Company information networks in the state of Hawaii can have fast and affordable remote technical support from Progent's certified network security engineers to assist with the toughest security problems. The cost is affordable, billing is by the minute, engagement is quick, and support is unbeatable. Progent also offers help for complex projects that demand the expertise of senior security engineers with high-level industry certifications.

In case your Hawaii office is situated far from major metropolitan areas including Honolulu, access to nearby certified network security consultants could be problematic when you have an urgent situation. This can cause a drop in income for your company, angry clients, idle employees, and defocused management. By calling Progent's remote support, you can get in touch with a qualified security engineer who can deliver assistance when you have to have it to get your system running and restore your information.

Progent can help you at any level in your efforts to defend your IT environment with services that can range from network security audits to developing a comprehensive security plan. Progent provides economical support to help small and midsize companies to configure and manage secure IT environments based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security companies to provide web-based management and world-class security for your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of inspection for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, DLP, and encryption. The onsite gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified consultants are accessible remotely or on site to offer a variety of emergency or project-based computer security services including:

If your business has an emergency need for IT security help, refer to Progent's Urgent Online Network Help.

Progent's support professionals can deliver advanced services in vital areas of network security including auditing, firewalls and VPN, and high-level security consulting.

Security Assessment
Progent's certified security consultants can evaluate the vulnerability of your current network security implementation by performing comprehensive remote automated testing via advanced software tools and tested techniques. Progent's experience in administering this testing saves you money and offers an objective picture of gaps. The information your IT organization is provided can make up the foundation of a security strategy that can permit your network to run dependably and adapt rapidly to new risks.

Automated Network Security Assessment
Progent offers expertise in the use of security analysis products including Microsoft Baseline Security Analyzer and GFI LANguard for affordably running a set of programmed system auditing checks to identify possible security weaknesses. Progent has broad knowledge of additional security analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like Metasploit, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to build security into your company operations, configure scanning software, define and implement a protected system environment, and recommend procedures to optimize the safety of your IT system. Progent's security professionals are able to show you how to configure a firewall, design safe remote access to email and business applications, and install virtual private network. Find out more on Progent's automated security assessment.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two low-cost security inventory scanning packages designed to allow small businesses to receive an impartial network security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, an engineer runs an extensive examination of your network from beyond your firewall to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert executes a network scan from an authorized machine inside your company firewall to assess your exposure to inside attacks. The two security inventory services are configured and executed from a protected remote site. The project is directed by a consultant who has earned top security credentials and who generates a document that summarizes and analyzes the information captured by the scan and proposes cost-effective improvements where called for.

Stealth Intrusion Testing Support Services
Stealth penetration checking is an important part of any serious network security strategy. Progentís security experts can perform thorough intrusion tests without the awareness of your company's in-house IT staff. Unannounced penetration checking shows whether current security defense systems such as intrusion incident alerts and event log analysis are correctly set up and actively monitored. Find out additional information concerning Progent's stealth penetration analysis consulting.

Firewalls and VPN Expertise
Progent's expertise in network security technology encompasses extensive familiarity with leading firewalls and VPN products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and remote access technology offer a comprehensive range of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business goals. Find out additional details concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Products.

Consulting Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security strategy and choose appropriate products from a variety of suppliers to achieve your security goals while staying within your spending limits.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top information security vendors to deliver web-based management and world-class security for all your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite security gateway device provides a further level of analysis for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which easily evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to address the entire malware attack lifecycle including blocking, identification, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and enables rapid restoration of vital files, applications and VMs that have become lost or corrupted as a result of hardware failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your network documentation, you can save up to half of time spent searching for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Planning
Any company should have a thoroughly thought out security strategy that includes both preventive procedures and reaction plans. The proactive plan is a set of mechanisms that help to reduce security weaknesses. The reactive plan assists your network security personnel to evaluate the damage resulting from a security penetration, fix the network, record the event, and get business functions restored as rapidly as possible.

Progent's certified information security engineers can to help your company to run a complete risk assessment and create a network security strategy to establish security policies and mechanisms to mitigate ongoing attacks and dangers.

CISM Qualified Security Consulting Assistance
The CISM organization describes the basic capabilities and global standards of skill that information security professionals are expected to master. CISM provides executive management the confidence that those who have earned their CISM certification have the background and knowledge to deliver effective security management and support services. Progent offers the support of CISM certified security consultants to assist companies with:

  • Information Security Strategies
  • Vulnerability Management
  • Network Security Program Management
  • Information Security Management
  • Recovery Management
Read additional information about Progent's CISM Qualified Information Security Consulting Services.

CISSP Accredited Security Engineering Services
CISSP recognizes mastery of a global standard for network security. The American National Standards Institute has granted certification recognition in the area of information security under ISO 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Learn more information about Progent's CISSP Accredited Information Security Engineering Professionals.

ISSAP Certified Secure Information System Architecture Engineering Services
Progent's ISSAP qualified information system architecture engineers are experts who have been awarded ISSAP Certification through thorough testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more challenging requirements of information system security architecture within the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security specialists can assist your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Read additional information about Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Certified IS Security Auditing Engineering Services
The CISA accreditation is an important qualification that signifies expertise in network security auditing. Certified by ANSI, the CISA accreditation requires that consultants pass an extensive examination administered by the ISACA professional association. Progent's CISA-certified security audit experts are available to assist your company with:

  • IS Audit Services
  • IT Enforcement
  • Systems and Infrastructure Planned Useful Life
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Get more details about Progent's CISA Certified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to plan, deploy, and maintain IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers can provide a range of risk evaluation services such as:

  • Gather data and review documentation to help identify significant vulnerabilities
  • Identify legal, industry, and business requirements and organizational standards related to your network to determine their possible impact on your strategic goals
  • Identify potential threats for your business workflows to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and conduct training to ensure your stakeholders understand information system risk so they can contribute to your risk management process
  • Match identified risk scenarios to related business processes to help determine risk responsibility
  • Validate risk tolerance with executive management and major stakeholders to make sure they are in agreement
Read more information about Progent's CRISC Consultants.

GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to assure that an accredited security consultant possesses the skills needed to deliver support in important categories of system, information, and software security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC security audit experts can assist your company in the areas of:

  • Auditing Perimeters
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Security Expert
To see how you can contact a certified Progent security consultant for remote or onsite support in Hawaii, phone 1-800-993-9400 or visit Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.