Small business computer networks in Indiana now have prompt and affordable remote technical support from Progent's certified security experts to fix critical security issues. The cost is reasonable, billing is per minute, sign-up is quick, and support is world class. Progent also provides assistance for complex engagements that requires the expertise of senior security engineers with high-level security certifications.

If your Indiana small business is situated some distance from major metropolitan areas such as Fort Wayne, Gary, Evansville, or South Bend, the availability of local certified network security support specialists is often problematic when there's an emergency. This could mean a drop in productivity for your company, upset clients, idle employees, and distracted management. By utilizing Progent's remote support, you can get in touch with a qualified security engineer who can deliver help whenever you have to have it to keep your computer network on line and restore your information.

Progent can assist you at any level in your efforts to protect your information system with services that ranges from network security audits to creating a comprehensive security strategy. Progent offers affordable support to assist businesses of all sizes to design and maintain protected networks powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security companies to deliver centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a deeper level of analysis for inbound email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also enable Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.

Progent's security consultants are accessible remotely or in person to provide a variety of urgent or longer-term computer security services which include:

If your company has an immediate requirement for computer security help, go to Progent's Urgent Remote Technical Support.

Progent's engineers provide world-class services in vital fields of system security including auditing, firewalls and VPN, and advanced security consulting.

System Security Audits
Progent's certified security engineers can assess the vulnerability of your current network security systems by performing exhaustive remote automated testing via advanced software tools and proven techniques. Progent's skill in this testing saves you consulting fees and offers an accurate portrayal of system vulnerability. The knowledge your IT organization gains can form the foundation of a network protection plan that can permit your network to run dependably and respond rapidly to new threats.

Automated Network Security Audits
Progent offers consulting in the use of security auditing products including Microsoft's MBSA and GFI LANguard for affordably performing a set of programmed network testing checks to uncover possible security weaknesses. Progent has broad experience with other security auditing tools including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus tools such as Metasploit, Netcat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can show you how to build protection into your company operations, configure scanning software, define and implement a secure system architecture, and suggest procedures to optimize the security of your IT system. Progent's security consultants are available to help you set up a firewall, implement safe remote access to email and data, and integrate virtual private network. Find out more on Progent's automated security analysis.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles intended to allow small companies to receive an independent network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your network from beyond your company firewall to determine possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from a secure computer within your firewall to determine the risk to internal threats. Both security inventory services are configured and run from a protected remote location. The process is managed by an engineer with high-level security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and proposes cost-effective remediation where appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration checking is a key component of any successful network security plan. Progentís security experts can perform extensive intrusion tests without the knowledge of your company's internal network support resources. Stealth penetration checking uncovers whether current security monitoring tools such as intrusion incident alerts and event log monitoring are correctly set up and consistently monitored. Learn additional information on Progent's stealth security penetration analysis support services.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses in-depth field work with major firewalls and Virtual Private Network (VPN) technology from a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your existing PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and VPN Consulting Services
Cisco's security and remote access technology provide a complete line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Read more information about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.

Engineering Expertise for Other Firewall and VPN Products
Progent provides small and medium size companies expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can help you create a detailed security plan and select appropriate products from a variety of suppliers to achieve your security goals while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to defend endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily evade traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to manage the complete malware attack progression including blocking, identification, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering via cutting-edge technologies packaged within a single agent managed from a unified control. Progent's data protection and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that addresses your company's specific requirements and that allows you demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent can also help you to install and test a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of critical files, apps and VMs that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security vendors to provide centralized management and world-class security for all your inbound and outbound email. The powerful structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of analysis for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported easily to a different hosting solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect data related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can save up to half of time wasted trying to find critical information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Design
Every business should develop a thoroughly thought out security strategy that incorporates both pre-attack processes and reaction plans. The pre-attack plan is a collection of procedures designed to reduce vulnerabilities. The reactive strategy assists your company's security engineers to evaluate the damage resulting from an attack, repair the damage, record the experience, and get the IT network running as soon as feasible.

Progent's certified information security engineers can to assist you to run a comprehensive risk assessment and create a computer security plan to establish security processes and mechanisms to minimize ongoing assaults and dangers.

CISM Qualified Information Security Engineering Expertise
The CISM organization defines the core competencies and international standards of performance that IT security managers are expected to learn. It provides business management the confidence that consultants who have qualified for their CISM credential have the background and knowledge to provide effective security administration and consulting consulting. Progent offers the services of CISM qualified security professionals to assist businesses with:

  • IS Security Governance
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Management
  • Response Management
Learn more information about Progent's CISM Accredited Network Security Engineering Expertise.

CISSP Qualified Security Consulting Services
CISSP denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the field of data security under ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Read more information about Progent's CISSP IS Security Support Expertise.

ISSAP Certified Secure Information System Architecture Engineering Services
Progent's ISSAP certified IT architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous testing and extensive experience with network security architecture. The ISSAP credential represents demonstrated skill in the most complex requirements of IS security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Criteria
  • BCP and DRP
  • Site Security
Learn additional details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Expertise.

CISA Accredited IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a recognized qualification that indicates expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass an extensive examination administered by the ISACA professional association. Progent's CISA information security audit specialists are available to assist your company in the areas of:

  • Information Systems Audit Process
  • Information Technology Governance
  • Systems and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Read additional information concerning Progent's CISA Certified Network Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's ability to plan, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a business continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management consultants can provide a range of risk evaluation services such as:

  • Gather information and study documentation to help identify major vulnerabilities
  • Identify legal, regulatory, and contractual mandates and organizational policies associated with your network to determine their possible influence on your business objectives
  • Point out potential vulnerabilities for your business processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and provide training to make sure your organization appreciate information system risk so they can contribute to your risk management program
  • Connect key risk scenarios to your associated business procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they are in agreement
Find out additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Network Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to assure that a certified security consultant has the knowledge needed to provide services in important areas of network, data, and application software security. GIAC accreditations are acknowledged by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC-certified network security audit consultants can assist your IT organization in the areas of:

Find out additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Security Specialist
To see how to contact a certified security engineer for online or onsite assistance in Indiana, call 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.