Company IT networks in the state of Iowa now have fast and affordable remote technical support from Progent's certified network security experts to fix critical security problems. The cost is competitive, charges are by the minute, engagement is quick, and support is unbeatable. Progent also provides assistance for complex engagements that demand the knowledge of seasoned security consultants with high-level industry certifications.

In case your Iowa company is located some distance from major metropolitan neighborhoods such as Des Moines, Cedar Rapids, Davenport, or Sioux City, support from nearby accredited security professionals could be limited during a security disaster. This could mean lost income for your company, upset customers, unproductive employees, and distracted executives. By calling Progent's remote support, you can get in touch with a certified security engineer who can provide assistance when you have to have it to keep your system operating and salvage your data.

Progent can assist you in your initiatives to guard your network with support ranging from network security checks to developing a company-wide security strategy. Progent offers affordable service to help businesses of all sizes to set up and maintain safe networks powered by Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to deliver web-based control and comprehensive security for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall.

Progent's security experts are accessible online or on site to provide a variety of emergency or project-based network security services including:

  • Run comprehensive security evaluations
  • Recuperate promptly after serious security breaches
  • Set up hardware and software firewalls
  • Configure safe techniques for remote and mobile connectivity
  • Deploy effective applications for automatic protection against spam and DHAs
  • Help create a company-wide security plan with proactive network monitoring
  • Offer comprehensive Call Center Services
  • Develop a practical data backup and business continuity plan centered on Data Protection Manager automated backup capability
If your company has an urgent requirement for computer security support, go to Progent's Emergency Remote Technical Help.

Progent's engineers offer world-class services in key fields of computer protection that include security assessment, firewall/VPN support, and high-level security planning.

System Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your existing computer protection environment by performing comprehensive remote automated analysis via advanced software tools and proven procedures. Progent's skill in administering this testing saves you time and money and assures an accurate portrayal of gaps. The information your company gains can form the basis of a security plan that can permit your information system to operate dependably and react rapidly to future risks.

Automated Network Security Audits
Progent provides consulting in the application of security analysis packages including Microsoft's MBSA and GFI LANguard NSS for economically performing a variety of programmed system auditing scans to identify possible security gaps. Progent has extensive experience with additional network auditing utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.

Progent can help you design protection into your business operations, install auditing tools, plan and deploy a secure network architecture, and suggest policies to maximize the security of your IT system. Progent's security professionals are available to show you how to configure a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Find out additional information concerning Progent's network security audits.

Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory bundles designed to allow small companies to receive an impartial network security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from outside your firewalled perimeter to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a system scan from an authorized computer inside your firewall to assess the risk to internal threats. The two security inventory services are configured and run from a protected remote location. The project is overseen by an engineer who has earned high-level security accreditations and who generates a report that details and analyzes the data captured by the scan and suggests cost-effective remediation if appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration testing is a key part of any serious network security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your company's internal IT resources. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion incident alerts and event log monitoring are properly configured and consistently checked. Find out more on Progent's stealth penetration analysis consulting.

Firewalls and VPN Solutions
Progent's expertise in security technology includes in-depth field work with leading firewalls and VPN technology offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Support Expertise
Cisco's security and offsite connection products offer a full range of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Learn more details concerning Progent's Consulting Expertise for Cisco Security and VPN Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size companies professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies such as Check Point Software, Juniper, and SonicWALL. Progent can help you design a comprehensive security strategy and select the right technologies from multiple suppliers to support your security objectives while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis technology to defend endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely escape legacy signature-based anti-virus tools. ProSight ASM protects local and cloud resources and provides a single platform to manage the complete malware attack progression including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, device control, and web filtering through cutting-edge technologies packaged within one agent accessible from a single control. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you prove compliance with legal and industry information protection regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent can also help you to install and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid recovery of vital data, applications and VMs that have become lost or corrupted as a result of hardware failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can deliver world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security vendors to deliver web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Because the system is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect data related to your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to 50% of time wasted looking for critical information about your network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Any business should develop a thoroughly considered security program that incorporates both preventive processes and reaction plans. The pre-attack strategy is a collection of procedures designed to minimize security weaknesses. The reactive strategy helps your company's IT security personnel to assess the damage resulting from an attack, repair the damage, document the experience, and get business functions restored as soon as possible.

Progent's expert information security engineers are available to assist your business to perform a complete risk assessment and define a network security strategy to implement security processes and mechanisms to reduce future attacks and threats.

CISM Accredited Information Security Consulting Expertise
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of performance that information security professionals are expected to master. CISM provides executive management the assurance that consultants who have qualified for their CISM credential possess the background and knowledge to provide efficient security management and consulting services. Progent offers the support of CISM qualified security consultants to help companies with:

  • Network Security Governance
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Administration
  • Recovery Planning
Find out additional information about Progent's CISM Accredited IS Security Consulting Professionals.

CISSP Certified Security Engineering Expertise
The CISSP credential recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted certification recognition in the field of information protection stipulated by ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Read additional information about Progent's CISSP Accredited Network Security Consulting Services.

ISSAP Qualified Secure Information System Architecture Engineering Assistance
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP Certification as a result of thorough examination and significant experience with network security architecture. The ISSAP certification indicates demonstrated mastery in the more in-depth requirements of information security architecture within the broader scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all phases of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Learn more details about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.

CISA Accredited IS Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a prestigious qualification that represents expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive test administered by the ISACA professional group. Progent's CISA-certified security audit consultants can help your business in the areas of:

  • Information Systems Audit Services
  • IT Administration
  • Systems and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get the details about Progent's CISA Certified Information System Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's skills to design, deploy, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and execute a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation engineers can provide a variety of risk evaluation services such as:

  • Collect information and review documentation to help identify significant risk scenarios
  • Identify legal, regulatory, and business mandates and company standards associated with your network to determine their possible influence on your business objectives
  • Identify potential threats for your business workflows to assist in evaluating your corporate risk
  • Create a risk awareness program and conduct seminars to ensure your organization understand information system risk so they can assist with your risk management process
  • Connect identified risk scenarios to your associated operational processes to help determine risk responsibility
  • Validate risk tolerance with your senior leadership and major stakeholders to ensure they are in agreement
Read more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Information System Security Engineering Services
Global Information Assurance Certification was founded in 1999 to certify the skill of IT security experts. GIAC's goal is to verify that a certified professional possesses the knowledge necessary to deliver support in critical areas of system, information, and application security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC-certified information security audit engineers are available to assist your IT organization in the areas of:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read more details about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Specialist
To learn how you can contact a certified Progent security consultant for remote or on-premises help in Iowa, phone 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.