Company information networks in Hawaii now have quick and affordable online help from Progent's qualified security professionals to fix critical security problems. The cost is competitive, billing is per minute, sign-up is quick, and service is world class. Progent also provides assistance for complex engagements that requires the knowledge of seasoned security consultants with high-level industry credentials.

If your Hawaii business is some distance from larger metropolitan areas such as Honolulu, support from local qualified network security support specialists is often problematic when you have a crisis. This can cause a loss of productivity for your company, angry customers, unproductive workers, and distracted management. By utilizing Progent, you can get in touch with a certified security engineer ready to offer assistance whenever you need it to get your system running and restore your data.

Progent can help you in a variety of ways in your initiatives to guard your IT environment with support that can range from network security audits to creating a company-wide security strategy. Progent offers economical support to assist businesses of all sizes to design and maintain secure IT environments powered by Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide web-based management and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall.

Progent's security engineers are accessible remotely or in person to provide a range of urgent or longer-term network security services which include:

  • Run extensive network security audits
  • Recuperate promptly after attacks
  • Set up hardware and software firewalls
  • Configure safe solutions for remote and mobile connectivity
  • Install effective utilities for automatic defense against viruses, spam and directory harvest attacks
  • Develop a company-wide security strategy with 24x7 monitoring
  • Offer comprehensive Help Desk Call Center Services
  • Help Develop an effective network backup and business continuity strategy based on Data Protection Manager automated backup capability
If your company has an immediate need for computer security help, refer to Progent's Urgent Remote Network Support.

Progent's engineers can deliver advanced support in vital facets of network protection including analysis, firewall and VPN solutions, and high-level security planning.

Security Audits
Progent's certified security consultants can assess the vulnerability of your current network security environment by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in administering this service saves you consulting fees and assures a detailed picture of security holes. The information your company gains can be used as the foundation of a security strategy that can permit your network to run safely and respond quickly to new risks.

Automated Network Security Analysis
Progent offers expertise in the application of security evaluation software including Microsoft's MBSA and GFI LANguard NSS for economically running a set of automatic network testing scans to uncover possible security problems. Progent has extensive experience with additional security analysis tools such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can help you design security into your business operations, configure auditing applications, plan and deploy a protected network environment, and suggest policies to optimize the security of your IT system. Progent's security engineers are able to help you configure a firewall, implement safe remote access to email and data, and install virtual private network. Learn more about Progent's automated security evaluation.

Security Inventory Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get an impartial network security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your firewall to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from an authorized machine within your firewall to uncover your exposure to inside assaults. Both security inventory packages are configured and run from a protected remote site. The process is overseen by a consultant who has earned high-level security accreditations and who produces a report that details and analyzes the data captured by the security scan and suggests practical remediation if called for.

Stealth Security Penetration Analysis Consulting
Stealth intrusion checking is a key component of any successful IT system security strategy. Progentís security professionals can perform thorough penetration checks without the knowledge of your company's in-house network support resources. Stealth penetration checking shows whether current security monitoring tools such as intrusion incident alerts and event log monitoring are properly configured and consistently monitored. Learn additional information concerning Progent's network penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in network security technology includes in-depth field work with major firewalls and VPN technology from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your existing PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Consulting Expertise
Cisco's security and offsite connection technology offer a complete line of manageable security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Read additional details concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.

Support Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose the right technologies from a variety of suppliers to support your security goals while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to defend endpoint devices and servers and VMs against modern malware assaults like ransomware and email phishing, which easily evade traditional signature-based AV tools. ProSight ASM safeguards local and cloud resources and offers a single platform to address the complete malware attack lifecycle including blocking, detection, mitigation, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services offer ultra-affordable multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, device management, and web filtering through cutting-edge tools packaged within a single agent managed from a unified control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also assist your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of critical files, apps and VMs that have become lost or damaged as a result of component failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever needed, can help you to restore your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security vendors to provide web-based management and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the apps. Since the system is virtualized, it can be moved easily to an alternate hardware solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.

Expert Security Planning
Any business should have a carefully considered security program that incorporates both proactive processes and response plans. The pre-attack plan is a collection of steps intended to minimize security weaknesses. The post-attack plan helps your company's security engineers to assess the damage resulting from a security penetration, fix the network, document the experience, and get the IT network restored as rapidly as possible.

Progent's certified information security consultants can to assist you to run a full risk evaluation and define a company-wide security strategy to implement security processes and controls to reduce ongoing assaults and threats.

CISM Accredited System Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of skill that IT security managers are required to master. It gives executive management the confidence that consultants who have earned their CISM credential have the experience and capability to deliver effective security management and consulting services. Progent offers the support of CISM certified security professionals to assist companies with:

  • Network Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Learn more details about Progent's CISM Qualified IS Security Engineering Professionals.

CISSP Certified Security Consulting Support
CISSP certification recognizes expertise with a worldwide standard for information security. The American National Standards Institute has granted certification recognition in the field of information security defined by ISO 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Read more information about Progent's CISSP Qualified Information Security Engineering Services.

ISSAP Accredited Secure System Architecture Consulting Expertise
Progent's ISSAP certified network architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous examination and significant work with information security architecture. The ISSAP credential represents proven mastery in the more in-depth requirements of information security architecture within the broader field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all phases of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Read additional information concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Services.

CISA Accredited Network Security Auditing Engineering Services
The CISA accreditation is a globally recognized qualification that indicates expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass a comprehensive examination given by the ISACA professional association. Progent's CISA security audit engineers can assist your company in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Preparedness
Get additional details concerning Progent's CISA Qualified Security Auditing Engineering Services.

CRISC Consultants
The CRISC certification program was initiated by ISACA to validate a consultant's skills to plan, implement, and support information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a business continuity plan based on industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management engineers can provide a range of risk assessment services such as:

  • Gather information and study documentation to help identify major vulnerabilities
  • Identify legal, regulatory, and business requirements and company policies related to your information system to determine their possible impact on your strategic goals
  • Identify potential threats for your operational processes to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct seminars to make sure your stakeholders understand IS risk so they can contribute to your risk control process
  • Match key risk vectors to related operational processes to help determine risk responsibility
  • Validate risk tolerance with executive leadership and major stakeholders to make sure they align
Get additional information about Progent's CRISC Consultants.

GIAC Certified Network Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security experts. GIAC's goal is to assure that an accredited professional has the skills necessary to deliver services in important categories of network, information, and software security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC network security audit consultants are available to help your company with:

  • Auditing Security Systems
  • Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Expert
To see how you can contact a certified security engineer for online or onsite support in Hawaii, call 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.