Business networks in Indiana can have fast and economical online access to Progent's certified security professionals to assist with critical security issues. Rates are competitive, billing is per minute, engagement is quick, and service is world class. Progent also offers help for complex engagements that demand the expertise of seasoned security consultants with top industry credentials.

In case your Indiana organization is situated outside of major urban areas including Fort Wayne, Gary, Evansville, or South Bend, contact with nearby certified network security professionals may be problematic during a crisis. This could mean lost productivity for your company, upset customers, unproductive employees, and distracted executives. By contacting Progent's online services, you have access to a qualified security professional who can deliver help whenever you need it to keep your system running and recover your data.

Progent can help you in a variety of ways in your initiatives to defend your network with services ranging from security assessments to developing a company-wide security strategy. Progent offers affordable service to help businesses of all sizes to design and maintain secure IT environments based on Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux operating systems as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified professionals are accessible remotely or on site to offer a variety of emergency or longer-term IT security services which include:

  • Run automated network security evaluations
  • Recuperate rapidly after virus and worm attacks
  • Install effective firewalls
  • Configure secure methods for remote and mobile connectivity
  • Deploy advanced software for automatic protection against spam and DHAs
  • Help create a comprehensive security plan with 24x7 network monitoring
  • Offer outsourced Help Desk Services
  • Develop a practical data backup and restore solution centered on Data Protection Manager backup capability
If your network has an emergency need for computer security help, go to Progent's Urgent Remote Technical Support.

Progent's support professionals offer advanced support in key areas of network protection that include security evaluation, firewalls and VPN, and advanced security planning.

System Security Evaluation
Progent's expert security consultants can evaluate the effectiveness of your current computer security environment through comprehensive remote automated analysis via advanced utilities and tested techniques. Progent's experience in this service saves you consulting fees and assures an accurate portrayal of weaknesses. The information your IT organization gains can make up the foundation of a security plan that will permit your information system to operate dependably and respond quickly to future risks.

Automated Security Analysis
Progent provides consulting in the application of security testing products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a set of programmed system auditing scans to uncover possible security vulnerabilities. Progent has extensive experience with other security auditing products such as NMAP, AMAP, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build protection into your business operations, configure auditing software, plan and deploy a protected system environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are able to show you how to set up a firewall, implement safe remote access to email and data, and integrate VPN. Learn additional information on Progent's automated security assessment.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory and evaluation bundles designed to enable small businesses to get a professional network security assessment from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from a secure computer within your firewall to determine the risk to inside attacks. Both security inventory services are set up and run from a protected external location. The project is directed by a consultant who has earned high-level security accreditations and who produces a report that details and analyzes the data captured by the security scan and suggests cost-effective remediation if called for.

Stealth Penetration Testing Support Services
Stealth penetration checking is a key part of any serious IT system security strategy. Progentís security experts can perform extensive intrusion checks without the awareness of your organization's in-house network support resources. Stealth penetration testing shows whether current security defense systems such as intrusion incident alerts and event log analysis are correctly configured and consistently checked. Find out additional information concerning Progent's stealth penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in network security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network technology offered by a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned key industry certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Support Services
Cisco's network security and remote connection technology offer a comprehensive line of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and CCNP qualifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Learn additional information about Progent's Support Expertise for Cisco Security and VPN Appliances.

Consulting Expertise for Other Firewall and VPN Products
Progent offers small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate products from multiple vendors to support your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent offers a selection of low-cost, set-price monthly managed services designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior analysis tools to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and email phishing, which easily escape traditional signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to address the entire malware attack progression including blocking, infiltration detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical data, apps and virtual machines that have become lost or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements like IPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.

Expert Security Design
Any business should have a thoroughly thought out security program that incorporates both pre-attack processes and response plans. The pre-attack plan is a set of steps that help to reduce security weaknesses. The reactive plan helps your network security engineers to evaluate the impact caused by a security penetration, repair the network, document the event, and get the IT network restored as quickly as possible.

Progent's certified IS security consultants can to help you to run a comprehensive vulnerability assessment and create a network security plan to implement security policies and mechanisms to reduce ongoing attacks and threats.

CISM Qualified Information Security Engineering Expertise
The Certified Information Security Manager (CISM) organization defines the core capabilities and international standards of skill that IT security professionals are expected to master. CISM gives executive management the confidence that those who have qualified for their CISM certification have the experience and knowledge to provide efficient security management and support services. Progent can provide the support of CISM certified security professionals to assist businesses with:

  • Network Security Governance
  • Risk Management
  • Information Security Program Management
  • Network Security Administration
  • Recovery Planning
Learn additional information about Progent's CISM Certified IS Security Engineering Expertise.

CISSP Qualified Security Engineering Assistance
CISSP certification denotes expertise with a global standard for data security. The American National Standards Institute has granted certification accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Read additional information concerning Progent's CISSP Accredited Security Consulting Services.

ISSAP Certified Secure System Architecture Consulting Assistance
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP Certification through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the more complex requirements of information security architecture within the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all phases of architecture security including.

  • Access Management Systems and Techniques
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional details concerning Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Qualified Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination administered by the ISACA professional association. Progent's CISA-qualified information security audit experts are available to help your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Planning
Find out the details concerning Progent's CISA Certified IS Security Auditing Consulting Support.

CRISC Consultants
The CRISC program was established by ISACA in 2010 to verify a consultant's skills to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk mitigation consultants can provide a range of risk evaluation services such as:

  • Gather information and review documentation to evaluate major risk scenarios
  • Identify legal, industry, and business requirements and company policies associated with your network to assess their possible influence on your strategic objectives
  • Identify potential threats for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk control program
  • Match key risk scenarios to related operational procedures to help assign risk responsibility
  • Validate risk appetite with executive management and major stakeholders to ensure they align
Get additional information about Progent's CRISC Experts.

GIAC Certified Information System Security Consulting Services
GIAC was established in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to verify that a certified professional possesses the skills appropriate to provide support in key areas of system, data, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified security audit specialists can assist your company in the areas of:

  • Auditing Perimeters
  • Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Engineer
To learn how to contact a certified security engineer for remote or onsite support in Indiana, phone 1-800-993-9400 or visit Remote Network Help.














© 2002- 2017 Progent Corporation. All rights reserved.