Business IT networks in Idaho can have fast and economical remote access to Progent's certified security consultants to assist with the toughest security problems. The cost is reasonable, billing is per minute, engagement is quick, and service is world class. Progent also offers help for long-term projects that demand the services of senior security consultants with high-level security credentials.

In case your Idaho business is based far from larger metropolitan areas such as Boise City, Pocatello, Idaho Falls, or Lewiston, help from nearby certified security experts is often limited when you have a security disaster. This can result in a drop in revenue for your business, upset customers, unproductive workers, and defocused executives. By calling Progent, you have access to a qualified security consultant ready to offer help when you need it to get your system on line and salvage your information.

Progent can assist you in all your efforts to defend your IT environment with support ranging from network security assessments to developing a company-wide security plan. Progent offers economical service to help small and midsize companies to design and maintain protected IT environments based on Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security companies to deliver centralized management and comprehensive security for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most threats from making it to your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's security engineers are available online or on site to offer a variety of urgent or project-based network security services such as:

  • Perform extensive security evaluations
  • Recuperate promptly after serious security breaches
  • Set up effective firewalls
  • Implement secure methods for remote and mobile connectivity
  • Install advanced utilities for protection against viruses, spam and DHAs
  • Help create a comprehensive security plan with 24x7 monitoring
  • Offer comprehensive Help Desk Call Center Services
  • Develop a practical data backup and restore solution built around Data Protection Manager backup/restore technology
If your business has an emergency requirement for computer security help, refer to Progent's Urgent Online Technical Help.

Progent's security experts provide advanced support in key areas of system protection including security assessment, firewalls and VPN, and high-level security planning.

Security Evaluation
Progent's expert security engineers can assess the vulnerability of your current computer security systems by performing comprehensive remote automated testing based on advanced software tools and proven procedures. Progent's skill in this service saves your company time and money and assures an objective portrayal of security holes. The knowledge your IT organization is provided can be used as the foundation of a network protection strategy that can permit your network to operate safely and react quickly to new risks.

Automated Vulnerability Analysis
Progent provides expertise in the application of security analysis products such as MBSA and GFI LANguard NSS for affordably performing a set of programmed system testing scans to identify possible security holes. Progent has broad knowledge of additional network auditing tools including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Netcat, and Nikto. Progent can help you to understand audit reports and respond appropriately.

Progent can help you build security into your business processes, configure scanning applications, define and deploy a protected network architecture, and recommend policies to maximize the security of your IT system. Progent's security engineers are able to assist you to set up a firewall, implement secure remote connectivity to email and data, and install virtual private network. Learn more concerning Progent's network security analysis.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory packages designed to enable small companies to receive a professional security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from a secure machine within your firewall to assess your exposure to internal assaults. The two security inventory packages are configured and executed from a secured remote location. The project is directed by an engineer who has earned top security credentials and who produces a document that summarizes and analyzes the information captured by the scan and suggests cost-effective remediation if called for.

Network Penetration Analysis Support Services
Stealth intrusion testing is a key component of any successful network security strategy. Progent’s security professionals can perform thorough intrusion tests without the awareness of your company's in-house IT staff. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion detection warnings and event log monitoring are properly set up and consistently checked. Learn additional information on Progent's stealth penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security solutions includes extensive field work with leading firewalls and VPN technology offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with key networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access products provide a full line of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Read additional details about Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select the right technologies from a variety of suppliers to achieve your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior analysis tools to guard endpoints as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily get by traditional signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to automate the complete malware attack progression including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your company's specific needs and that helps you demonstrate compliance with government and industry data security regulations. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also help your company to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of critical data, applications and VMs that have become lost or damaged as a result of component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security vendors to provide centralized management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual host configured and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved easily to an alternate hardware solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to half of time wasted searching for vital information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Consulting
Every company ought to have a thoroughly thought out security program that incorporates both preventive processes and response planning. The proactive strategy is a collection of mechanisms intended to reduce security weaknesses. The reactive strategy assists your network security personnel to evaluate the impact caused by a security penetration, fix the damage, document the event, and get the IT network operational as soon as feasible.

Progent's expert information security engineers are available to help your company to perform a complete risk evaluation and define a computer security strategy to implement security processes and mechanisms to reduce future attacks and dangers.

CISM Certified Security Support Services
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of skill that IT security professionals are required to learn. It gives business management the confidence that those who have earned their CISM credential possess the background and capability to provide efficient security management and consulting consulting. Progent offers the services of CISM qualified security consultants to assist companies with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Implementation Management
  • IS Security Management
  • Response Management
Read more information concerning Progent's CISM Accredited Security Consulting Expertise.

CISSP Certified Security Consulting Expertise
The CISSP credential denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of information security defined by ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Find out additional information concerning Progent's CISSP Accredited Cybersecurity Support Expertise.

CISSP-ISSAP Accredited Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the more challenging demands of information security architecture bounded by the broader scope of IS security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all phases of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Physical Security
Read more information concerning Progent's ISSAP Qualified Secure System Architecture Consulting Expertise.

CISA Accredited Network Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates mastery in IS security auditing. Accredited by ANSI, the CISA accreditation requires that consultants pass an extensive examination administered by the ISACA international professional group. Progent's CISA-certified IS security audit specialists can assist your IT organization with:

  • IS Audit Services
  • IT Governance
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Information Assets
  • Business Continuity Planning
Find out more information about Progent's CISA Accredited IS Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to design, deploy, and maintain information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help you to develop and carry out a workplace continuity plan that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC IT risk management experts can provide a range of risk identification services such as:

  • Collect information and study documentation to help identify significant risk scenarios
  • Inventory statutory, industry, and business mandates and company policies associated with your network to determine their possible influence on your strategic objectives
  • Identify potential vulnerabilities for your operational processes to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk control program
  • Connect key risk vectors to your associated business procedures to help determine risk ownership
  • Validate risk appetite with executive management and major stakeholders to ensure they are in agreement
Find out more details concerning Progent's CRISC Risk Management Experts.

GIAC Qualified Information System Security Consulting Support
GIAC was founded in 1999 to validate the knowledge of network security professionals. GIAC's goal is to verify that an accredited security consultant possesses the knowledge needed to deliver support in key categories of network, information, and application software security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC security audit specialists are available to help your company with:

  • Auditing Security Systems
  • Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Read more details about Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Engineer
To see how you can contact a Progent security engineer for remote or onsite expertise in Idaho, phone 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2019 Progent Corporation. All rights reserved.