Small business networks in the state of Iowa can depend on prompt and economical remote technical support from Progent's certified network security engineers to resolve critical security problems. Rates are affordable, charges are by the minute, engagement is quick, and support is unbeatable. Progent also offers help for long-term engagements that requires the expertise of senior security consultants with high-level industry credentials.

In case your Iowa network is away from more populated urban neighborhoods like Des Moines, Cedar Rapids, Davenport, or Sioux City, help from nearby accredited security professionals could be limited during an urgent situation. This could mean a loss of productivity for your business, upset customers, unproductive employees, and defocused executives. By calling Progent, you have access to a certified security engineer ready to provide expertise when you need it to keep your information system running and salvage your information.

Progent can assist you in all your efforts to guard your information system with services that can range from network security audits to developing a company-wide security plan. Progent provides economical service to help businesses of all sizes to set up and manage safe IT environments based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to deliver web-based control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further layer of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's security consultants are available online or in person to offer a variety of urgent or project-based IT security services including:

If your business has an immediate need for IT security help, refer to Progent's Urgent Remote Technical Help.

Progent's security experts can deliver advanced support in vital facets of network security including security assessment, firewalls and VPN, and high-level security planning.

System Security Assessment
Progent's certified security consultants can evaluate the effectiveness of your current network security implementation by performing comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's experience in administering this testing saves your company consulting fees and assures a detailed portrayal of weaknesses. The information your business is provided can make up the basis of a network protection strategy that will permit your network to operate dependably and respond rapidly to future threats.

Automated Vulnerability Evaluation
Progent offers consulting in the application of security testing products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably running a variety of automatic network auditing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of additional network analysis tools including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand audit reports and respond appropriately.

Progent can show you how to build protection into your business operations, install auditing software, plan and deploy a protected network environment, and recommend policies to optimize the security of your network. Progent's security consultants are able to show you how to configure a firewall, design safe remote connectivity to email and data, and integrate VPN. Learn more about Progent's automated security evaluation.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation packages designed to enable small businesses to receive an impartial security assessment from a certified security engineer. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to uncover possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional runs a network scan from a secure computer inside your firewall to determine the risk to internal attacks. Both security inventory services are configured and executed from a protected remote location. The project is directed by a consultant with top security credentials and who produces a document that summarizes and interprets the data collected by the security scan and proposes cost-effective improvements where called for.

Stealth Intrusion Testing Consulting
Stealth penetration checking is an important part of any successful network security strategy. Progent’s security experts can run extensive penetration tests without the knowledge of your organization's in-house IT staff. Stealth penetration checking shows whether existing security monitoring systems such as intrusion detection warnings and event history monitoring are properly configured and consistently monitored. Find out more concerning Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses in-depth familiarity with major firewalls and VPN technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection products offer a full line of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Find out more details about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size businesses expert support for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and select appropriate technologies from multiple suppliers to support your security goals while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior analysis technology to defend endpoints and servers and VMs against new malware attacks like ransomware and email phishing, which easily get by traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to manage the complete threat progression including blocking, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your company's unique requirements and that allows you demonstrate compliance with government and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate attention. Progent's consultants can also help you to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates your backup activities and allows rapid restoration of vital files, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can provide world-class support to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical information. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top information security vendors to deliver centralized control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the apps. Because the environment is virtualized, it can be ported immediately to a different hosting solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and protect information related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates or domains. By updating and organizing your network documentation, you can eliminate as much as 50% of time wasted looking for critical information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether you’re making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Security Design
Every company ought to have a thoroughly considered security program that incorporates both proactive procedures and reaction planning. The proactive strategy is a set of procedures designed to minimize vulnerabilities. The post-attack strategy helps your company's network security personnel to assess the damage caused by an attack, fix the damage, document the event, and get business functions operational as quickly as feasible.

Progent's certified IS security consultants are available to help you to perform a complete risk assessment and define a computer security strategy to establish security processes and controls to reduce future assaults and dangers.

CISM Certified Security Consulting Services
The Certified Information Security Manager (CISM) organization defines the core capabilities and worldwide standards of performance that IT security managers are required to learn. CISM gives business management the assurance that those who have earned their CISM credential possess the experience and knowledge to provide efficient security management and consulting services. Progent can provide the expertise of CISM qualified security consultants to help businesses with:

  • Network Security Governance
  • Risk Management
  • Network Security Implementation Management
  • Information Security Management
  • Recovery Planning
Read more information about Progent's CISM Qualified Security Engineering Professionals.

CISSP Certified Security Consulting Support
The CISSP credential recognizes mastery of a global standard for information security. ANSI has granted certification accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISSP Network Security Support Professionals.

CISSP-ISSAP Accredited Secure System Architecture Consulting Support
Progent's CISSP-ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP status through thorough examination and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the more challenging requirements of information system security architecture within the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Criteria
  • BCP and DRP
  • Site Security
Learn additional details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Expertise.

CISA Certified Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that represents expertise in information system security auditing. Certified by ANSI, the CISA credential has consultants pass an extensive examination given by the ISACA international professional group. Progent's CISA-certified information security audit experts are available to assist your company with:

  • Information Systems Audit Process
  • IT Administration
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Get more information about Progent's CISA Accredited Information System Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate an IT professional's skills to design, deploy, and support IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts offer a range of risk evaluation services such as:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory legal, regulatory, and business requirements and company policies associated with your information system to determine their possible impact on your business goals
  • Identify potential threats for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate information system risk so they can assist with your risk management program
  • Match key risk vectors to your associated operational processes to help assign risk ownership
  • Determine risk tolerance with executive management and major stakeholders to ensure they align
Get more details about Progent's CRISC Risk Management Experts.

GIAC Accredited Network Security Engineering Support
GIAC was founded in 1999 to certify the knowledge of IT security experts. GIAC's mission is to ensure that a certified professional has the knowledge necessary to provide support in critical categories of network, data, and application security. GIAC accreditations are recognized by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit experts can assist your business in the areas of:

Read additional details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Expert
To learn how you can get in touch with a security consultant for remote or on-premises expertise in Iowa, call 1-800-993-9400 or visit Remote Network Help.














© 2002- 2019 Progent Corporation. All rights reserved.