Small business IT networks in Iowa can have fast and affordable remote access to Progent's qualified network security professionals to resolve urgent security problems. The cost is affordable, charges are per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex engagements that requires the services of senior security consultants with top industry credentials.

If your Iowa network is located far from larger urban areas including Des Moines, Cedar Rapids, Davenport, or Sioux City, access to local qualified network security support specialists is often problematic when you have an emergency. This could mean a loss of revenue for your company, upset customers, unproductive workers, and distracted executives. By utilizing Progent's remote support, you can get in touch with a qualified security engineer who can deliver help when you require it to keep your computer network on line and restore your data.

Progent can assist you in a variety of ways in your initiatives to protect your IT environment with support services that can range from network security assessments to creating a comprehensive security plan. Progent offers affordable support to assist companies of any size to design and manage secure networks based on Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security companies to deliver web-based control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's security professionals are accessible remotely or on site to provide a variety of urgent or project-based computer security services which include:

If your business has an immediate need for IT security support, refer to Progent's Urgent Remote Network Help.

Progent's security experts can deliver world-class services in key facets of system security that include auditing, firewall and VPN solutions, and high-level security planning.

System Security Evaluation
Progent's expert security engineers can assess the vulnerability of your current computer security systems through exhaustive remote automated analysis via sophisticated software tools and tested procedures. Progent's experience in this testing saves you time and money and offers an objective portrayal of security holes. The information your business gains can make up the basis of a network protection strategy that can permit your information system to operate dependably and react rapidly to new threats.

Automated Network Security Evaluation
Progent provides consulting in the use of security testing utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically running a set of programmed system testing scans to uncover potential security holes. Progent has extensive experience with other security auditing tools such as NMAP Port Scanner, AMAP, eEye, as well as tools such as Metasploit Framework, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can show you how to design security into your business operations, install auditing tools, plan and implement a protected system environment, and recommend policies to optimize the security of your network. Progent's security engineers are ready to show you how to configure a firewall, design safe remote connectivity to email and data, and install VPN. Learn additional information on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory service bundles intended to allow small businesses to receive an objective network security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from outside your firewall to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine within your company firewall to evaluate vulnerabilities to internal attacks. The two security inventory services are set up and run from a secured external location. The project is managed by a consultant with top security accreditations and who generates a report that summarizes and analyzes the data captured by the scan and proposes practical improvements if called for.

Stealth Penetration Testing Support Services
Stealth penetration checking is an important component of any comprehensive IT system security strategy. Progent’s security experts can run extensive penetration tests without the awareness of your organization's internal IT staff. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion incident alerts and event history analysis are properly set up and consistently checked. Learn additional information about Progent's network penetration testing consulting.

Firewalls and VPN Support
Progent's background in network security technology encompasses extensive field work with major firewalls and Virtual Private Network (VPN) products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned key industry certifications such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your existing PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote access technology provide a full range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Read additional details concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.

Consulting Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and choose the right products from multiple vendors to support your security goals while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to address the complete malware attack lifecycle including protection, detection, mitigation, cleanup, and forensics. Top capabilities include one-click rollback with Windows VSS and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge tools incorporated within one agent managed from a unified console. Progent's security and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that meets your company's specific requirements and that allows you prove compliance with legal and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent action. Progent can also assist your company to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital files, applications and virtual machines that have become lost or damaged as a result of component failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to configure ProSight DPS to be compliant with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical information. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security companies to provide centralized management and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a deeper level of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more information, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hosting environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect information related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSLs or domains. By updating and managing your IT documentation, you can save up to half of time wasted searching for vital information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether you’re planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Every business ought to have a thoroughly considered security program that includes both preventive processes and response plans. The pre-attack strategy is a set of steps designed to minimize vulnerabilities. The reactive strategy assists your company's network security engineers to evaluate the damage resulting from a security penetration, fix the system, document the event, and get the IT network restored as rapidly as feasible.

Progent's certified IT security engineers are available to help your business to perform a full vulnerability assessment and define a company-wide security strategy to implement security processes and mechanisms to minimize ongoing assaults and threats.

CISM Qualified System Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of skill that IT security managers are expected to learn. CISM gives business management the confidence that those who have qualified for their CISM certification have the experience and capability to deliver efficient security administration and consulting services. Progent can provide the services of CISM qualified security consultants to assist companies with:

  • IS Security Strategies
  • Vulnerability Management
  • IS Security Program Management
  • Information Security Management
  • Response Management
Learn additional details about Progent's CISM Security Engineering Expertise.

CISSP Accredited Security Consulting Assistance
The CISSP credential recognizes mastery of an international standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the field of information security stipulated by ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Find out more details about Progent's CISSP Qualified Information Security Engineering Professionals.

ISSAP Certified Secure System Architecture Consulting Services
Progent's ISSAP certified system architecture engineers are consultants who have earned ISSAP Certification through thorough testing and significant work with information security design. The ISSAP certification represents demonstrated mastery in the most complex demands of information security architecture bounded by the broader scope of information security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Protection
  • Cryptography Options
  • Requirements Evaluation and Security Criteria
  • BCP and DRP
  • Site Security
Read additional information concerning Progent's ISSAP Accredited Secure Network Architecture Support Services.

CISA Accredited Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that represents expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination given by the ISACA international professional group. Progent's CISA-qualified security audit engineers can help your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Find out more information about Progent's CISA Qualified Information System Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's skills to plan, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and execute a business continuity plan that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation specialists offer a range of risk identification services such as:

  • Gather information and study documentation to help identify significant risk scenarios
  • Identify legal, regulatory, and business requirements and organizational standards associated with your information system to determine their potential impact on your strategic goals
  • Point out possible threats for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct training to ensure your stakeholders understand IT risk so they can assist with your risk control program
  • Match key risk scenarios to related business procedures to help assign risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to make sure they align
Find out additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security experts. GIAC's mission is to verify that a certified security consultant has the skills needed to provide support in critical areas of system, information, and application software security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit consultants are available to assist your company in the areas of:

Find out additional information about Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Specialist
To see how you can access a certified security consultant for online or onsite expertise in Iowa, call 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.