Company information networks in Indiana now have prompt and economical online access to Progent's certified network security professionals to help with critical security problems. Rates are reasonable, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also provides help for complex engagements that demand the expertise of senior security consultants with top security certifications.

In case your Indiana small business is located outside of more populated urban neighborhoods such as Fort Wayne, Gary, Evansville, or South Bend, the availability of local certified security experts could be problematic when there's a crisis. This could mean a loss of revenue for your business, angry customers, idle workers, and defocused executives. By contacting Progent's online services, you have access to a qualified security consultant ready to provide expertise whenever you have to have it to get your system operating and restore your data.

Progent can assist you at any level in your initiatives to defend your information system with support that can range from network security checks to creating a comprehensive security strategy. Progent offers affordable service to assist companies of any size to design and maintain secure IT environments based on Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to provide centralized control and comprehensive security for all your email traffic. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a further level of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter.

Progent's security professionals are available remotely or on site to offer a variety of emergency or project-based IT security services such as:

  • Run thorough security audits
  • Clean up promptly after serious security breaches
  • Install hardware and software firewalls
  • Configure safe techniques for offsite and mobile access
  • Install advanced software for defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security plan with proactive network monitoring
  • Offer outsourced Help Desk Call Center Services
  • Help Develop an effective network backup and business continuity strategy based on Microsoft DPM automated backup capability
If your company has an urgent need for IT security support, refer to Progent's Emergency Online Technical Support.

Progent's engineers offer world-class support in key areas of computer security including analysis, firewall and VPN solutions, and high-level security planning.

System Evaluation
Progent's certified security engineers can evaluate the vulnerability of your current network security systems through comprehensive remote automated testing based on advanced software tools and tested procedures. Progent's skill in administering this testing saves you consulting fees and assures an accurate portrayal of gaps. The information your company gains can form the basis of a network protection strategy that can permit your information system to operate safely and adapt rapidly to future threats.

Automated Network Security Audits
Progent offers consulting in the use of security analysis packages such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a variety of automatic system testing checks to uncover possible security weaknesses. Progent has extensive experience with additional security analysis products such as NMAP, AMAP Application Scanner, eEye, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you design security into your business operations, configure scanning tools, define and deploy a secure system environment, and recommend procedures to optimize the security of your network. Progent's security engineers are able to assist you to set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Find out additional information on Progent's network security evaluation.

Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory scanning packages intended to enable small companies to get an impartial security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, a security engineer runs a comprehensive examination of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from a secure machine inside your company firewall to uncover your exposure to internal threats. Both security inventory services are set up and run from a secured remote location. The process is overseen by a consultant who has earned top security credentials and who generates a report that summarizes and interprets the data captured by the scan and proposes cost-effective improvements where called for.

Stealth Intrusion Analysis Support Services
Stealth penetration checking is a key component of any successful network security strategy. Progentís security professionals can perform extensive intrusion tests without the knowledge of your organization's internal network support staff. Unannounced penetration checking shows whether current security defense tools such as intrusion incident warnings and event history analysis are correctly configured and actively checked. Learn more concerning Progent's network penetration testing consulting.

Firewalls and VPN Support
Progent's expertise in security solutions includes in-depth familiarity with major firewalls and Virtual Private Network products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with important industry accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to manage your existing PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Support Expertise
Cisco's network security and remote access products offer a full line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Learn additional information about Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a detailed security plan and choose appropriate technologies from a variety of suppliers to support your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security companies to deliver centralized control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your security perimeter. This reduces your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning tools to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape legacy signature-based AV products. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to automate the entire malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Key capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates your backup processes and enables fast recovery of vital files, applications and virtual machines that have become unavailable or corrupted as a result of component failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can deliver advanced support to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Security Planning
Every company should have a carefully thought out security strategy that includes both pre-attack processes and response plans. The proactive plan is a collection of procedures designed to minimize vulnerabilities. The post-attack strategy assists your company's IT security engineers to assess the impact caused by an attack, repair the damage, record the experience, and get the IT network operational as soon as feasible.

Progent's certified information security engineers can to help your company to run a comprehensive risk evaluation and define a network security strategy to establish security policies and controls to reduce ongoing attacks and dangers.

CISM Qualified Network Security Consulting Services
The CISM committee describes the core capabilities and worldwide standards of performance that IT security managers are required to master. CISM gives executive management the assurance that consultants who have qualified for their CISM credential have the background and knowledge to provide effective security administration and consulting consulting. Progent offers the services of CISM qualified security professionals to assist businesses with:

  • IS Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Information Security Management
  • Response Planning
Read more information about Progent's CISM Certified Information Security Support Expertise.

CISSP Qualified Security Consulting Assistance
CISSP certification denotes expertise with a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of data security stipulated by ISO 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Find out more details concerning Progent's CISSP Accredited Security Support Professionals.

ISSAP Qualified Secure Network Architecture Consulting Assistance
Progent's ISSAP certified information system architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more complex requirements of information security architecture bounded by the broader scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Find out more details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.

CISA Qualified Network Security Auditing Engineering Expertise
The CISA credential is an important qualification that represents mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test given by the ISACA professional association. Progent's CISA-certified IS security audit engineers can assist your company in the areas of:

  • Information Systems Audit Services
  • IT Administration
  • Network Assets and Architecture Lifecycle
  • IT Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Planning
Get additional details concerning Progent's CISA Qualified Information System Security Auditing Consulting Support.

CRISC Experts
The CRISC program was established by ISACA to verify an IT professional's ability to plan, deploy, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and execute a workplace continuity strategy that follows industry best practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management engineers offer a variety of risk identification services including:

  • Collect information and study documentation to evaluate significant vulnerabilities
  • Identify statutory, regulatory, and business requirements and organizational policies related to your network to determine their possible influence on your business objectives
  • Point out potential threats for your operational processes to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders understand information system risk so they can contribute to your risk control process
  • Match identified risk vectors to related operational procedures to help assign risk ownership
  • Validate risk tolerance with executive leadership and key stakeholders to make sure they align
Learn additional information concerning Progent's CRISC Experts.

GIAC Accredited Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to ensure that an accredited security consultant has the knowledge necessary to deliver services in key categories of system, data, and application program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified information security audit engineers can help your business with:

Learn additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Security Engineer
To see how you can get in touch with a certified Progent security consultant for online or on-premises help in Indiana, phone 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.