Small business computer networks in Indiana can have quick and economical online technical support from Progent's qualified network security support specialists to assist with critical security problems. Rates are competitive, charges are per minute, engagement is quick, and support is unbeatable. Progent also offers assistance for complex engagements that requires the expertise of senior security engineers with high-level security credentials.

In case your Indiana network is located away from more populated metropolitan neighborhoods such as Fort Wayne, Gary, Evansville, or South Bend, help from nearby certified network security experts could be problematic when you have an urgent situation. This could mean a drop in revenue for your company, upset clients, idle workers, and defocused executives. By calling Progent's remote support, you can get in touch with a qualified security consultant ready to offer expertise whenever you have to have it to keep your system on line and restore your information.

Progent can help you in your efforts to defend your IT environment with services that ranges from security assessments to creating a company-wide security strategy. Progent offers affordable service to help businesses of all sizes to design and maintain protected IT environments powered by Windows and Cisco technology and that may include servers and desktops running UNIX or Linux operating systems as well as mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the technology of leading data security vendors to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The onsite gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's certified consultants are accessible remotely or in person to offer a range of emergency or longer-term computer security services including:

If your business has an urgent need for IT security help, go to Progent's Emergency Remote Technical Support.

Progent's support professionals offer world-class services in vital areas of computer security including security evaluation, firewall and VPN solutions, and high-level security planning.

Security Assessment
Progent's expert security consultants can evaluate the effectiveness of your existing computer security implementation by performing exhaustive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in this service saves you consulting fees and assures an objective portrayal of weaknesses. The knowledge your company is provided can be used as the basis of a network protection plan that will allow your network to run safely and respond rapidly to new threats.

Automated Network Security Assessment
Progent provides expertise in the application of security analysis software such as MBSA and GFI LANguard Network Security Scanner for affordably performing a set of programmed network auditing checks to identify potential security vulnerabilities. Progent has extensive experience with additional network auditing products including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can help you build security into your company operations, configure auditing applications, plan and deploy a protected system environment, and suggest policies to optimize the security of your IT system. Progent's security professionals are ready to help you configure a firewall, implement safe remote connectivity to email and data, and install virtual private network. Find out more about Progent's network security audits.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory service bundles intended to allow small businesses to get an objective security evaluation from a certified security expert. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from outside your firewall to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from a secure machine inside your firewall to evaluate your exposure to inside attacks. The two security inventory packages are configured and executed from a secured remote site. The project is managed by an engineer with top security credentials and who generates a report that summarizes and analyzes the information captured by the security scan and suggests practical remediation if called for.

Stealth Intrusion Testing Consulting
Stealth intrusion testing is a key component of any comprehensive network security strategy. Progent’s security professionals can perform thorough intrusion tests without the awareness of your company's internal network support staff. Stealth penetration testing shows whether current security defense tools such as intrusion incident warnings and event log monitoring are properly set up and actively monitored. Learn additional information on Progent's stealth penetration testing consulting.

Firewalls and VPN Solutions
Progent's background in security technology encompasses in-depth field work with leading firewalls and VPN technology offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned key industry certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and remote connection products offer a complete line of manageable security products to help protect your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your business objectives. Find out additional information about Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a detailed security strategy and select appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to defend endpoints as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily get by legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to automate the entire threat lifecycle including protection, identification, containment, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth protection for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid recovery of vital data, applications and VMs that have become lost or damaged due to component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can provide advanced support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security companies to deliver web-based management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway device adds a deeper level of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved immediately to a different hardware solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information related to your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether you’re planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Expert Security Design
Every business should develop a carefully thought out security program that includes both pre-attack procedures and response planning. The proactive plan is a collection of mechanisms that help to reduce vulnerabilities. The post-attack strategy helps your IT security engineers to assess the damage caused by an attack, fix the system, document the experience, and get the IT network restored as soon as feasible.

Progent's certified information security consultants can to assist your business to run a full risk evaluation and define a company-wide security plan to establish security policies and mechanisms to mitigate future attacks and dangers.

CISM Certified Security Consulting Assistance
The Certified Information Security Manager (CISM) committee defines the basic competencies and worldwide standards of skill that IT security managers are required to learn. CISM gives business management the assurance that those who have earned their CISM certification possess the experience and knowledge to deliver efficient security management and support services. Progent offers the support of CISM certified security professionals to help businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • Information Security Program Management
  • IS Security Administration
  • Response Management
Learn more details about Progent's CISM Qualified Network Security Consulting Services.

CISSP Certified Security Engineering Support
The CISSP credential recognizes expertise with a worldwide standard for network security. ANSI has awarded the CISSP credential recognition in the field of data protection defined by ISO 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Read additional details concerning Progent's CISSP Qualified Security Engineering Professionals.

ISSAP Accredited Secure IT Architecture Engineering Assistance
Progent's ISSAP certified network architecture engineers are consultants who have earned ISSAP status through thorough examination and extensive experience with information security design. The ISSAP credential indicates proven competence in the most in-depth requirements of IS security architecture bounded by the wider scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Engineering Expertise.

CISA Accredited IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a globally recognized achievement that indicates mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants pass a comprehensive examination given by the ISACA professional group. Progent's CISA IS security audit specialists are available to help your IT organization with:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Find out more details about Progent's CISA Certified IS Security Auditing Consulting Assistance.

CRISC Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to design, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help you to create and execute a business continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation engineers can provide a range of risk evaluation services including:

  • Collect information and study documentation to evaluate major vulnerabilities
  • Identify statutory, regulatory, and contractual mandates and company standards related to your information system to determine their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your operational processes to assist in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to ensure your organization appreciate IT risk so they can assist with your risk control program
  • Connect key risk vectors to related business processes to help assign risk ownership
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
Read more details concerning Progent's CRISC Experts.

GIAC Accredited Information System Security Engineering Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge necessary to deliver services in important categories of network, information, and application security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. NSA. Progent's GIAC security audit consultants are available to assist your IT organization with:

Find out more details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Expert
To find out how you can get in touch with a certified security engineer for online or on-premises expertise in Indiana, phone 1-800-993-9400 or visit Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.