Company IT networks in the state of Hawaii can have prompt and affordable online help from Progent's certified network security engineers to assist with the toughest security issues. The cost is competitive, billing is per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex engagements that requires the expertise of senior security engineers with high-level industry certifications.

In case your Hawaii organization is based some distance from more populated urban neighborhoods including Honolulu, contact with nearby qualified network security engineers is often problematic when you have an urgent situation. This can cause a drop in revenue for your company, angry customers, idle workers, and defocused management. By contacting Progent, you have access to a certified security professional who can provide expertise whenever you have to have it to get your system running and recover your data.

Progent can help you in all your efforts to protect your network with services that can range from network security checks to creating a comprehensive security strategy. Progent provides economical service to help small and midsize companies to set up and manage protected networks based on Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security platform that uses the technology of leading data security vendors to provide centralized control and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's certified experts are available online or in person to provide a variety of urgent or longer-term network security services including:

If your business has an emergency need for computer security help, refer to Progent's Emergency Online Network Support.

Progent's consultants provide world-class services in vital areas of computer security that include security assessment, firewall/VPN support, and high-level security consulting.

Security Audits
Progent's expert security engineers can evaluate the vulnerability of your existing computer security implementation through exhaustive remote automated testing based on sophisticated utilities and proven procedures. Progent's experience in this testing saves your company consulting fees and assures an objective portrayal of security holes. The knowledge your business gains can form the foundation of a network protection strategy that will permit your network to run safely and respond rapidly to future threats.

Automated Network Vulnerability Assessment
Progent offers expertise in the use of security auditing utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a variety of automatic network testing checks to identify potential security weaknesses. Progent has broad knowledge of additional network auditing tools including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.

Progent can show you how to design protection into your company operations, configure scanning tools, plan and deploy a protected system architecture, and suggest procedures to optimize the security of your IT system. Progent's security professionals are available to show you how to configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Learn more on Progent's automated security evaluation.

Security Inventory and Evaluation Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to allow small businesses to get an objective security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, a security expert runs an extensive examination of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine inside your firewall to evaluate the risk to internal assaults. Both security inventory services are configured and run from a secured remote site. The project is overseen by an engineer with high-level security credentials and who produces a document that details and analyzes the information collected by the scan and suggests cost-effective remediation if called for.

Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any successful network security strategy. Progentís security experts can run extensive penetration tests without the awareness of your company's in-house network support staff. Stealth penetration testing shows whether current security defense tools such as intrusion incident warnings and event log analysis are properly configured and actively monitored. Find out more on Progent's stealth security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in network security solutions encompasses extensive field work with major firewalls and VPN products from multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important industry certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA Firewalls with Firepower configuration and debugging services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's security and offsite connection products provide a full range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Learn additional details concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Consulting Services for Other Firewall and VPN Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors such as WatchGuard, Juniper, and Symantec. Progent can help you create a detailed security strategy and choose appropriate products from a variety of vendors to achieve your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to provide centralized management and comprehensive security for all your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to manage the entire malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup activities and enables rapid recovery of vital files, applications and virtual machines that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can help you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup.

Expert Security Consulting
Any business should develop a carefully thought out security strategy that includes both pre-attack procedures and response plans. The pre-attack strategy is a collection of mechanisms that help to minimize vulnerabilities. The post-attack strategy assists your company's network security personnel to assess the damage caused by a security penetration, fix the damage, record the experience, and get the IT network restored as soon as possible.

Progent's expert IT security engineers are available to assist you to perform a full vulnerability evaluation and define a computer security plan to establish security processes and controls to reduce future assaults and dangers.

CISM Qualified Network Security Consulting Services
The Certified Information Security Manager (CISM) committee describes the core capabilities and global standards of skill that IT security managers are expected to master. It provides business management the assurance that those who have earned their CISM credential possess the experience and knowledge to deliver effective security management and support consulting. Progent can provide the services of CISM certified security professionals to assist companies with:

  • Network Security Governance
  • Risk Management
  • Information Security Program Management
  • IS Security Management
  • Recovery Management
Learn more details concerning Progent's CISM Accredited Information Security Engineering Expertise.

CISSP Accredited Security Consulting Assistance
CISSP certification recognizes mastery of an international standard for data security. The American National Standards Institute has awarded certification recognition in the field of data protection defined by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your business in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Learn additional details concerning Progent's CISSP Qualified Information Security Consulting Expertise.

ISSAP Accredited Secure IT Architecture Consulting Expertise
Progent's ISSAP certified system architecture engineers are experts who have been awarded ISSAP Certification through thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the more challenging requirements of IS security architecture within the wider scope of IS security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Criteria
  • BCP and Disaster Recovery Planning
  • Site Security
Read additional information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.

CISA Qualified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that indicates mastery in information system security audit and control. Accredited by ANSI, the CISA credential requires that candidates pass an extensive test administered by the ISACA international professional group. Progent's CISA-certified security audit specialists can help your company with:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Read additional details concerning Progent's CISA Qualified Information System Security Auditing Consulting Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate a consultant's skills to design, deploy, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and execute a business continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management engineers can provide a variety of risk identification services including:

  • Gather information and study documentation to help identify major risk scenarios
  • Identify legal, industry, and contractual mandates and organizational standards related to your network to determine their potential influence on your strategic goals
  • Point out possible vulnerabilities for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and provide seminars to make sure your organization appreciate IT risk so they can contribute to your risk management process
  • Connect key risk vectors to your associated operational processes to help assign risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they match
Read more details concerning Progent's CRISC Consultants.

GIAC Certified Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to validate the skill of computer security experts. GIAC's goal is to ensure that an accredited professional possesses the skills necessary to provide support in critical categories of system, information, and application software security. GIAC accreditations are acknowledged by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC-qualified IS security audit specialists can help your company with:

Learn additional details about Progent's GIAC Information Assurance Services.

Contact a Security Expert
To see how to access a Progent security consultant for online or onsite expertise in Hawaii, call 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.