Business information networks in Indiana can now get prompt and affordable online help from Progent's accredited network security experts to assist with the toughest security problems. The cost is reasonable, billing is by the minute, engagement is immediate, and support is world class. Progent also offers assistance for long-term engagements that requires the services of senior security engineers with high-level industry certifications.

If your Indiana business is situated outside of larger metropolitan areas such as Fort Wayne, Gary, Evansville, or South Bend, contact with local qualified network security support specialists may be problematic when there's a crisis. This can result in a loss of revenue for your business, upset customers, idle workers, and distracted executives. By utilizing Progent's remote support, you can get in touch with a qualified security professional who can deliver expertise when you require it to keep your network operating and salvage your data.

Progent can assist you in all your initiatives to guard your network with support that ranges from network security audits to creating a company-wide security strategy. Progent offers economical service to help small and midsize companies to design and manage protected IT environments powered by Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security vendors to provide centralized control and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of analysis for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall.

Progent's certified professionals are available online or in person to offer a variety of emergency or project-based network security services including:

  • Run extensive security evaluations
  • Recover promptly after virus and worm attacks
  • Configure hardware and software firewalls
  • Implement secure techniques for offsite and mobile access
  • Deploy effective applications for automatic defense against spam and DHAs
  • Develop a comprehensive security strategy with 24x7 network monitoring
  • Offer outsourced Call Center Services
  • Help Develop an effective backup and disaster recovery solution centered on System Center Data Protection Manager backup technology
If your business has an emergency requirement for IT security support, go to Progent's Emergency Remote Network Support.

Progent's engineers provide world-class support in key areas of system protection including security assessment, firewall and VPN expertise, and high-level security planning.

System Security Evaluation
Progent's expert security engineers can assess the effectiveness of your current network security environment by performing exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's experience in administering this service saves you time and money and offers an objective portrayal of weaknesses. The information your IT organization is provided can be used as the basis of a network protection plan that can permit your network to operate dependably and respond rapidly to future threats.

Automated Vulnerability Audits
Progent provides expertise in the use of security analysis products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically performing a set of automatic system testing scans to identify potential security holes. Progent has broad experience with additional network analysis tools such as NMAP Port Scanner, AMAP, eEye, plus tools like Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can show you how to build protection into your business operations, configure scanning tools, plan and implement a protected system environment, and recommend policies to maximize the security of your IT system. Progent's security engineers are able to show you how to configure a firewall, implement secure remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's network security audits.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory service bundles intended to enable small businesses to receive an independent security assessment from a certified security consultant. With Progent's External Security Inventory Checkup, a security engineer runs an extensive test of your network from outside your firewall to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from a secure computer within your company firewall to evaluate your exposure to inside attacks. The two security inventory packages are configured and executed from a protected remote site. The process is directed by an engineer with top security accreditations and who generates a report that details and interprets the data collected by the scan and proposes practical remediation if called for.

Stealth Intrusion Analysis Consulting
Stealth penetration testing is a key part of any successful network security strategy. Progentís security experts can perform extensive intrusion tests without the knowledge of your organization's internal network support resources. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion detection warnings and event log analysis are properly set up and consistently monitored. Find out additional information about Progent's network security penetration analysis consulting.

Firewall/VPN Expertise
Progent's background in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and VPN Engineering Services
Cisco's network security and offsite connection products offer a full line of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business goals. Learn more details concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and VPN Technology
Progent offers small and mid-size companies professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate technologies from multiple suppliers to achieve your security objectives while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis technology to defend endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to address the complete threat progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools packaged within a single agent accessible from a single console. Progent's data protection and virtualization consultants can assist your business to design and configure a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate attention. Progent can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and enables fast restoration of vital data, applications and virtual machines that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security companies to deliver web-based management and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can save as much as half of time spent searching for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Planning
Every business ought to develop a carefully thought out security program that includes both proactive procedures and response plans. The pre-attack strategy is a collection of steps designed to minimize security weaknesses. The reactive plan assists your security engineers to evaluate the impact resulting from an attack, fix the network, record the experience, and get the IT network restored as quickly as possible.

Progent's certified IT security consultants can to help you to perform a complete vulnerability evaluation and define a network security strategy to establish security policies and controls to minimize future attacks and threats.

CISM Accredited Network Security Engineering Expertise
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of skill that IT security managers are required to learn. CISM gives executive management the assurance that those who have qualified for their CISM certification possess the background and knowledge to deliver effective security administration and support services. Progent can provide the support of CISM certified security professionals to assist businesses with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Program Management
  • Information Security Management
  • Response Planning
Learn additional information about Progent's CISM Accredited IS Security Support Services.

CISSP Qualified Security Consulting Support
CISSP recognizes mastery of an international standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of data security defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Read additional details concerning Progent's CISSP Accredited Information Security Support Services.

ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's ISSAP certified IT architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and extensive experience with information security architecture. The ISSAP credential represents demonstrated skill in the more in-depth requirements of information security architecture bounded by the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Find out more details concerning Progent's ISSAP Certified Secure System Architecture Consulting Services.

CISA Accredited Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a globally recognized achievement that indicates mastery in information system security audit and control. Certified by ANSI, the CISA credential has candidates pass an extensive examination given by the ISACA international professional group. Progent's CISA network security audit consultants can assist your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get additional information concerning Progent's CISA Qualified Information System Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's ability to plan, deploy, and support IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity strategy that follows leading practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants can provide a range of risk identification services including:

  • Collect data and review documentation to identify major risk scenarios
  • Inventory statutory, regulatory, and contractual mandates and company policies associated with your network to assess their possible impact on your strategic goals
  • Identify potential vulnerabilities for your operational processes to assist in evaluating your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate information system risk so they can assist with your risk management process
  • Connect key risk scenarios to related operational processes to help determine risk ownership
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they match
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Consulting Assistance
GIAC was founded in 1999 to validate the skill of network security engineers. GIAC's goal is to ensure that an accredited security consultant possesses the knowledge needed to deliver services in key categories of network, data, and software security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified network security audit specialists are available to assist your company in the areas of:

Read additional details concerning Progent's GIAC Information Assurance Services.

Contact a Certified Security Expert
To see how to access a security consultant for remote or on-premises support in Indiana, phone 1-800-993-9400 or go to Remote Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.