Small business computer networks in Illinois can have fast and economical online access to Progent's qualified security engineers to fix the toughest security issues. Rates are affordable, billing is per minute, sign-up is fast, and support is unbeatable. Progent also offers help for long-term engagements that demand the knowledge of senior security engineers with top security certifications.

If your Illinois organization is located far from larger urban areas like Chicago, Aurora, Rockford, or Naperville, support from local certified network security support specialists is often limited when there's an urgent situation. This can result in lost revenue for your company, angry clients, idle workers, and defocused management. By calling Progent, you can get in touch with a qualified security consultant ready to offer expertise when you have to have it to keep your network running and recover your information.

Progent can assist you in a variety of ways in your initiatives to protect your IT environment with support ranging from network security audits to developing a company-wide security plan. Progent offers affordable support to help small and midsize companies to set up and manage safe IT environments powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to provide web-based management and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper level of inspection for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also enable Exchange Server to track and safeguard internal email that stays within your security perimeter.

Progent's certified professionals are accessible remotely or on site to offer a variety of urgent or longer-term computer security services including:

  • Run thorough security evaluations
  • Recuperate promptly after virus and worm attacks
  • Set up and troubleshoot firewalls
  • Implement safe solutions for offsite and mobile access
  • Deploy effective software for protection against spam and DHAs
  • Develop a comprehensive security strategy with proactive security monitoring
  • Offer comprehensive Call Center Support
  • Create a practical network backup and business continuity solution centered on Microsoft DPM automated backup technology
If your business has an emergency requirement for computer security help, refer to Progent's Urgent Online Network Help.

Progent's consultants can deliver advanced support in vital facets of computer protection that include analysis, firewalls and VPN, and advanced security planning.

Security Audits
Progent's expert security engineers can assess the effectiveness of your existing network security environment by performing comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's skill in administering this service saves your company time and money and assures an accurate picture of security holes. The information your company is provided can be used as the basis of a network protection strategy that can allow your network to run safely and respond quickly to new threats.

Automated Vulnerability Evaluation
Progent provides consulting in the application of security evaluation utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of automatic network testing checks to identify possible security holes. Progent has extensive experience with other security auditing products including NMAP Port Scanner, AMAP, eEye, as well as tools like Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build security into your business processes, configure auditing software, plan and deploy a secure network architecture, and suggest policies to maximize the security of your IT system. Progent's security professionals are available to help you configure a firewall, implement safe remote access to email and data, and install VPN. Learn more concerning Progent's network security assessment.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles intended to allow small companies to receive an independent network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your network from beyond your firewall to determine potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your firewall to determine your exposure to internal attacks. The two security inventory packages are set up and executed from a secured remote location. The process is directed by a consultant who has earned top security accreditations and who generates a document that summarizes and analyzes the data collected by the scan and proposes cost-effective improvements where called for.

Stealth Penetration Testing Consulting
Stealth penetration checking is a key part of any serious IT system security plan. Progentís security experts can run extensive intrusion tests without the knowledge of your company's internal IT staff. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion detection warnings and event log monitoring are correctly set up and actively checked. Find out additional information on Progent's stealth penetration testing consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your current PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and remote access technology provide a full line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Read more information concerning Progent's Support Expertise for Cisco Security Technology and VPN Appliances.

Support Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and medium size organizations professional support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and select appropriate technologies from multiple suppliers to support your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a selection of low-cost, set-price monthly managed services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to deliver web-based management and world-class security for your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based machine learning tools to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to address the entire malware attack progression including protection, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical data, apps and VMs that have become lost or damaged due to hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as IPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

Certified Network Security Planning
Every company should develop a carefully thought out security strategy that incorporates both preventive processes and reaction planning. The pre-attack strategy is a set of procedures intended to minimize security weaknesses. The reactive strategy helps your company's IT security personnel to evaluate the impact resulting from an attack, fix the system, record the experience, and get the IT network operational as rapidly as feasible.

Progent's expert information security engineers can to help you to run a comprehensive risk evaluation and create a computer security strategy to establish security policies and mechanisms to minimize future attacks and dangers.

CISM Certified Network Security Consulting Services
The CISM organization defines the core competencies and international standards of performance that IT security managers are expected to learn. CISM provides executive management the assurance that those who have qualified for their CISM certification possess the experience and knowledge to provide effective security administration and consulting services. Progent offers the support of CISM certified security consultants to assist companies with:

  • Information Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Information Security Management
  • Recovery Planning
Learn additional details concerning Progent's CISM Qualified Security Engineering Services.

CISSP Qualified Security Engineering Support
CISSP recognizes expertise with an international standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of data protection under ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Read more information concerning Progent's CISSP Qualified IS Security Engineering Professionals.

ISSAP Qualified Secure System Architecture Consulting Support
Progent's ISSAP certified IT architecture professionals are experts who have been awarded ISSAP Certification through rigorous testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the more complex demands of information security architecture bounded by the broader scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional information concerning Progent's ISSAP Certified Secure Network Architecture Engineering Services.

CISA Certified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that signifies expertise in network security audit and control. Certified by ANSI, the CISA accreditation has candidates undergo an extensive examination given by the ISACA international professional association. Progent's CISA-qualified information security audit specialists are available to help your company with:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Learn more information concerning Progent's CISA Accredited IS Security Auditing Engineering Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to design, deploy, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to help you to develop and execute a business continuity plan that follows industry best practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management specialists can provide a range of risk identification services such as:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory statutory, regulatory, and contractual mandates and company standards related to your network to determine their potential impact on your strategic objectives
  • Point out possible vulnerabilities for your operational processes to help in analyzing your corporate risk
  • Create a risk awareness program and conduct seminars to make sure your organization appreciate IT risk so they can contribute to your risk management process
  • Match key risk scenarios to your associated business processes to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to make sure they align
Learn additional details concerning Progent's CRISC Experts.

GIAC Certified Network Security Consulting Services
GIAC was established in 1999 to certify the skill of network security experts. GIAC's goal is to ensure that a certified security consultant possesses the knowledge necessary to provide services in important areas of system, information, and application software security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC-qualified network security audit consultants are available to assist your business in the areas of:

  • Auditing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Progent Security Specialist
To find out how to contact a certified Progent security consultant for remote or on-premises support in Illinois, call 1-800-993-9400 or visit Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.