Small business information networks in the state of Indiana can depend on quick and economical remote access to Progent's qualified security experts to resolve critical security issues. The cost is reasonable, billing is per minute, sign-up is immediate, and service is unbeatable. Progent also provides help for complex projects that requires the knowledge of seasoned security consultants with top security credentials.

If your Indiana business is some distance from major urban neighborhoods such as Fort Wayne, Gary, Evansville, or South Bend, the availability of local qualified network security support specialists could be limited when there's an urgent situation. This could mean lost income for your business, upset clients, idle workers, and distracted executives. By utilizing Progent's remote support, you have access to a qualified security engineer who can deliver help whenever you have to have it to get your system on line and restore your data.

Progent can assist you in a variety of ways in your efforts to guard your network with support that can range from security assessments to developing a company-wide security strategy. Progent offers affordable support to help small and midsize companies to configure and manage secure IT environments based on Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security companies to provide web-based management and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The local gateway can also help Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.

Progent's certified professionals are accessible remotely or on site to offer a range of emergency or project-based computer security services including:

  • Perform automated security audits
  • Clean up quickly after attacks
  • Set up effective firewalls
  • Implement secure techniques for remote and mobile connectivity
  • Install advanced software for defense against spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Call Center Support
  • Create an effective backup and recovery strategy built around Microsoft DPM backup technology
If your business has an urgent requirement for IT security help, refer to Progent's Urgent Online Technical Help.

Progent's consultants provide world-class support in key facets of computer security including security assessment, firewall and VPN solutions, and advanced security consulting.

System Evaluation
Progent's certified security consultants can assess the effectiveness of your current computer security environment through comprehensive remote automated analysis based on sophisticated software tools and proven procedures. Progent's experience in this testing saves you time and money and assures a detailed picture of weaknesses. The knowledge your company gains can form the foundation of a security plan that can allow your information system to operate safely and react rapidly to new risks.

Automated Network Vulnerability Analysis
Progent provides expertise in the use of security testing utilities such as Microsoft's MBSA and GFI LANguard for economically running a variety of programmed network auditing scans to uncover potential security holes. Progent has broad experience with other network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can show you how to design security into your business processes, configure auditing tools, define and deploy a secure system environment, and suggest procedures to maximize the security of your IT system. Progent's security engineers are available to assist you to configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Find out additional information on Progent's network security assessment.

Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles intended to allow small companies to get an objective network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized computer inside your company firewall to evaluate your exposure to inside assaults. Both security inventory services are configured and run from a protected remote site. The process is overseen by a consultant who has earned top security credentials and who generates a report that summarizes and analyzes the data collected by the scan and suggests practical remediation where appropriate.

Stealth Security Penetration Analysis Consulting
Stealth intrusion checking is an important component of any successful IT system security plan. Progentís security experts can perform thorough penetration tests without the awareness of your company's in-house network support resources. Stealth penetration checking shows whether current security monitoring systems such as intrusion incident alerts and event history analysis are correctly configured and actively checked. Find out more about Progent's stealth penetration testing support services.

Firewalls and VPN Support
Progent's expertise in security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) products from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to manage your legacy PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and VPN Support Expertise
Cisco's security and offsite access technology provide a complete line of manageable security products to help protect your local and remote information system. Cisco's VPN line includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Read additional details concerning Progent's Consulting Expertise for Cisco Security and VPN Appliances.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and select the right products from a variety of suppliers to support your security objectives while staying within your spending limits.

Certified Network Security Consulting
Any business ought to develop a carefully thought out security program that includes both pre-attack processes and reaction plans. The pre-attack strategy is a collection of mechanisms intended to reduce security weaknesses. The reactive plan assists your company's network security engineers to evaluate the impact caused by a security penetration, fix the system, document the experience, and get the IT network running as quickly as possible.

Progent's certified IT security consultants can to help your company to perform a comprehensive risk evaluation and create a company-wide security strategy to establish security processes and mechanisms to reduce ongoing assaults and threats.

CISM Qualified Security Support Assistance
The Certified Information Security Manager (CISM) organization describes the core capabilities and worldwide standards of performance that IT security professionals are required to learn. CISM provides business management the confidence that those who have earned their CISM credential have the experience and capability to deliver efficient security management and consulting services. Progent can provide the support of CISM qualified security consultants to help companies with:

  • Network Security Strategies
  • Vulnerability Management
  • IS Security Program Management
  • IS Security Management
  • Response Management
Learn additional information about Progent's CISM Accredited Information Security Consulting Services.

CISSP Certified Security Consulting Expertise
The CISSP credential denotes mastery of a global standard for information security. ANSI has awarded certification recognition in the field of information security stipulated by ISO 17024. Progent offers the services of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Learn more details about Progent's CISSP Qualified Security Consulting Professionals.

ISSAP Qualified Secure Information System Architecture Engineering Expertise
Progent's ISSAP certified IT architecture professionals are consultants who have been awarded ISSAP Certification through rigorous examination and extensive work with network security architecture. The ISSAP certification represents proven competence in the most in-depth requirements of IS security architecture bounded by the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read additional information about Progent's ISSAP Accredited Secure Information System Architecture Engineering Professionals.

CISA Certified Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that represents expertise in information system security auditing. Certified by ANSI, the CISA accreditation requires that candidates pass an extensive test administered by the ISACA professional association. Progent's CISA-qualified network security audit specialists can assist your business with:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Information Assets
  • Business Continuity Preparedness
Find out additional details about Progent's CISA Certified IS Security Auditing Engineering Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's skills to plan, implement, and support information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation specialists can provide a variety of risk evaluation services such as:

  • Gather information and review documentation to identify major vulnerabilities
  • Inventory legal, industry, and contractual mandates and organizational policies related to your information system to assess their potential impact on your strategic goals
  • Point out possible threats for your business processes to help in evaluating your enterprise risk
  • Create a risk awareness program and conduct seminars to ensure your stakeholders understand IT risk so they can assist with your risk control process
  • Connect key risk vectors to your associated business processes to help determine risk ownership
  • Validate risk appetite with your senior management and key stakeholders to ensure they match
Get more details concerning Progent's CRISC Consultants.

GIAC Certified Information System Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security engineers. GIAC's mission is to make sure that an accredited security consultant possesses the skills needed to deliver support in vital areas of system, data, and application software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the U.S. NSA. Progent's GIAC IS security audit consultants can assist your company in the areas of:

  • Assessing IT Infrastructure
  • Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Support.

Talk to a Certified Security Engineer
To learn how you can contact a Progent security consultant for remote or on-premises help in Indiana, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.