Small business networks in the state of Indiana can now get fast and economical remote technical support from Progent's certified network security consultants to resolve complex security issues. The cost is affordable, charges are per minute, sign-up is fast, and support is world class. Progent also offers help for complex projects that demand the expertise of senior security consultants with top security certifications.

If your Indiana office is away from major urban neighborhoods like Fort Wayne, Gary, Evansville, or South Bend, the availability of nearby certified security consultants is often limited when there's a security disaster. This can cause lost income for your company, angry customers, idle workers, and defocused executives. By utilizing Progent's online services, you have access to a certified security consultant who can deliver expertise whenever you need it to keep your system running and salvage your information.

Progent can help you at any level in your efforts to protect your IT environment with services ranging from security audits to creating a company-wide security strategy. Progent provides affordable service to assist companies of any size to design and manage protected IT environments based on Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux platforms plus mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to deliver centralized control and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security experts are accessible remotely or in person to offer a variety of urgent or project-based IT security services including:

If your business has an immediate requirement for IT security help, refer to Progent's Urgent Remote Technical Support.

Progent's security experts offer advanced support in key facets of network security that include auditing, firewall and VPN expertise, and advanced security consulting.

System Security Evaluation
Progent's expert security consultants can assess the effectiveness of your current computer security implementation through comprehensive remote automated testing via sophisticated software tools and tested techniques. Progent's experience in administering this service saves your company money and assures a detailed picture of security holes. The information your company gains can make up the basis of a security plan that can permit your network to run dependably and respond rapidly to new risks.

Automated Vulnerability Audits
Progent provides consulting in the use of security analysis software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a variety of automatic network testing scans to uncover potential security holes. Progent has broad knowledge of other network analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye, plus utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can show you how to build protection into your business operations, configure scanning tools, define and deploy a protected network architecture, and suggest procedures to maximize the security of your IT system. Progent's security consultants are available to assist you to configure a firewall, design safe remote connectivity to email and data, and install VPN. Find out more on Progent's network security analysis.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation bundles designed to allow small companies to receive an independent network security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from beyond your company firewall to uncover potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from an authorized machine within your firewall to evaluate your exposure to inside assaults. Both security inventory packages are set up and executed from a secured external site. The project is directed by a consultant with high-level security credentials and who generates a document that summarizes and analyzes the data captured by the scan and proposes practical improvements if appropriate.

Stealth Intrusion Testing Support Services
Stealth penetration checking is an important part of any comprehensive network security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's internal IT staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident warnings and event history analysis are properly configured and actively checked. Find out more about Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security solutions includes extensive field work with leading firewalls and Virtual Private Network products offered by multiple companies including Cisco, Microsoft, and Symantec. Progent offers the support of consultants with important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to manage your existing PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access technology provide a comprehensive range of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Read more information concerning Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Appliances.

Support Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and select appropriate technologies from multiple vendors to achieve your security objectives while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading information security companies to provide centralized management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email traffic that stays within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to automate the complete threat progression including filtering, identification, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and enables fast restoration of vital files, applications and VMs that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your critical data. Read more about ProSight DPS Managed Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can save as much as half of time wasted searching for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre making enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Planning
Any business ought to have a carefully considered security program that incorporates both preventive processes and response plans. The pre-attack strategy is a collection of mechanisms intended to reduce vulnerabilities. The reactive strategy helps your security personnel to evaluate the impact resulting from an attack, repair the system, record the experience, and get the IT network running as soon as possible.

Progent's certified IT security consultants can to help your company to perform a comprehensive risk assessment and define a network security strategy to implement security processes and controls to reduce ongoing assaults and dangers.

CISM Accredited Network Security Support Expertise
The CISM organization describes the basic capabilities and global standards of performance that information security professionals are required to learn. CISM provides business management the confidence that consultants who have qualified for their CISM credential have the experience and capability to deliver effective security administration and consulting consulting. Progent can provide the services of CISM qualified security professionals to assist companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Implementation Management
  • Information Security Administration
  • Recovery Management
Find out additional information concerning Progent's CISM Qualified Network Security Support Services.

CISSP Accredited Security Consulting Support
CISSP recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of data security under ISO 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security areas such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Find out additional information about Progent's CISSP Accredited Information Security Engineering Services.

ISSAP Certified Secure Information System Architecture Consulting Services
Progent's ISSAP qualified system architecture professionals are experts who have earned ISSAP Certification through thorough examination and significant work with information security design. The ISSAP credential represents demonstrated skill in the more challenging demands of IS security architecture bounded by the broader field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Find out more details about Progent's ISSAP Accredited Secure Network Architecture Engineering Expertise.

CISA Accredited Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies expertise in network security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA international professional group. Progent's CISA-qualified security audit experts can assist your company with:

  • Information Systems Audit Process
  • IT Administration
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Find out additional details about Progent's CISA Certified IS Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify a consultant's skills to design, deploy, and maintain information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and execute a workplace continuity plan that follows industry best practices identified by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a range of risk assessment services including:

  • Gather information and review documentation to help identify significant vulnerabilities
  • Identify statutory, regulatory, and contractual mandates and organizational policies associated with your network to determine their possible impact on your strategic goals
  • Point out possible threats for your business processes to assist in analyzing your enterprise risk
  • Create a risk awareness program and conduct seminars to ensure your organization understand IT risk so they can assist with your risk control process
  • Connect identified risk scenarios to related business processes to help determine risk ownership
  • Determine risk appetite with your senior management and major stakeholders to ensure they match
Learn more information concerning Progent's CRISC Consultants.

GIAC Accredited Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security professionals. GIAC's goal is to make sure that a certified security consultant has the skills necessary to deliver support in key categories of network, information, and application program security. GIAC certifications are acknowledged by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-certified IS security audit consultants are available to assist your company with:

Find out more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Specialist
To learn how to access a certified Progent security consultant for online or onsite help in Indiana, call 1-800-993-9400 or visit Online Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.