Small business IT networks in Iowa can now get quick and affordable online help from Progent's qualified security engineers to assist with the toughest security problems. Rates are affordable, billing is per minute, engagement is immediate, and service is world class. Progent also offers help for complex projects that demand the services of seasoned security engineers with top industry credentials.

In case your Iowa organization is situated away from larger urban areas like Des Moines, Cedar Rapids, Davenport, or Sioux City, access to local accredited network security engineers is often problematic during an emergency. This could mean a drop in income for your business, angry clients, unproductive workers, and distracted management. By utilizing Progent's online services, you can get in touch with a certified security consultant ready to offer expertise whenever you have to have it to keep your computer network running and salvage your data.

Progent can assist you in a variety of ways in your initiatives to guard your IT environment with support services that can range from security audits to developing a comprehensive security plan. Progent provides affordable support to help businesses of all sizes to set up and manage protected networks based on Windows and Cisco products and that may include computers running UNIX or Linux operating systems plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to provide centralized control and world-class protection for your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your exposure to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper level of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The onsite security gateway can also enable Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's certified professionals are available remotely or on site to provide a variety of urgent or project-based computer security services including:

  • Perform automated network security evaluations
  • Recuperate rapidly after virus and worm attacks
  • Install firewalls from multiple vendors
  • Implement secure methods for offsite and mobile access
  • Deploy advanced utilities for automatic protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with proactive monitoring
  • Provide outsourced Help Desk Services
  • Develop a practical network backup and business continuity solution centered on Microsoft Data Protection Manager backup/restore capability
If your network has an urgent need for computer security support, go to Progent's Emergency Online Network Help.

Progent's support professionals provide world-class support in key facets of computer security that include security evaluation, firewall and VPN solutions, and high-level security planning.

System Assessment
Progent's expert security consultants can assess the effectiveness of your current computer protection implementation by performing comprehensive remote automated testing via advanced software tools and tested procedures. Progent's skill in administering this service saves your company money and offers a detailed picture of system vulnerability. The knowledge your IT organization gains can make up the foundation of a security plan that can permit your information system to run safely and adapt rapidly to new threats.

Automated Network Vulnerability Evaluation
Progent offers expertise in the use of security auditing utilities such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably performing a variety of programmed network testing checks to identify possible security holes. Progent has extensive experience with other security analysis tools such as NMAP, AMAP, eEye, as well as utilities like Metasploit, Netcat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you design security into your business processes, install auditing tools, plan and implement a secure network environment, and recommend procedures to optimize the security of your IT system. Progent's security consultants are available to help you set up a firewall, implement secure remote access to email and data, and integrate VPN. Learn more about Progent's automated security evaluation.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two low-cost security inventory packages designed to enable small companies to receive an independent security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, an engineer runs a system scan from a secure computer within your firewall to uncover the risk to internal assaults. Both security inventory packages are set up and run from a protected remote location. The project is directed by a consultant who has earned high-level security accreditations and who generates a document that summarizes and interprets the data captured by the scan and suggests practical improvements where called for.

Stealth Security Penetration Analysis Consulting
Stealth intrusion testing is a key component of any successful network security plan. Progentís security professionals can perform thorough penetration tests without the awareness of your organization's in-house IT staff. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion detection warnings and event log analysis are properly configured and consistently monitored. Find out additional information concerning Progent's stealth security penetration analysis consulting.

Firewall/VPN Solutions
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote connection products represent a full range of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and CCNP qualifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Find out additional information about Progent's Consulting Expertise for Cisco Security and VPN Appliances.

Consulting Expertise for Other Firewall and VPN Products
Progent offers small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a detailed security strategy and select the right products from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to deliver centralized management and world-class protection for your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-matching AV products. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to automate the entire threat progression including filtering, identification, mitigation, cleanup, and forensics. Top features include single-click rollback using Windows VSS and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of vital data, applications and virtual machines that have become lost or corrupted as a result of hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your critical information. Learn more about ProSight DPS Managed Backup.

Expert Security Design
Any company should develop a thoroughly considered security strategy that includes both proactive processes and reaction planning. The proactive plan is a set of procedures that help to minimize security weaknesses. The reactive plan assists your company's IT security personnel to assess the damage resulting from a security penetration, fix the damage, record the event, and get business functions operational as rapidly as possible.

Progent's expert IT security engineers can to help your business to run a comprehensive vulnerability evaluation and create a company-wide security plan to establish security policies and controls to reduce ongoing assaults and threats.

CISM Accredited Network Security Support Assistance
The CISM organization defines the basic competencies and international standards of performance that information security professionals are required to master. CISM provides business management the confidence that consultants who have qualified for their CISM credential have the background and capability to provide effective security management and consulting services. Progent can provide the expertise of CISM certified security consultants to help businesses with:

  • Network Security Governance
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Response Planning
Read additional details concerning Progent's CISM Qualified Information Security Engineering Expertise.

CISSP Certified Security Engineering Services
CISSP certification denotes expertise with a global standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas including:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Learn additional details concerning Progent's CISSP Qualified Information Security Consulting Expertise.

ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's ISSAP qualified network architecture professionals are experts who have earned ISSAP status through rigorous examination and extensive work with information security architecture. The ISSAP credential indicates demonstrated mastery in the most complex requirements of information system security architecture within the broader field of information security expertise required for CISSP certification. Progent's ISSAP-qualified security consultants can help your company with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Telecommunications and System Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Read more information about Progent's ISSAP Qualified Secure Information System Architecture Consulting Expertise.

CISA Qualified IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that represents expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA IS security audit specialists can help your company in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Read more details about Progent's CISA Qualified Information System Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk management engineers offer a variety of risk identification services including:

  • Collect data and review documentation to help identify significant vulnerabilities
  • Identify statutory, regulatory, and business requirements and company policies related to your information system to determine their possible influence on your business objectives
  • Identify potential threats for your operational workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization appreciate IT risk so they can assist with your risk control process
  • Match key risk scenarios to your associated business procedures to help determine risk responsibility
  • Determine risk appetite with your senior management and major stakeholders to make sure they match
Learn more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's mission is to verify that a certified professional has the knowledge necessary to deliver services in critical areas of network, data, and application security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified IS security audit experts are available to assist your company with:

  • Auditing Networks
  • Security Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Support.

Contact a Security Expert
To see how you can contact a certified Progent security engineer for online or on-premises expertise in Iowa, call 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.