Business computer networks in the state of Illinois can have fast and economical online help from Progent's accredited security support specialists to help with complex security issues. Rates are affordable, charges are by the minute, engagement is fast, and support is world class. Progent also provides assistance for long-term engagements that demand the services of seasoned security engineers with top industry certifications.

In case your Illinois office is located outside of more populated metropolitan areas like Chicago, Aurora, Rockford, or Naperville, support from local certified security experts may be limited when you have an urgent situation. This could mean a loss of productivity for your company, angry clients, idle workers, and distracted executives. By utilizing Progent's remote support, you can get in touch with a certified security engineer who can deliver expertise whenever you require it to keep your network on line and recover your information.

Progent can assist you at any level in your initiatives to defend your information system with support that can range from network security assessments to creating a company-wide security strategy. Progent provides affordable support to assist businesses of all sizes to configure and manage protected IT environments powered by Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security vendors to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard combines cloud-based filtering with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's on-premises gateway device adds a further level of analysis for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's certified professionals are accessible online or in person to provide a range of emergency or longer-term computer security services such as:

  • Perform automated network security audits
  • Recover rapidly after attacks
  • Set up firewalls from multiple vendors
  • Implement safe techniques for remote and mobile access
  • Install advanced applications for automatic defense against viruses, spam and directory harvest attacks
  • Develop a company-wide security strategy with round-the-clock monitoring
  • Provide comprehensive Help Desk Services
  • Help Develop a practical data backup and business continuity solution centered on Microsoft DPM backup/restore capability
If your network has an urgent need for IT security support, refer to Progent's Urgent Remote Network Help.

Progent's consultants can deliver advanced support in vital fields of computer protection including analysis, firewall/VPN support, and advanced security consulting.

Security Assessment
Progent's certified security engineers can assess the effectiveness of your existing computer protection environment through exhaustive remote automated analysis via advanced software tools and proven techniques. Progent's skill in administering this testing saves your company time and money and assures an accurate picture of system vulnerability. The knowledge your business is provided can form the basis of a network protection plan that will permit your information system to run dependably and react quickly to future threats.

Automated Network Security Analysis
Progent provides expertise in the application of security testing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a variety of automatic system auditing checks to uncover possible security vulnerabilities. Progent has broad experience with additional security analysis utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can help you build protection into your company processes, configure scanning applications, define and implement a secure network environment, and suggest procedures to maximize the security of your IT system. Progent's security consultants are able to show you how to configure a firewall, design secure remote access to email and data, and integrate virtual private network. Learn additional information on Progent's automated security audits.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles intended to allow small businesses to receive an independent security assessment from a certified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive examination of your network from outside your company firewall to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from a secure machine within your firewall to evaluate your exposure to internal attacks. The two security inventory packages are configured and executed from a secured external location. The process is managed by a consultant who has earned top security accreditations and who produces a document that details and analyzes the data captured by the security scan and proposes cost-effective improvements where appropriate.

Stealth Penetration Testing Consulting
Stealth intrusion testing is an important part of any serious network security plan. Progentís security professionals can perform extensive intrusion tests without the knowledge of your organization's in-house IT resources. Unannounced penetration testing shows whether current security monitoring tools such as intrusion incident warnings and event history monitoring are properly set up and consistently checked. Learn additional information about Progent's network security penetration analysis consulting.

Firewall/VPN Expertise
Progent's background in network security technology includes extensive familiarity with leading firewalls and Virtual Private Network technology offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned key networking certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, optimize, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access products provide a full range of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company goals. Learn additional details concerning Progent's Engineering Services for Cisco Security Technology and VPN Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size businesses expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security plan and choose appropriate products from multiple suppliers to support your security goals while sticking within your budget limits.

Certified Security Consulting
Every business should have a carefully considered security strategy that incorporates both preventive procedures and response plans. The proactive strategy is a collection of steps that help to reduce security weaknesses. The post-attack strategy helps your IT security engineers to assess the damage resulting from an attack, repair the damage, document the experience, and get business functions operational as soon as possible.

Progent's expert information security engineers are available to assist you to perform a complete vulnerability evaluation and define a network security strategy to implement security processes and mechanisms to mitigate ongoing attacks and threats.

CISM Qualified Information Security Engineering Assistance
The Certified Information Security Manager (CISM) organization describes the core capabilities and international standards of skill that information security professionals are required to learn. It provides business management the confidence that consultants who have earned their CISM credential possess the experience and knowledge to deliver effective security management and support consulting. Progent offers the services of CISM certified security consultants to help businesses with:

  • IS Security Strategies
  • Risk Analysis
  • Network Security Implementation Management
  • Network Security Administration
  • Recovery Planning
Read additional information concerning Progent's CISM Accredited IS Security Support Expertise.

CISSP Accredited Security Engineering Expertise
CISSP certification recognizes expertise with a global standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of information protection under ISO 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your company in a variety security fields including:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Find out additional information concerning Progent's CISSP IS Security Support Services.

ISSAP Certified Secure IT Architecture Consulting Support
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous examination and significant experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the most complex requirements of information security architecture bounded by the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-qualified security specialists can assist your business with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Solutions
  • Needs Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Physical Security
Find out additional information about Progent's ISSAP Accredited Secure Network Architecture Consulting Expertise.

CISA Qualified Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a globally recognized achievement that indicates mastery in IS security auditing. Accredited by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified network security audit engineers can help your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Protecting Information Assets
  • Business Continuity Planning
Find out the details concerning Progent's CISA Qualified Information System Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's skills to plan, deploy, and maintain IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity plan based on leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants offer a variety of risk identification services including:

  • Collect data and study documentation to help identify major risk scenarios
  • Identify legal, industry, and contractual requirements and organizational policies associated with your information system to determine their potential influence on your business objectives
  • Identify possible vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your organization appreciate information system risk so they can assist with your risk control process
  • Connect identified risk scenarios to your associated business processes to help determine risk responsibility
  • Validate risk appetite with your senior leadership and key stakeholders to ensure they align
Get additional details concerning Progent's CRISC Consultants.

GIAC Certified Network Security Engineering Services
GIAC was founded in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to assure that an accredited security consultant possesses the knowledge appropriate to provide services in vital areas of network, information, and application security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit specialists can help your company with:

  • Auditing IT Infrastructure
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Support.

Contact a Certified Progent Security Engineer
To find out how you can get in touch with a certified Progent security consultant for remote or onsite help in Illinois, phone 1-800-993-9400 or go to Online Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.