Small business computer networks in the state of Idaho can now get prompt and economical remote help from Progent's accredited network security consultants to resolve critical security issues. Rates are reasonable, billing is per minute, engagement is fast, and support is world class. Progent also offers help for complex engagements that demand the knowledge of senior security engineers with high-level industry credentials.

If your Idaho organization is outside of larger urban neighborhoods like Boise City, Pocatello, Idaho Falls, or Lewiston, contact with local accredited security experts is often problematic when there's an emergency. This can result in a loss of revenue for your business, upset clients, unproductive employees, and distracted management. By utilizing Progent's online services, you have access to a qualified security engineer who can deliver assistance when you need it to get your information system running and salvage your information.

Progent can help you in a variety of ways in your initiatives to protect your network with support that can range from security checks to developing a comprehensive security plan. Progent offers affordable support to help companies of any size to configure and manage secure networks powered by Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver web-based control and comprehensive protection for all your email traffic. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's certified experts are accessible remotely or on premises to provide a variety of urgent or project-based network security services such as:

  • Run thorough network security evaluations
  • Recover quickly after serious security breaches
  • Install effective firewalls
  • Implement safe techniques for offsite and mobile access
  • Deploy effective applications for automatic protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Services
  • Create an effective network backup and recovery plan based on Data Protection Manager backup/restore technology
If your business has an emergency need for computer security support, go to Progent's Emergency Remote Technical Help.

Progent's consultants offer world-class services in key fields of computer protection that include auditing, firewalls and VPN, and high-level security planning.

System Evaluation
Progent's expert security engineers can assess the effectiveness of your current network security systems through exhaustive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in this testing saves you money and offers an accurate picture of security holes. The information your IT organization gains can be used as the basis of a security plan that will permit your information system to run dependably and respond quickly to new threats.

Automated Security Audits
Progent provides expertise in the application of security analysis products including Microsoft's MBSA and GFI LANguard NSS for economically performing a variety of programmed system testing scans to identify potential security problems. Progent has extensive knowledge of additional security analysis tools such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to design protection into your company operations, configure auditing tools, plan and implement a secure network architecture, and recommend policies to maximize the security of your network. Progent's security consultants are available to show you how to set up a firewall, implement safe remote access to email and data, and install virtual private network. Find out additional information on Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to allow small companies to receive an impartial security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive examination of your IT infrastructure from outside your company firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from a secure computer inside your company firewall to evaluate your exposure to inside assaults. Both security inventory packages are configured and run from a secured remote site. The process is directed by an engineer with high-level security credentials and who generates a document that details and interprets the data collected by the scan and suggests practical improvements if called for.

Network Intrusion Analysis Support Services
Stealth intrusion checking is a key part of any comprehensive network security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's internal IT staff. Stealth penetration testing shows whether existing security defense systems such as intrusion incident warnings and event history analysis are correctly set up and actively monitored. Find out more about Progent's network penetration analysis support services.

Firewall/VPN Expertise
Progent's expertise in security solutions includes extensive field work with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Engineering Services
Cisco's network security and offsite access products provide a complete range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and CCNP qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Find out more details concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose appropriate technologies from multiple suppliers to support your security goals while sticking within your spending limits.

Certified Network Security Consulting
Any company ought to have a carefully considered security program that includes both pre-attack procedures and reaction planning. The pre-attack plan is a collection of steps designed to minimize vulnerabilities. The post-attack plan helps your network security engineers to assess the impact resulting from a security penetration, repair the network, record the experience, and get the IT network restored as quickly as feasible.

Progent's expert information security consultants are available to assist your company to run a full risk evaluation and create a company-wide security plan to establish security processes and mechanisms to reduce ongoing assaults and threats.

CISM Accredited Information Security Support Assistance
The CISM organization defines the basic competencies and worldwide standards of performance that IT security professionals are required to master. It provides executive management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to provide efficient security administration and support services. Progent offers the expertise of CISM qualified security professionals to assist companies with:

  • Network Security Strategies
  • Risk Analysis
  • Information Security Implementation Management
  • IS Security Management
  • Response Management
Find out more details concerning Progent's CISM Qualified Network Security Consulting Expertise.

CISSP Accredited Security Engineering Services
CISSP certification recognizes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data security stipulated by ISO 17024. Progent offers access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Learn more information about Progent's CISSP Accredited Information Security Consulting Professionals.

ISSAP Accredited Secure IT Architecture Engineering Expertise
Progent's ISSAP certified network architecture professionals are experts who have earned ISSAP Certification as a result of rigorous testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most challenging demands of IS security architecture bounded by the broader field of information security knowledge required for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional details about Progent's ISSAP Accredited Secure Network Architecture Engineering Services.

CISA Accredited Security Auditing Engineering Assistance
The CISA credential is a globally recognized qualification that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-certified IS security audit experts are available to assist your business in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Resources
  • Business Continuity Planning
Get additional details about Progent's CISA Qualified Network Security Auditing Consulting Assistance.

CRISC Experts
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's ability to design, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation experts can provide a range of risk identification services such as:

  • Gather data and review documentation to identify significant risk scenarios
  • Identify statutory, regulatory, and contractual requirements and organizational standards associated with your information system to assess their possible impact on your business goals
  • Point out possible vulnerabilities for your business workflows to assist in evaluating your enterprise risk
  • Create a risk awareness program and provide training to make sure your organization understand IS risk so they can assist with your risk control process
  • Connect key risk vectors to related business processes to help assign risk responsibility
  • Validate risk tolerance with your senior leadership and key stakeholders to ensure they are in agreement
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Engineering Expertise
Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security professionals. GIAC's mission is to make sure that a certified security consultant has the knowledge necessary to provide services in key areas of network, information, and program security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC security audit engineers are available to assist your IT organization in the areas of:

  • Auditing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Services.

Contact a Security Expert
To see how you can get in touch with a Progent security engineer for remote or onsite support in Idaho, call 1-800-993-9400 or go to Online Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.