Business IT networks in the state of Hawaii can depend on quick and economical online access to Progent's qualified security consultants to help with the toughest security issues. Rates are competitive, charges are per minute, engagement is fast, and support is unbeatable. Progent also offers help for long-term projects that requires the services of seasoned security consultants with high-level security credentials.

If your Hawaii small business is located away from major urban neighborhoods including Honolulu, contact with local qualified network security consultants could be problematic during a security disaster. This can result in lost income for your company, angry clients, idle employees, and distracted management. By utilizing Progent's online services, you have access to a certified security professional who can provide assistance when you require it to keep your information system on line and restore your information.

Progent can help you in all your efforts to protect your network with services that can range from network security checks to developing a comprehensive security strategy. Progent offers economical support to assist businesses of all sizes to configure and manage safe networks powered by Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading data security companies to provide centralized management and world-class security for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's certified experts are accessible online or on premises to provide a range of emergency or project-based network security services including:

  • Run extensive network security audits
  • Recuperate promptly after virus and worm attacks
  • Set up effective firewalls
  • Implement secure techniques for offsite and mobile access
  • Install effective utilities for defense against spam and directory harvest attacks
  • Help create a company-wide security strategy with proactive network monitoring
  • Provide comprehensive Help Desk Call Center Support
  • Help Create an effective data backup and recovery strategy built around Microsoft DPM backup/restore capability
If your network has an urgent requirement for computer security support, go to Progent's Emergency Remote Network Support.

Progent's consultants provide advanced support in key fields of system protection that include security assessment, firewall/VPN support, and advanced security planning.

Security Audits
Progent's certified security engineers can assess the effectiveness of your current network security implementation through comprehensive remote automated analysis via sophisticated utilities and proven techniques. Progent's experience in this service saves your company time and money and assures an accurate picture of weaknesses. The knowledge your IT organization gains can make up the basis of a network protection strategy that will allow your information system to run safely and react rapidly to future risks.

Automated Security Evaluation
Progent offers expertise in the application of security auditing utilities including MBSA and LANguard from GFI for economically performing a variety of programmed system testing scans to identify possible security gaps. Progent has extensive knowledge of other network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, plus utilities such as Metasploit, Netcat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can show you how to build security into your business processes, install auditing applications, define and implement a protected system architecture, and recommend procedures to optimize the safety of your network. Progent's security engineers are available to assist you to configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Learn additional information on Progent's network security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory scanning bundles intended to allow small companies to get an impartial security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from beyond your company firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from an authorized computer inside your firewall to assess vulnerabilities to inside assaults. Both security inventory packages are configured and run from a secured remote location. The project is overseen by an engineer with high-level security accreditations and who produces a document that details and analyzes the data collected by the scan and suggests cost-effective remediation if appropriate.

Stealth Penetration Testing Support Services
Stealth intrusion testing is a key part of any comprehensive network security plan. Progent’s security professionals can run extensive intrusion checks without the knowledge of your company's in-house IT resources. Unannounced penetration testing shows whether current security defense tools such as intrusion incident warnings and event history monitoring are correctly configured and consistently checked. Find out more about Progent's stealth penetration testing support services.

Firewalls and VPN Solutions
Progent's background in security technology encompasses in-depth field work with leading firewalls and VPN technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with key industry certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Support Services
Cisco's network security and remote access technology offer a complete range of manageable security products to help protect your wired and wireless information system. Cisco's VPN product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and CCNP qualifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Read more information concerning Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Products.

Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and choose the right technologies from multiple suppliers to achieve your security objectives while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning technology to defend endpoints and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily escape traditional signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the entire threat progression including protection, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device control, and web filtering through leading-edge technologies packaged within one agent accessible from a single control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP environment that meets your organization's unique needs and that helps you demonstrate compliance with legal and industry information security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent's consultants can also assist you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. For a fixed monthly price, ProSight DPS automates your backup activities and allows rapid restoration of critical data, apps and VMs that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver world-class support to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security vendors to deliver centralized management and world-class security for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and protect information about your network infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT documentation, you can eliminate up to half of time wasted trying to find critical information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you’re planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Find out more details about ProSight IT Asset Management service.

Certified Network Security Planning
Any business ought to have a carefully considered security program that incorporates both preventive procedures and response planning. The pre-attack plan is a collection of steps designed to reduce vulnerabilities. The reactive strategy assists your network security engineers to assess the damage caused by a security penetration, repair the network, record the experience, and get business functions running as soon as feasible.

Progent's certified information security engineers can to help your business to run a full risk assessment and define a company-wide security plan to implement security processes and controls to reduce future assaults and threats.

CISM Accredited Security Support Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and worldwide standards of skill that information security managers are expected to master. It gives executive management the assurance that those who have earned their CISM credential possess the background and knowledge to deliver effective security administration and support consulting. Progent can provide the support of CISM qualified security consultants to help companies with:

  • IS Security Strategies
  • Risk Analysis
  • Information Security Program Management
  • Information Security Management
  • Recovery Planning
Find out additional details about Progent's CISM Qualified Network Security Support Services.

CISSP Certified Security Engineering Assistance
CISSP recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the field of data security under ISO 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISSP Qualified Network Security Consulting Services.

ISSAP Qualified Secure IT Architecture Engineering Services
Progent's ISSAP qualified IT architecture professionals are consultants who have been awarded ISSAP status through rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most complex demands of information system security architecture within the wider scope of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all aspects of secure network architecture such as.

  • Access Control Systems and Techniques
  • Phone System and Network Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Find out more details concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Services.

CISA Certified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor credential is a recognized achievement that indicates expertise in network security audit and control. Certified by the American National Standards Institute, the CISA credential requires that candidates pass an extensive test administered by the ISACA international professional association. Progent's CISA security audit engineers are available to assist your company with:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Read more information about Progent's CISA Qualified Information System Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to verify a consultant's skills to design, implement, and support information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation consultants can provide a range of risk evaluation services such as:

  • Gather data and review documentation to evaluate major vulnerabilities
  • Identify legal, industry, and contractual requirements and company policies related to your information system to assess their possible impact on your business objectives
  • Point out potential vulnerabilities for your business workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness initiative and conduct seminars to ensure your organization appreciate IT risk so they can contribute to your risk control process
  • Connect key risk scenarios to related business processes to help determine risk ownership
  • Determine risk tolerance with your senior management and key stakeholders to ensure they align
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Consulting Expertise
GIAC was established in 1999 to validate the skill of network security professionals. GIAC's goal is to assure that an accredited security consultant possesses the knowledge necessary to provide support in key areas of system, data, and program security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified information security audit experts are available to help your business in the areas of:

Read more details about Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Engineer
To find out how you can access a certified security engineer for online or on-premises expertise in Hawaii, call 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.