Business networks in Iowa can now get quick and economical online access to Progent's certified network security experts to help with complex security problems. The cost is reasonable, billing is by the minute, sign-up is immediate, and service is world class. Progent also provides assistance for long-term projects that requires the services of seasoned security consultants with top security credentials.

In case your Iowa company is situated some distance from major metropolitan neighborhoods including Des Moines, Cedar Rapids, Davenport, or Sioux City, support from local accredited network security engineers is often limited during an emergency. This could mean a loss of revenue for your company, angry clients, unproductive workers, and defocused executives. By calling Progent's remote support, you can get in touch with a certified security engineer who can provide expertise when you require it to keep your information system operating and salvage your data.

Progent can assist you at any level in your initiatives to guard your network with support services that ranges from network security audits to creating a company-wide security plan. Progent offers affordable support to assist companies of any size to configure and manage secure IT environments powered by Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to provide centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further level of analysis for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also enable Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall.

Progent's certified professionals are accessible remotely or in person to offer a variety of emergency or longer-term computer security services such as:

If your business has an immediate requirement for IT security help, go to Progent's Urgent Remote Technical Help.

Progent's support professionals can deliver world-class services in vital areas of system protection that include security evaluation, firewall/VPN support, and high-level security consulting.

System Assessment
Progent's certified security consultants can evaluate the strength of your existing network protection implementation through comprehensive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in administering this testing saves your company money and offers an accurate portrayal of weaknesses. The information your business gains can be used as the basis of a security strategy that will allow your network to run dependably and respond rapidly to new threats.

Automated Security Audits
Progent offers consulting in the use of security testing products including Microsoft Baseline Security Analyzer and GFI LANguard for economically running a set of automatic system auditing scans to identify possible security holes. Progent has broad knowledge of other network auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can help you build security into your company operations, configure auditing software, plan and deploy a protected network architecture, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are available to assist you to configure a firewall, design secure remote access to email and data, and install VPN. Find out additional information concerning Progent's network security evaluation.

Security Inventory Scanning Bundles for Small Companies
Progent has put together two low-cost security inventory scanning bundles intended to enable small companies to get an objective security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, a security expert administers an extensive test of your network from outside your firewalled perimeter to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from a secure machine inside your firewall to uncover vulnerabilities to internal threats. The two security inventory services are configured and executed from a protected external site. The process is overseen by a consultant who has earned top security credentials and who generates a document that details and interprets the information collected by the security scan and proposes cost-effective improvements if appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion checking is an important part of any successful IT system security strategy. Progentís security experts can perform extensive penetration checks without the awareness of your organization's in-house network support resources. Stealth penetration checking shows whether current security monitoring systems such as intrusion incident alerts and event history monitoring are properly set up and consistently checked. Find out more on Progent's stealth penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security technology encompasses extensive field work with leading firewalls and Virtual Private Network technology from multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and remote connection products represent a full range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Learn additional information concerning Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and select appropriate products from multiple vendors to achieve your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top information security companies to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more details, visit Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to address the entire threat progression including protection, identification, containment, cleanup, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables rapid restoration of critical data, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's BDR consultants can deliver advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Planning
Every business should develop a thoroughly thought out security program that includes both pre-attack processes and response plans. The pre-attack strategy is a set of mechanisms intended to reduce security weaknesses. The reactive strategy helps your company's security engineers to assess the damage caused by an attack, repair the damage, record the experience, and get the IT network running as quickly as possible.

Progent's certified IT security consultants can to assist you to perform a comprehensive risk assessment and create a computer security strategy to implement security policies and mechanisms to reduce ongoing attacks and dangers.

CISM Qualified Network Security Consulting Assistance
The CISM committee describes the basic competencies and international standards of performance that information security managers are expected to learn. It provides business management the confidence that consultants who have qualified for their CISM credential possess the background and knowledge to deliver effective security management and consulting services. Progent can provide the support of CISM qualified security professionals to assist companies with:

  • IS Security Strategies
  • Risk Analysis
  • IS Security Program Management
  • Information Security Administration
  • Recovery Planning
Learn more information concerning Progent's CISM Certified Information Security Consulting Services.

CISSP Qualified Security Engineering Assistance
CISSP certification recognizes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information protection stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Find out more information concerning Progent's CISSP IS Security Consulting Expertise.

ISSAP Certified Secure IT Architecture Engineering Support
Progent's ISSAP certified information system architecture engineers are consultants who have earned ISSAP Certification through thorough examination and significant work with information security architecture. The ISSAP certification represents proven mastery in the more complex demands of information system security architecture within the wider field of information security knowledge required for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Learn additional information about Progent's ISSAP Accredited Secure IT Architecture Engineering Expertise.

CISA Certified Security Auditing Consulting Assistance
The CISA accreditation is a globally recognized achievement that represents expertise in network security auditing. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive examination administered by the ISACA professional association. Progent's CISA-qualified security audit consultants can help your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Resources
  • Business Continuity Planning
Get additional details about Progent's CISA Accredited IS Security Auditing Engineering Services.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and maintain information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation specialists offer a range of risk evaluation services such as:

  • Gather data and review documentation to evaluate major risk scenarios
  • Identify legal, industry, and contractual requirements and organizational policies associated with your information system to assess their potential influence on your strategic objectives
  • Identify potential vulnerabilities for your business processes to assist in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization understand information system risk so they can assist with your risk management process
  • Match identified risk scenarios to related business processes to help assign risk responsibility
  • Determine risk appetite with executive leadership and major stakeholders to ensure they match
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security professionals. GIAC's goal is to verify that an accredited professional has the skills needed to provide services in important areas of network, data, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States NSA. Progent's GIAC-qualified information security audit consultants can assist your company in the areas of:

  • Auditing Networks
  • Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Find out additional details about Progent's GIAC Information Assurance Support.

Talk to a Certified Security Expert
To find out how you can get in touch with a certified Progent security consultant for remote or onsite help in Iowa, phone 1-800-993-9400 or go to Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.