Business IT networks in the state of Idaho can now get fast and affordable remote help from Progent's qualified network security engineers to assist with the toughest security issues. The cost is affordable, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also offers help for complex projects that requires the services of senior security engineers with high-level industry certifications.

If your Idaho organization is based away from major metropolitan neighborhoods like Boise City, Pocatello, Idaho Falls, or Lewiston, support from local accredited network security consultants may be limited when you have an urgent situation. This could mean a drop in productivity for your company, angry customers, idle employees, and distracted management. By utilizing Progent, you can get in touch with a certified security professional who can offer assistance when you need it to keep your network operating and recover your data.

Progent can help you in all your efforts to defend your network with support that ranges from network security assessments to developing a company-wide security plan. Progent offers economical support to help businesses of all sizes to design and maintain protected networks based on Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of top data security companies to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall.

Progent's security consultants are available online or on premises to provide a variety of emergency or project-based computer security services including:

If your business has an immediate need for computer security help, go to Progent's Emergency Online Network Help.

Progent's security experts can deliver world-class services in vital areas of system protection including auditing, firewall and VPN expertise, and advanced security consulting.

System Assessment
Progent's expert security engineers can assess the effectiveness of your existing computer security implementation through comprehensive remote automated testing via sophisticated utilities and tested procedures. Progent's skill in this service saves you consulting fees and offers an accurate picture of security holes. The information your IT organization gains can be used as the basis of a network protection plan that can permit your network to run dependably and react rapidly to new threats.

Automated Network Vulnerability Assessment
Progent offers expertise in the use of security auditing utilities such as MBSA and GFI LANguard NSS for affordably performing a variety of programmed system auditing checks to identify potential security gaps. Progent has extensive experience with other security auditing products including NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can show you how to design protection into your company operations, install scanning tools, plan and deploy a protected system environment, and recommend policies to optimize the security of your IT system. Progent's security consultants are able to help you configure a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out more concerning Progent's automated security evaluation.

Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages designed to enable small companies to get an independent security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your IT infrastructure from beyond your firewall to determine possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from an authorized machine within your company firewall to assess vulnerabilities to inside attacks. Both security inventory packages are configured and run from a secured remote location. The project is directed by a consultant who has earned high-level security accreditations and who generates a report that summarizes and analyzes the data captured by the scan and proposes practical remediation if called for.

Stealth Security Penetration Testing Support Services
Stealth intrusion testing is an important part of any successful IT system security plan. Progentís security professionals can run thorough intrusion checks without the awareness of your organization's internal network support resources. Stealth penetration checking uncovers whether existing security monitoring tools such as intrusion incident warnings and event log analysis are properly set up and consistently checked. Learn more concerning Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security technology includes in-depth field work with leading firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned key networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote access products provide a comprehensive range of manageable security products to help safeguard your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business goals. Find out additional information concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Appliances.

Consulting Services for Other Firewall and VPN Technology
Progent offers small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and select appropriate products from multiple vendors to achieve your security objectives while staying within your budget limits.

Certified Security Planning
Any business should have a thoroughly thought out security strategy that includes both preventive procedures and reaction plans. The proactive plan is a collection of procedures that help to minimize security weaknesses. The reactive strategy helps your company's security personnel to evaluate the impact resulting from a security penetration, repair the system, record the experience, and get business functions operational as soon as possible.

Progent's certified IS security engineers can to help your business to run a complete risk evaluation and create a computer security strategy to implement security processes and mechanisms to reduce future assaults and threats.

CISM Certified Security Support Expertise
The CISM organization describes the core competencies and international standards of skill that IT security professionals are required to learn. It gives business management the assurance that consultants who have qualified for their CISM certification possess the background and capability to provide effective security administration and support consulting. Progent can provide the expertise of CISM qualified security consultants to help companies with:

  • Network Security Strategies
  • Risk Analysis
  • IS Security Implementation Management
  • Network Security Management
  • Recovery Planning
Find out more information concerning Progent's CISM Qualified IS Security Engineering Professionals.

CISSP Accredited Security Consulting Assistance
The CISSP credential denotes expertise with a worldwide standard for network security. The American National Standards Institute has awarded certification accreditation in the area of data protection under ISO 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Read additional details about Progent's CISSP Accredited Security Engineering Services.

ISSAP Accredited Secure IT Architecture Consulting Expertise
Progent's ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP Certification through rigorous examination and extensive work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the most in-depth requirements of information security architecture within the wider scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Learn additional information concerning Progent's ISSAP Certified Secure System Architecture Engineering Services.

CISA Accredited Security Auditing Engineering Services
The CISA accreditation is a recognized achievement that indicates mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA-certified IS security audit specialists can assist your company in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Get more details concerning Progent's CISA Accredited Information System Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, implement, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to help you to create and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation experts offer a range of risk evaluation services such as:

  • Gather information and review documentation to evaluate major risk scenarios
  • Identify statutory, industry, and business mandates and organizational policies associated with your network to assess their potential impact on your business goals
  • Point out possible threats for your business processes to help in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk control process
  • Connect identified risk scenarios to related business processes to help assign risk ownership
  • Validate risk appetite with your senior leadership and key stakeholders to ensure they are in agreement
Find out more details concerning Progent's CRISC Experts.

GIAC Qualified IS Security Consulting Assistance
GIAC was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to assure that an accredited professional possesses the knowledge appropriate to provide services in critical areas of network, data, and application security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified IS security audit experts are available to assist your business in the areas of:

  • Assessing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Engineer
To find out how you can access a Progent security engineer for online or on-premises assistance in Idaho, call 1-800-993-9400 or visit Remote Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.