Company computer networks in the state of Illinois can have prompt and affordable online help from Progent's qualified network security consultants to resolve critical security problems. Rates are reasonable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also offers help for complex projects that demand the expertise of senior security consultants with high-level security certifications.

In case your Illinois office is located outside of larger urban neighborhoods such as Chicago, Aurora, Rockford, or Naperville, support from nearby certified network security consultants is often limited during an urgent situation. This could mean a drop in productivity for your business, upset clients, unproductive employees, and defocused executives. By utilizing Progent's remote support, you can get in touch with a certified security engineer who can offer expertise whenever you need it to keep your network operating and salvage your data.

Progent can assist you in a variety of ways in your initiatives to protect your information system with support ranging from network security audits to creating a company-wide security strategy. Progent offers affordable support to help companies of any size to set up and maintain safe IT environments powered by Windows and Cisco technology and that can include servers and desktops based on UNIX or Linux operating systems plus BYOD clients with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the technology of leading information security companies to provide web-based management and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security consultants are available online or on site to offer a range of emergency or project-based IT security services including:

If your business has an urgent need for computer security support, go to Progent's Emergency Online Technical Support.

Progent's security experts provide world-class services in vital areas of system protection including auditing, firewall and VPN solutions, and high-level security consulting.

System Security Audits
Progent's certified security consultants can evaluate the vulnerability of your existing computer security environment through exhaustive remote automated testing based on sophisticated utilities and tested techniques. Progent's skill in this service saves you time and money and assures an objective picture of security holes. The knowledge your IT organization is provided can form the foundation of a security plan that will permit your information system to run safely and respond rapidly to new threats.

Automated Security Analysis
Progent offers consulting in the use of security evaluation packages including MBSA and LANguard from GFI for economically performing a set of automatic system testing scans to identify possible security vulnerabilities. Progent has broad experience with other network auditing products including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can help you build security into your company processes, configure auditing software, define and deploy a protected system environment, and suggest policies to maximize the security of your network. Progent's security professionals are able to assist you to configure a firewall, implement secure remote access to email and business applications, and install virtual private network. Learn more about Progent's network security audits.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory bundles intended to allow small companies to receive a professional network security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, a security engineer runs an extensive test of your network from beyond your company firewall to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a system scan from a secure computer inside your firewall to evaluate your exposure to internal attacks. The two security inventory services are configured and run from a secured remote location. The project is managed by an engineer with high-level security credentials and who produces a report that summarizes and analyzes the data collected by the security scan and suggests cost-effective improvements if called for.

Network Penetration Testing Support Services
Stealth intrusion checking is an important part of any comprehensive IT system security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your company's internal IT staff. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion incident warnings and event log analysis are properly set up and actively checked. Find out additional information about Progent's stealth penetration analysis support services.

Firewall/VPN Expertise
Progent's expertise in security solutions encompasses in-depth field work with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important industry certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your current PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and VPN Support Services
Cisco's network security and offsite connection technology represent a complete range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business objectives. Find out additional details concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security strategy and select the right technologies from multiple vendors to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to deliver web-based control and world-class security for your email traffic. The powerful architecture of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior machine learning tools to guard endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which easily escape traditional signature-based anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to manage the entire malware attack progression including filtering, identification, mitigation, cleanup, and forensics. Top capabilities include single-click rollback using Windows VSS and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. For a low monthly rate, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical data, applications and VMs that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your critical information. Read more about ProSight DPS Managed Backup.

Expert Security Consulting
Any business should develop a carefully thought out security program that includes both proactive procedures and response planning. The pre-attack plan is a set of steps that help to minimize security weaknesses. The post-attack strategy helps your IT security engineers to assess the damage caused by a security penetration, repair the damage, record the experience, and get business functions operational as rapidly as possible.

Progent's certified IT security engineers are available to assist you to perform a complete vulnerability evaluation and create a computer security plan to implement security processes and controls to mitigate future assaults and threats.

CISM Certified Network Security Engineering Services
The Certified Information Security Manager (CISM) organization defines the basic capabilities and global standards of skill that information security professionals are expected to master. CISM provides executive management the assurance that those who have qualified for their CISM credential have the experience and capability to provide effective security management and consulting consulting. Progent offers the expertise of CISM certified security professionals to assist companies with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Learn additional details about Progent's CISM Information Security Consulting Expertise.

CISSP Accredited Security Consulting Services
CISSP certification recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information protection under ISO 17024. Progent offers access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Find out additional details about Progent's CISSP Qualified Network Security Engineering Services.

ISSAP Qualified Secure Information System Architecture Engineering Expertise
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP Certification as a result of thorough testing and significant work with network security architecture. The ISSAP credential represents demonstrated skill in the most in-depth demands of information security architecture within the wider scope of information security expertise needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Control Systems and Techniques
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Read more details concerning Progent's ISSAP Accredited Secure System Architecture Engineering Expertise.

CISA Certified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a prestigious qualification that signifies expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates undergo a comprehensive test given by the ISACA professional association. Progent's CISA IS security audit experts can assist your business in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Get more information about Progent's CISA Qualified Security Auditing Engineering Services.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and support IS control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation consultants can provide a variety of risk identification services such as:

  • Collect information and study documentation to help identify major vulnerabilities
  • Inventory statutory, regulatory, and business requirements and company policies related to your network to assess their potential impact on your business objectives
  • Identify possible vulnerabilities for your operational processes to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct training to make sure your stakeholders understand IS risk so they can contribute to your risk management process
  • Connect key risk vectors to your associated business processes to help assign risk ownership
  • Determine risk tolerance with executive management and key stakeholders to ensure they match
Find out more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to verify that an accredited security consultant has the skills needed to provide services in critical categories of system, information, and application software security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified network security audit experts can help your business with:

Learn additional details about Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Engineer
To learn how you can get in touch with a security consultant for online or onsite support in Illinois, phone 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.