Business information networks in Idaho can depend on prompt and economical remote technical support from Progent's qualified security consultants to fix complex security problems. Rates are reasonable, charges are by the minute, sign-up is quick, and support is world class. Progent also provides assistance for long-term projects that requires the knowledge of seasoned security engineers with top security credentials.

If your Idaho business is away from major urban neighborhoods including Boise City, Pocatello, Idaho Falls, or Lewiston, help from local certified security professionals is often problematic when there's a security disaster. This can result in a loss of income for your company, upset customers, unproductive workers, and distracted executives. By calling Progent's remote support, you have access to a certified security engineer who can provide help whenever you require it to get your network on line and recover your data.

Progent can help you in all your efforts to protect your information system with support that ranges from security checks to creating a company-wide security strategy. Progent provides affordable service to assist small and midsize companies to design and maintain safe IT environments powered by Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security platform that incorporates the technology of top information security companies to provide web-based management and comprehensive security for your email traffic. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's certified engineers are available online or on premises to offer a range of urgent or project-based network security services including:

  • Perform extensive security audits
  • Recover rapidly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Configure secure solutions for offsite and mobile connectivity
  • Install effective software for automatic defense against viruses, spam and directory harvest attacks
  • Help create a comprehensive security strategy with round-the-clock monitoring
  • Provide outsourced Call Center Support
  • Help Develop a practical backup and disaster recovery strategy built around Data Protection Manager (DPM) backup technology
If your network has an emergency requirement for IT security help, refer to Progent's Urgent Online Network Support.

Progent's security experts provide advanced support in vital areas of computer protection including auditing, firewall/VPN support, and advanced security planning.

System Security Assessment
Progent's certified security consultants can evaluate the effectiveness of your existing computer security implementation by performing comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in administering this service saves you consulting fees and assures an accurate portrayal of security holes. The information your company gains can make up the basis of a security strategy that will permit your network to operate dependably and adapt rapidly to future threats.

Automated Network Vulnerability Audits
Progent offers expertise in the application of security analysis software including MBSA and GFI LANguard NSS for economically running a set of programmed system testing checks to identify potential security problems. Progent has extensive knowledge of additional security analysis products including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design security into your company operations, install auditing applications, plan and implement a protected system environment, and suggest policies to maximize the safety of your network. Progent's security consultants are ready to assist you to configure a firewall, implement safe remote access to email and business applications, and integrate virtual private network. Find out additional information about Progent's network security audits.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to enable small companies to get an impartial security assessment from an accredited security engineer. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your network from outside your firewalled perimeter to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from an authorized machine within your firewall to assess the risk to inside threats. Both security inventory services are set up and executed from a secured remote site. The project is overseen by an engineer who has earned high-level security credentials and who produces a document that details and interprets the data captured by the scan and proposes practical remediation if appropriate.

Network Penetration Analysis Consulting
Stealth intrusion testing is an important part of any successful IT system security plan. Progentís security experts can run extensive penetration tests without the knowledge of your organization's in-house IT resources. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident alerts and event log monitoring are properly configured and consistently monitored. Find out additional information on Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security solutions encompasses extensive field work with major firewalls and VPN products offered by multiple companies including Cisco, Microsoft, and Juniper. Progent offers the services of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Consulting Expertise
Cisco's security and remote access products offer a comprehensive line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Find out more information about Progent's Consulting Services for Cisco Security and Virtual Private Network Products.

Support Services for Additional Firewall and VPN Technology
Progent provides small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose appropriate products from a variety of suppliers to support your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top information security vendors to provide web-based control and world-class protection for all your email traffic. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of analysis for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based machine learning tools to defend endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-based AV products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete malware attack lifecycle including blocking, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup activities and enables fast restoration of critical files, applications and VMs that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as 50% of time spent looking for critical information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Planning
Any company should develop a carefully considered security strategy that includes both pre-attack processes and response planning. The proactive plan is a set of steps designed to minimize vulnerabilities. The reactive plan assists your security personnel to evaluate the impact caused by an attack, repair the damage, record the event, and get the IT network restored as soon as possible.

Progent's certified IT security engineers are available to assist your business to perform a complete risk assessment and define a company-wide security plan to implement security processes and mechanisms to reduce future assaults and dangers.

CISM Accredited Information Security Support Expertise
The CISM organization defines the basic competencies and global standards of skill that IT security professionals are required to master. It gives business management the assurance that consultants who have qualified for their CISM credential have the experience and capability to provide effective security administration and consulting services. Progent offers the expertise of CISM certified security consultants to help businesses with:

  • Information Security Processes
  • Vulnerability Management
  • Network Security Program Management
  • IS Security Administration
  • Recovery Planning
Learn additional information about Progent's CISM Accredited Information Security Engineering Expertise.

CISSP Qualified Security Consulting Assistance
CISSP denotes expertise with a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security defined by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your business in a broad range of security areas including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Planning
Find out more information about Progent's CISSP Accredited Security Support Expertise.

ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's ISSAP qualified information system architecture engineers are experts who have earned ISSAP status as a result of rigorous examination and extensive experience with network security architecture. The ISSAP credential indicates demonstrated mastery in the more in-depth demands of IS security architecture within the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your business with all phases of architecture security including.

  • Access Control Systems and Methodologies
  • Telecommunications and Network Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Read additional details concerning Progent's ISSAP Certified Secure Network Architecture Support Expertise.

CISA Qualified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is an important achievement that represents expertise in network security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants undergo an extensive examination administered by the ISACA international professional group. Progent's CISA-qualified network security audit experts are available to assist your company with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Resources
  • Business Continuity Planning
Get the details about Progent's CISA Qualified Security Auditing Consulting Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's skills to plan, deploy, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation experts can provide a variety of risk evaluation services including:

  • Collect information and review documentation to identify significant risk scenarios
  • Identify statutory, regulatory, and contractual mandates and organizational standards associated with your network to determine their possible impact on your strategic goals
  • Identify potential vulnerabilities for your operational workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness program and conduct training to make sure your stakeholders appreciate IT risk so they can assist with your risk control program
  • Connect key risk vectors to your associated operational processes to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they align
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Information System Security Consulting Services
GIAC was established in 1999 to certify the skill of computer security engineers. GIAC's mission is to verify that an accredited professional possesses the skills appropriate to deliver support in vital categories of network, data, and software security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC information security audit engineers are available to assist your IT organization in the areas of:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Specialist
To learn how you can access a Progent security consultant for online or on-premises assistance in Idaho, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.