Small business computer networks in the state of Hawaii can now get prompt and affordable remote access to Progent's qualified security support specialists to help with the toughest security issues. Rates are reasonable, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also provides assistance for long-term projects that demand the knowledge of seasoned security engineers with top security credentials.

If your Hawaii network is some distance from more populated urban areas such as Honolulu, the availability of nearby accredited security support specialists could be problematic when there's a security disaster. This could mean a loss of revenue for your company, upset customers, unproductive employees, and distracted executives. By contacting Progent, you can get in touch with a certified security consultant ready to provide assistance whenever you have to have it to get your system on line and restore your data.

Progent can assist you in all your efforts to guard your IT environment with support that ranges from security audits to creating a comprehensive security plan. Progent offers affordable support to help companies of any size to design and manage secure networks based on Microsoft Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security companies to provide web-based management and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a further layer of analysis for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Exchange Server to track and safeguard internal email that stays within your corporate firewall.

Progent's security consultants are accessible remotely or in person to provide a range of emergency or project-based computer security services such as:

If your company has an urgent requirement for computer security help, refer to Progent's Urgent Online Network Help.

Progent's consultants can deliver advanced support in key areas of computer protection that include security evaluation, firewall and VPN expertise, and advanced security planning.

Security Audits
Progent's certified security engineers can assess the strength of your existing network security implementation by performing comprehensive remote automated analysis via sophisticated software tools and proven techniques. Progent's skill in administering this service saves your company money and assures an objective picture of security holes. The information your IT organization is provided can make up the foundation of a network protection strategy that can allow your information system to run safely and respond rapidly to future risks.

Automated Security Audits
Progent offers expertise in the use of security testing software such as Microsoft's MBSA and LANguard from GFI for economically performing a variety of automatic network auditing scans to identify possible security holes. Progent has broad experience with other security analysis utilities such as NMAP, AMAP Application Scanner, eEye, plus tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can help you design security into your company operations, install scanning software, plan and deploy a secure system architecture, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are available to show you how to configure a firewall, design safe remote access to email and data, and install VPN. Learn more on Progent's automated security audits.

Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles intended to allow small companies to receive a professional network security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from a secure machine inside your company firewall to assess your exposure to inside threats. The two security inventory services are configured and run from a secured external location. The process is directed by an engineer with high-level security credentials and who generates a document that summarizes and analyzes the information collected by the scan and suggests practical improvements if appropriate.

Stealth Penetration Testing Support Services
Stealth penetration testing is a key part of any successful IT system security strategy. Progentís security experts can perform thorough penetration checks without the awareness of your company's internal network support resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident alerts and event log monitoring are correctly configured and actively monitored. Learn additional information concerning Progent's network security penetration testing consulting.

Firewall/VPN Expertise
Progent's expertise in network security technology includes extensive familiarity with major firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers with key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to manage your existing PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Support Services
Cisco's security and offsite connection technology offer a complete line of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Find out additional details concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.

Support Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can help you create a detailed security strategy and select the right technologies from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a collection of affordable, set-price monthly managed services designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security vendors to provide web-based management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email that stays within your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis technology to defend endpoints and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to automate the entire threat lifecycle including blocking, identification, mitigation, cleanup, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid restoration of critical data, apps and virtual machines that have become unavailable or corrupted due to component failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory standards such as IPPA, FIRPA, and PCI and, when needed, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

Expert Security Consulting
Every company should have a thoroughly considered security strategy that incorporates both pre-attack procedures and response planning. The pre-attack strategy is a set of steps intended to minimize security weaknesses. The post-attack strategy assists your IT security personnel to evaluate the damage resulting from an attack, repair the system, record the experience, and get the IT network operational as soon as possible.

Progent's expert IT security engineers are available to help you to perform a comprehensive risk evaluation and define a company-wide security strategy to implement security processes and mechanisms to mitigate ongoing assaults and threats.

CISM Qualified System Security Engineering Assistance
The CISM committee defines the core competencies and international standards of performance that IT security managers are expected to learn. CISM provides business management the confidence that those who have qualified for their CISM certification have the experience and knowledge to provide efficient security management and support services. Progent offers the support of CISM certified security consultants to help businesses with:

  • IS Security Processes
  • Risk Analysis
  • IS Security Program Management
  • Network Security Administration
  • Recovery Management
Learn additional details about Progent's CISM Qualified IS Security Engineering Services.

CISSP Certified Security Engineering Services
The CISSP credential denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the field of data security under ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn more information about Progent's CISSP Qualified Information Security Engineering Professionals.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP certified IT architecture engineers are consultants who have been awarded ISSAP status through thorough examination and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the most challenging requirements of information security architecture within the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all aspects of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read additional information about Progent's ISSAP Qualified Secure IT Architecture Support Professionals.

CISA Accredited IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that signifies mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass a comprehensive test administered by the ISACA professional group. Progent's CISA IS security audit experts are available to help your business with:

  • IS Audit Process
  • IT Governance
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Assets
  • Business Continuity Preparedness
Find out more details concerning Progent's CISA Certified Network Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to design, implement, and support information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk management engineers can provide a variety of risk identification services such as:

  • Collect data and study documentation to help identify major vulnerabilities
  • Inventory statutory, industry, and business mandates and company standards associated with your information system to determine their potential impact on your strategic objectives
  • Identify possible threats for your operational workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your organization understand IT risk so they can assist with your risk control process
  • Connect identified risk scenarios to your associated business procedures to help determine risk responsibility
  • Determine risk tolerance with executive leadership and key stakeholders to make sure they match
Get more information concerning Progent's CRISC Consultants.

GIAC Accredited IS Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of computer security experts. GIAC's goal is to verify that an accredited security consultant has the knowledge needed to deliver support in critical areas of network, information, and application security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC network security audit experts are available to help your business with:

Read additional information concerning Progent's GIAC Information Assurance Support.

Contact a Security Engineer
To find out how you can contact a Progent security engineer for online or onsite support in Hawaii, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.