Company networks in Illinois can have fast and economical remote technical support from Progent's accredited network security engineers to assist with urgent security issues. Rates are affordable, billing is by the minute, sign-up is fast, and service is unbeatable. Progent also offers assistance for complex engagements that demand the expertise of seasoned security engineers with high-level security certifications.

In case your Illinois network is situated some distance from more populated metropolitan neighborhoods like Chicago, Aurora, Rockford, or Naperville, contact with local accredited network security experts could be limited when you have a crisis. This can cause lost productivity for your company, upset customers, unproductive workers, and defocused management. By calling Progent's remote support, you can get in touch with a qualified security professional ready to offer help when you have to have it to keep your system running and restore your information.

Progent can help you in all your efforts to defend your information system with support services ranging from security assessments to developing a company-wide security strategy. Progent provides affordable support to assist companies of any size to set up and maintain protected IT environments powered by Windows and Cisco products and that may include servers and desktops running UNIX or Linux operating systems as well as BYOD clients with Apple handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security vendors to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified engineers are available online or on site to offer a range of emergency or project-based network security services such as:

  • Perform automated network security audits
  • Clean up rapidly after serious security breaches
  • Install firewalls from multiple vendors
  • Configure secure solutions for remote and mobile connectivity
  • Deploy advanced utilities for automatic protection against spam and DHAs
  • Help create a company-wide security plan with 24x7 security monitoring
  • Offer outsourced Call Center Support
  • Develop a practical network backup and restore strategy based on Microsoft Data Protection Manager backup capability
If your business has an urgent need for IT security help, refer to Progent's Emergency Online Network Help.

Progent's support professionals can deliver advanced services in vital areas of network protection including auditing, firewall and VPN solutions, and advanced security consulting.

Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your current network protection environment through exhaustive remote automated testing via advanced utilities and proven procedures. Progent's skill in administering this testing saves you money and assures an objective portrayal of security holes. The knowledge your business is provided can be used as the foundation of a security strategy that will permit your information system to run safely and react rapidly to future threats.

Automated Vulnerability Evaluation
Progent offers expertise in the application of security auditing packages including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically performing a set of automatic network testing scans to uncover possible security gaps. Progent has extensive knowledge of additional security auditing products including NMAP, AMAP, eEye, as well as tools like Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to build protection into your business processes, install scanning applications, define and deploy a secure system architecture, and suggest procedures to maximize the security of your IT system. Progent's security engineers are ready to assist you to set up a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's automated security audits.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages designed to allow small companies to get an impartial network security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, an engineer administers an extensive examination of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from a secure computer inside your company firewall to evaluate the risk to internal attacks. Both security inventory services are configured and run from a protected external location. The project is managed by an engineer with top security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and proposes cost-effective remediation if appropriate.

Stealth Penetration Testing Support Services
Stealth penetration checking is an important component of any serious network security plan. Progent’s security professionals can perform thorough penetration tests without the awareness of your company's in-house network support resources. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event log analysis are properly configured and consistently monitored. Learn additional information about Progent's network penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology includes in-depth field work with leading firewalls and Virtual Private Network technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's network security and remote connection products provide a comprehensive range of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your business objectives. Find out additional information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Support Expertise for Other Firewall and VPN Products
Progent provides small and medium size companies expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select the right products from multiple vendors to achieve your security goals while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis tools to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and offers a unified platform to automate the complete malware attack progression including protection, detection, mitigation, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to plan and implement a ProSight ESP environment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent can also help you to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup activities and allows fast recovery of critical files, apps and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading data security vendors to provide centralized control and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further level of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, DLP, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to a different hardware environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard information related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can save as much as half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you’re planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Planning
Any business ought to develop a carefully considered security strategy that incorporates both preventive processes and reaction plans. The proactive plan is a collection of procedures that help to reduce vulnerabilities. The reactive plan helps your security engineers to assess the damage resulting from a security penetration, repair the damage, document the event, and get business functions restored as soon as possible.

Progent's certified IS security consultants can to help your company to run a complete risk assessment and create a network security plan to implement security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Qualified Security Engineering Services
The Certified Information Security Manager (CISM) committee defines the core competencies and global standards of performance that IT security managers are expected to learn. CISM gives executive management the confidence that consultants who have qualified for their CISM certification possess the experience and knowledge to deliver effective security management and consulting consulting. Progent can provide the services of CISM certified security professionals to assist companies with:

  • IS Security Strategies
  • Risk Management
  • Network Security Program Management
  • Network Security Administration
  • Response Planning
Learn more details concerning Progent's CISM IS Security Support Professionals.

CISSP Qualified Security Consulting Support
CISSP recognizes expertise with a worldwide standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data protection under ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Learn additional details concerning Progent's CISSP-certified Network Security Consulting Services.

CISSP-ISSAP Accredited Secure Network Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified system architecture professionals are experts who have been awarded ISSAP Certification through rigorous examination and extensive work with information security architecture. The ISSAP certification represents demonstrated competence in the most complex demands of information system security architecture within the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your business with all phases of architecture security such as.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Learn additional details about Progent's ISSAP Certified Secure System Architecture Consulting Expertise.

CISA Accredited IS Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a globally recognized qualification that represents mastery in IS security auditing. Certified by the American National Standards Institute, the CISA credential has consultants pass a comprehensive test given by the ISACA professional group. Progent's CISA-qualified IS security audit engineers can assist your IT organization with:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Architecture Lifecycle
  • Information Technology Support
  • Protecting Data Resources
  • Business Continuity Planning
Get additional information about Progent's CISA Qualified Information System Security Auditing Engineering Assistance.

CRISC Experts
The CRISC certification program was established by ISACA in 2010 to validate a consultant's skills to design, deploy, and support information system controls to reduce risk. Progent offers the services of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk management experts offer a variety of risk evaluation services such as:

  • Collect data and review documentation to identify significant risk scenarios
  • Identify legal, regulatory, and business mandates and organizational standards associated with your network to determine their potential influence on your strategic goals
  • Identify possible threats for your business processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct seminars to ensure your stakeholders understand IT risk so they can contribute to your risk control program
  • Connect key risk vectors to related business processes to help assign risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to ensure they align
Get more details about Progent's CRISC Risk Management Experts.

GIAC Qualified Information System Security Consulting Services
GIAC was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to verify that a certified professional has the skills needed to provide support in critical categories of system, data, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC network security audit consultants are available to assist your IT organization with:

  • Assessing Networks
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Expert
To find out how you can get in touch with a certified Progent security consultant for remote or onsite assistance in Illinois, phone 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2019 Progent Corporation. All rights reserved.