Small business computer networks in the state of Idaho can now get prompt and economical remote help from Progent's accredited network security consultants to resolve critical security issues. Rates are reasonable, billing is per minute, engagement is fast, and support is world class. Progent also offers help for complex engagements that demand the knowledge of senior security engineers with high-level industry credentials.

If your Idaho organization is outside of larger urban neighborhoods like Boise City, Pocatello, Idaho Falls, or Lewiston, contact with local accredited security experts is often problematic when there's an emergency. This can result in a loss of revenue for your business, upset clients, unproductive employees, and distracted management. By utilizing Progent's online services, you have access to a qualified security engineer who can deliver assistance when you need it to get your information system running and salvage your information.

Progent can help you in a variety of ways in your initiatives to protect your network with support that can range from security checks to developing a comprehensive security plan. Progent offers affordable support to help companies of any size to configure and manage secure networks powered by Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver web-based control and comprehensive protection for all your email traffic. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also enable Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's certified experts are accessible remotely or on premises to provide a variety of urgent or project-based network security services such as:

  • Run thorough network security evaluations
  • Recover quickly after serious security breaches
  • Install effective firewalls
  • Implement safe techniques for offsite and mobile access
  • Deploy effective applications for automatic protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Services
  • Create an effective network backup and recovery plan based on Data Protection Manager backup/restore technology
If your business has an emergency need for computer security support, go to Progent's Emergency Remote Technical Help.

Progent's consultants offer world-class services in key fields of computer protection that include auditing, firewalls and VPN, and high-level security planning.

System Evaluation
Progent's expert security engineers can assess the effectiveness of your current network security systems through exhaustive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in this testing saves you money and offers an accurate picture of security holes. The information your IT organization gains can be used as the basis of a security plan that will permit your information system to run dependably and respond quickly to new threats.

Automated Security Audits
Progent provides expertise in the application of security analysis products including Microsoft's MBSA and GFI LANguard NSS for economically performing a variety of programmed system testing scans to identify potential security problems. Progent has extensive knowledge of additional security analysis tools such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to design protection into your company operations, configure auditing tools, plan and implement a secure network architecture, and recommend policies to maximize the security of your network. Progent's security consultants are available to show you how to set up a firewall, implement safe remote access to email and data, and install virtual private network. Find out additional information on Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to allow small companies to receive an impartial security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive examination of your IT infrastructure from outside your company firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from a secure computer inside your company firewall to evaluate your exposure to inside assaults. Both security inventory packages are configured and run from a secured remote site. The process is directed by an engineer with high-level security credentials and who generates a document that details and interprets the data collected by the scan and suggests practical improvements if called for.

Network Intrusion Analysis Support Services
Stealth intrusion checking is a key part of any comprehensive network security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's internal IT staff. Stealth penetration testing shows whether existing security defense systems such as intrusion incident warnings and event history analysis are correctly set up and actively monitored. Find out more about Progent's network penetration analysis support services.

Firewall/VPN Expertise
Progent's expertise in security solutions includes extensive field work with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Engineering Services
Cisco's network security and offsite access products provide a complete range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and CCNP qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Find out more details concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose appropriate technologies from multiple suppliers to support your security goals while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Security
Progent offers a collection of low-cost, set-price monthly managed services designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security companies to deliver web-based control and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, DLP, and encryption. The on-premises gateway can also assist Exchange Server to track and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely evade traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the entire malware attack lifecycle including protection, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates and monitors your backup processes and enables fast restoration of vital data, apps and VMs that have become unavailable or corrupted as a result of component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup.

Expert Security Design
Every company should develop a carefully thought out security program that incorporates both pre-attack procedures and reaction planning. The pre-attack strategy is a set of steps designed to minimize vulnerabilities. The reactive strategy assists your IT security engineers to evaluate the impact resulting from an attack, repair the network, document the experience, and get business functions running as quickly as possible.

Progent's certified IS security consultants can to assist you to run a comprehensive risk assessment and define a computer security strategy to implement security processes and mechanisms to mitigate future attacks and dangers.

CISM Certified Security Engineering Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and international standards of performance that information security professionals are expected to master. CISM gives executive management the confidence that consultants who have earned their CISM certification possess the background and capability to deliver effective security administration and consulting consulting. Progent can provide the support of CISM certified security consultants to help businesses with:

  • Information Security Strategies
  • Vulnerability Management
  • Network Security Program Management
  • Information Security Administration
  • Recovery Planning
Find out more information about Progent's CISM Accredited IS Security Support Expertise.

CISSP Accredited Security Consulting Expertise
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of information security defined by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out additional details concerning Progent's CISSP Qualified IS Security Engineering Professionals.

ISSAP Accredited Secure Network Architecture Consulting Services
Progent's ISSAP certified network architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous examination and significant experience with network security architecture. The ISSAP credential represents proven skill in the most in-depth demands of information system security architecture bounded by the broader scope of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of secure network architecture including.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Security
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional information concerning Progent's ISSAP Qualified Secure Network Architecture Support Expertise.

CISA Certified IS Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that represents expertise in information system security auditing. Accredited by ANSI, the CISA credential requires that consultants undergo a comprehensive test given by the ISACA professional association. Progent's CISA information security audit engineers are available to assist your IT organization in the areas of:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Learn the details about Progent's CISA Qualified Network Security Auditing Engineering Assistance.

CRISC Experts
The CRISC certification program was established by ISACA to validate a consultant's skills to design, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a business continuity strategy based on leading practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts can provide a variety of risk identification services including:

  • Gather data and review documentation to identify major risk scenarios
  • Inventory statutory, regulatory, and business mandates and organizational standards associated with your network to assess their potential impact on your strategic goals
  • Identify possible threats for your business processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders understand information system risk so they can contribute to your risk management process
  • Match key risk vectors to your associated operational processes to help assign risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to ensure they match
Learn more information concerning Progent's CRISC Consultants.

GIAC Accredited Security Consulting Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security professionals. GIAC's goal is to ensure that a certified professional possesses the knowledge necessary to deliver services in important categories of system, information, and application software security. GIAC accreditations are recognized by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC-certified network security audit specialists can help your company in the areas of:

  • Assessing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Certified Security Specialist
To learn how you can contact a certified Progent security consultant for online or onsite help in Idaho, phone 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.