Small business IT networks in the state of Illinois can now get quick and affordable online help from Progent's accredited security consultants to fix the toughest security problems. Rates are competitive, charges are per minute, engagement is quick, and support is unbeatable. Progent also provides assistance for complex engagements that demand the services of seasoned security engineers with high-level industry credentials.

In case your Illinois company is situated away from major metropolitan areas like Chicago, Aurora, Rockford, or Naperville, support from local qualified security engineers is often problematic when you have a crisis. This can result in lost revenue for your business, upset customers, unproductive employees, and defocused executives. By utilizing Progent's remote support, you can get in touch with a certified security consultant ready to deliver assistance whenever you have to have it to get your system on line and restore your data.

Progent can help you in your initiatives to defend your network with support that can range from security audits to creating a comprehensive security strategy. Progent provides economical service to help companies of any size to configure and maintain protected networks based on Windows and Cisco products and that may include computers based on UNIX or Linux operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security companies to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays within your corporate firewall.

Progent's security engineers are accessible online or on site to provide a variety of emergency or longer-term network security services including:

  • Run automated security audits
  • Recover quickly after serious security breaches
  • Set up effective firewalls
  • Implement safe methods for offsite and mobile connectivity
  • Deploy advanced solutions for automatic defense against spam and DHAs
  • Develop a comprehensive security plan with 24x7 monitoring
  • Offer comprehensive Call Center Services
  • Develop an effective backup and restore plan centered on Microsoft DPM automated backup technology
If your business has an immediate need for IT security support, refer to Progent's Emergency Online Network Support.

Progent's support professionals provide advanced support in key fields of network security including security assessment, firewall and VPN expertise, and high-level security consulting.

System Security Audits
Progent's certified security engineers can evaluate the effectiveness of your current network security systems by performing comprehensive remote automated testing via sophisticated software tools and proven techniques. Progent's skill in administering this testing saves you consulting fees and offers an objective picture of gaps. The information your business is provided can make up the basis of a network protection strategy that will allow your information system to operate safely and respond rapidly to future threats.

Automated Vulnerability Evaluation
Progent offers expertise in the use of security evaluation software including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a variety of automatic system auditing scans to uncover potential security problems. Progent has broad experience with additional security analysis utilities including NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can show you how to build protection into your company processes, install scanning applications, define and deploy a protected network architecture, and suggest procedures to optimize the security of your network. Progent's security consultants are ready to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and integrate virtual private network. Learn additional information concerning Progent's network security assessment.

Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory service bundles designed to allow small companies to receive an objective security evaluation from a certified security consultant. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive test of your network from beyond your company firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer runs a system scan from an authorized computer inside your company firewall to evaluate the risk to internal attacks. Both security inventory services are set up and executed from a protected remote location. The process is overseen by a consultant with top security accreditations and who produces a report that details and analyzes the data collected by the scan and proposes practical improvements if called for.

Stealth Penetration Analysis Support Services
Stealth penetration checking is an important component of any comprehensive network security strategy. Progentís security professionals can run thorough penetration checks without the awareness of your company's internal IT resources. Unannounced penetration checking shows whether existing security defense tools such as intrusion incident alerts and event history analysis are correctly set up and actively monitored. Learn additional information about Progent's network penetration analysis consulting.

Firewall/VPN Support
Progent's background in network security technology encompasses in-depth field work with major firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of engineers with important industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your current PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and remote access products provide a full line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to help your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Find out more details about Progent's Consulting Services for Cisco Security Technology and VPN Appliances.

Consulting Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a detailed security strategy and select appropriate technologies from multiple vendors to achieve your security objectives while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security vendors to deliver web-based management and world-class protection for your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's onsite gateway appliance adds a further level of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely get by traditional signature-matching AV tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete malware attack lifecycle including protection, identification, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast restoration of vital files, apps and VMs that have become lost or damaged due to component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical data. Learn more about ProSight DPS Managed Backup.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Security Design
Any business should have a carefully considered security strategy that includes both pre-attack procedures and response plans. The proactive strategy is a set of procedures designed to reduce vulnerabilities. The reactive strategy helps your company's IT security engineers to evaluate the impact caused by an attack, repair the system, document the event, and get the IT network restored as rapidly as feasible.

Progent's expert IT security consultants can to help your business to run a complete vulnerability evaluation and create a computer security plan to implement security policies and mechanisms to mitigate ongoing attacks and dangers.

CISM Certified Security Engineering Expertise
The Certified Information Security Manager (CISM) committee defines the basic competencies and international standards of performance that IT security professionals are required to learn. CISM gives business management the assurance that those who have earned their CISM credential have the experience and knowledge to deliver effective security management and consulting services. Progent can provide the support of CISM qualified security professionals to assist businesses with:

  • IS Security Strategies
  • Risk Management
  • Network Security Program Management
  • Information Security Management
  • Response Planning
Find out additional information concerning Progent's CISM Network Security Support Services.

CISSP Accredited Security Engineering Expertise
CISSP denotes mastery of a global standard for data security. The American National Standards Institute has awarded certification accreditation in the area of data protection stipulated by ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a variety security areas such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISSP Network Security Support Expertise.

ISSAP Qualified Secure Information System Architecture Consulting Services
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP Certification through rigorous testing and extensive experience with network security design. The ISSAP certification represents proven skill in the more challenging demands of information system security architecture bounded by the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Cryptography Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional details concerning Progent's ISSAP Qualified Secure System Architecture Consulting Expertise.

CISA Qualified Network Security Auditing Engineering Expertise
The CISA credential is a recognized achievement that represents expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates undergo an extensive test given by the ISACA professional group. Progent's CISA network security audit consultants are available to assist your business with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Get additional information concerning Progent's CISA Qualified Security Auditing Consulting Expertise.

CRISC Experts
The CRISC program was initiated by ISACA to verify a consultant's skills to plan, deploy, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and carry out a business continuity plan that follows industry best practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management consultants offer a range of risk evaluation services including:

  • Collect information and study documentation to evaluate significant vulnerabilities
  • Identify statutory, industry, and contractual requirements and organizational standards related to your network to assess their possible influence on your strategic goals
  • Identify potential vulnerabilities for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and provide training to ensure your stakeholders understand IS risk so they can assist with your risk management process
  • Match identified risk vectors to related operational processes to help assign risk ownership
  • Validate risk appetite with your senior management and major stakeholders to ensure they align
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Consulting Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security professionals. GIAC's mission is to make sure that an accredited professional possesses the skills appropriate to deliver support in important areas of network, data, and software security. GIAC certifications are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit specialists are available to help your IT organization in the areas of:

Find out additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Certified Progent Security Engineer
To find out how you can get in touch with a Progent security engineer for remote or onsite assistance in Illinois, call 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.