Small business computer networks in the state of Hawaii now have prompt and economical online technical support from Progent's accredited security experts to help with the toughest security issues. The cost is affordable, billing is per minute, sign-up is fast, and service is world class. Progent also offers help for complex projects that demand the services of seasoned security consultants with high-level industry credentials.

In case your Hawaii network is based some distance from major metropolitan neighborhoods like Honolulu, help from local qualified network security professionals is often problematic when you have an emergency. This can result in a drop in productivity for your company, upset customers, idle workers, and defocused executives. By calling Progent, you have access to a certified security engineer ready to provide help when you need it to get your network operating and salvage your data.

Progent can assist you at any level in your initiatives to guard your information system with support that ranges from security audits to developing a company-wide security plan. Progent offers economical support to help small and midsize companies to set up and maintain protected networks powered by Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further layer of analysis for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.

Progent's certified professionals are available remotely or on site to offer a range of urgent or project-based computer security services which include:

If your business has an urgent need for computer security support, go to Progent's Urgent Remote Network Support.

Progent's consultants provide world-class support in key facets of network protection that include security assessment, firewalls and VPN, and high-level security consulting.

Security Assessment
Progent's expert security engineers can assess the effectiveness of your existing computer security implementation through exhaustive remote automated testing based on advanced utilities and proven procedures. Progent's skill in administering this testing saves you money and assures an objective portrayal of system vulnerability. The information your IT organization is provided can form the basis of a network protection strategy that can permit your information system to run safely and adapt quickly to new risks.

Automated Network Security Evaluation
Progent provides consulting in the application of security evaluation products such as Microsoft's MBSA and LANguard from GFI for economically running a set of programmed system testing scans to uncover possible security vulnerabilities. Progent has broad knowledge of additional network auditing tools including NMAP, AMAP application mapper, eEye, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you design security into your company operations, install scanning software, plan and implement a protected network architecture, and suggest policies to optimize the safety of your network. Progent's security professionals are available to assist you to configure a firewall, implement safe remote access to email and data, and integrate VPN. Learn more on Progent's automated security audits.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles designed to enable small businesses to get a professional security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, an engineer runs a network scan from a secure machine inside your firewall to determine vulnerabilities to inside assaults. The two security inventory packages are configured and run from a protected external site. The project is overseen by a consultant with top security credentials and who generates a document that details and interprets the information collected by the scan and proposes practical remediation if appropriate.

Network Security Penetration Analysis Consulting
Stealth intrusion testing is an important component of any comprehensive network security strategy. Progent’s security professionals can perform thorough penetration checks without the knowledge of your company's internal network support resources. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion detection alerts and event history analysis are properly configured and actively monitored. Learn additional information about Progent's stealth penetration analysis support services.

Firewall/VPN Expertise
Progent's expertise in network security technology includes in-depth familiarity with leading firewalls and VPN products from multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your existing PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, optimize, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower Services integration and debugging services.

Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and offsite connection products offer a full range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Find out more information about Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and VPN Products
Progent offers small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from multiple suppliers to achieve your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based analysis technology to guard endpoint devices and physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily evade legacy signature-matching AV products. ProSight ASM protects on-premises and cloud resources and offers a unified platform to address the complete malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services offer ultra-affordable multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools incorporated within a single agent managed from a unified console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP environment that meets your company's unique requirements and that helps you demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent's consultants can also help your company to install and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of critical files, apps and virtual machines that have become lost or damaged due to component failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to restore your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to a different hosting solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you’re making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Design
Every company ought to develop a carefully considered security program that includes both preventive procedures and reaction planning. The proactive plan is a collection of steps intended to reduce vulnerabilities. The reactive plan assists your company's security personnel to evaluate the damage resulting from an attack, repair the damage, document the experience, and get the IT network restored as soon as feasible.

Progent's expert IS security consultants are available to help your business to perform a comprehensive vulnerability evaluation and create a computer security plan to implement security policies and mechanisms to reduce ongoing assaults and threats.

CISM Certified System Security Support Services
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of skill that IT security professionals are expected to learn. CISM gives executive management the assurance that those who have earned their CISM certification have the experience and capability to provide effective security management and consulting services. Progent offers the services of CISM certified security consultants to assist businesses with:

  • IS Security Governance
  • Risk Management
  • IS Security Implementation Management
  • Network Security Administration
  • Recovery Management
Learn additional details about Progent's CISM Accredited Network Security Consulting Expertise.

CISSP Qualified Security Engineering Assistance
CISSP certification recognizes expertise with a worldwide standard for network security. The American National Standards Institute has granted certification recognition in the field of information security stipulated by ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a variety security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP Information Security Support Services.

CISSP-ISSAP Accredited Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP certified network architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more complex demands of information system security architecture bounded by the wider field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security specialists can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Find out more information concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Qualified Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is an important achievement that signifies mastery in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit consultants are available to assist your company with:

  • IS Audit Services
  • IT Administration
  • Systems and Architecture Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Read additional information about Progent's CISA Certified Information System Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's skills to plan, deploy, and support IS control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to develop and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation consultants can provide a range of risk assessment services including:

  • Gather information and review documentation to identify significant risk scenarios
  • Inventory statutory, industry, and contractual mandates and company standards related to your network to determine their potential influence on your business objectives
  • Point out potential threats for your operational workflows to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your stakeholders appreciate IT risk so they can contribute to your risk control program
  • Match identified risk scenarios to related business procedures to help assign risk responsibility
  • Validate risk tolerance with executive management and key stakeholders to ensure they are in agreement
Read additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Engineering Support
GIAC was founded in 1999 to validate the knowledge of computer security professionals. GIAC's mission is to make sure that an accredited security consultant has the knowledge necessary to provide services in important categories of network, information, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC security audit specialists can assist your business with:

  • Assessing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out more details about Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To see how to get in touch with a security consultant for online or on-premises support in Hawaii, phone 1-800-993-9400 or go to Online Network Support.














© 2002- 2019 Progent Corporation. All rights reserved.