impact on your strategic objectives
  • Identify possible vulnerabilities for your operational workflows to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders understand information system risk so they can contribute to your risk management program
  • Connect key risk vectors to related business processes to help determine risk ownership
  • Validate risk tolerance with your senior leadership and major stakeholders to ensure they match
Get more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Support
GIAC was established in 1999 to certify the knowledge of information technology security engineers. GIAC's goal is to make sure that a certified security consultant has the knowledge necessary to provide services in critical categories of system, data, and software security. GIAC accreditations are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit experts are available to help your company in the areas of:

Read more information concerning Progent's GIAC Information Assurance Services.

Talk to a Security Specialist
To see how you can contact a certified Progent security consultant for remote or onsite help in Delaware, call 1-800-993-9400 or go to Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.