Company networks in Kansas can now get quick and economical remote technical support from Progent's qualified security professionals to help with urgent security problems. Rates are reasonable, charges are per minute, sign-up is immediate, and support is world class. Progent also provides assistance for complex engagements that requires the knowledge of senior security engineers with top industry certifications.

In case your Kansas organization is away from more populated urban areas such as Wichita, Overland Park, Kansas City, or Topeka, support from local certified network security consultants may be limited when you have an urgent situation. This can result in lost revenue for your company, angry clients, unproductive workers, and distracted management. By contacting Progent's remote support, you have access to a qualified security consultant ready to offer help whenever you have to have it to keep your network on line and restore your information.

Progent can help you in a variety of ways in your initiatives to protect your information system with support that ranges from security audits to creating a comprehensive security plan. Progent offers economical service to help companies of any size to configure and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper layer of inspection for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified experts are available remotely or in person to offer a variety of urgent or longer-term computer security services including:

  • Perform automated network security audits
  • Recover promptly after serious security breaches
  • Install firewalls from multiple vendors
  • Configure secure techniques for remote and mobile connectivity
  • Deploy effective solutions for automatic defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security plan with proactive monitoring
  • Provide outsourced Help Desk Call Center Services
  • Create a practical network backup and disaster recovery plan built around Data Protection Manager (DPM) backup/restore capability
If your company has an immediate need for IT security help, refer to Progent's Emergency Online Network Help.

Progent's support professionals can deliver world-class support in vital areas of network security including analysis, firewall and VPN solutions, and high-level security consulting.

System Evaluation
Progent's certified security engineers can assess the vulnerability of your current computer protection environment by performing comprehensive remote automated testing via sophisticated utilities and tested techniques. Progent's experience in administering this service saves your company consulting fees and assures a detailed picture of security holes. The knowledge your business gains can be used as the foundation of a network protection plan that will allow your information system to run safely and react quickly to new risks.

Automated Network Vulnerability Assessment
Progent offers expertise in the use of security analysis software such as MBSA and GFI LANguard for affordably running a variety of programmed network auditing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of other security analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.

Progent can show you how to design protection into your company processes, configure auditing software, plan and implement a protected system environment, and suggest policies to optimize the safety of your IT system. Progent's security professionals are ready to assist you to set up a firewall, implement safe remote access to email and data, and install VPN. Learn more about Progent's network security evaluation.

Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory packages intended to allow small companies to get an independent security evaluation from an accredited security expert. With Progent's External Security Inventory Scan, an engineer runs an extensive examination of your IT infrastructure from outside your firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a system scan from a secure machine within your firewall to assess vulnerabilities to internal assaults. Both security inventory services are configured and executed from a secured external location. The process is overseen by a consultant who has earned top security accreditations and who generates a report that details and interprets the information captured by the scan and proposes cost-effective remediation where called for.

Network Security Penetration Analysis Consulting
Stealth penetration testing is a key part of any comprehensive network security plan. Progentís security professionals can perform extensive penetration checks without the knowledge of your organization's in-house IT resources. Stealth penetration checking shows whether current security monitoring tools such as intrusion incident alerts and event history analysis are properly configured and actively monitored. Learn more concerning Progent's network penetration testing support services.

Firewall and Virtual Private Network Solutions
Progent's background in security solutions encompasses in-depth field work with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your existing PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Network Security and VPN Support Expertise
Cisco's network security and remote access technology provide a complete line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and CCNP qualifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Find out additional details concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Products.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security plan and choose the right products from a variety of vendors to support your security objectives while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver web-based management and world-class protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam filtering, DLP, and encryption. The local gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior machine learning technology to guard endpoints and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus products. ProSight ASM protects local and cloud-based resources and offers a single platform to address the entire threat lifecycle including filtering, detection, containment, cleanup, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital data, apps and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Network Security Consulting
Any company ought to have a thoroughly thought out security program that incorporates both proactive procedures and response planning. The pre-attack strategy is a collection of mechanisms intended to reduce vulnerabilities. The reactive strategy helps your network security engineers to assess the damage caused by a security penetration, fix the damage, record the experience, and get the IT network restored as soon as feasible.

Progent's certified IT security engineers can to help you to perform a complete vulnerability assessment and create a computer security strategy to implement security processes and mechanisms to minimize ongoing attacks and threats.

CISM Certified Network Security Consulting Services
The CISM organization defines the core capabilities and worldwide standards of performance that information security professionals are expected to learn. CISM gives executive management the assurance that consultants who have qualified for their CISM credential have the background and capability to provide efficient security administration and consulting services. Progent can provide the services of CISM qualified security consultants to assist businesses with:

  • Network Security Processes
  • Vulnerability Management
  • Information Security Implementation Management
  • Network Security Management
  • Recovery Management
Find out additional details about Progent's CISM Security Engineering Services.

CISSP Certified Security Consulting Assistance
CISSP denotes expertise with an international standard for network security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of information protection under ISO 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas including:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Find out more details about Progent's CISSP Qualified Network Security Support Services.

ISSAP Qualified Secure System Architecture Engineering Assistance
Progent's ISSAP qualified IT architecture professionals are experts who have earned ISSAP status through rigorous examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the most challenging demands of information system security architecture within the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-qualified security specialists can assist your company with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Read additional information concerning Progent's ISSAP Accredited Secure Information System Architecture Support Services.

CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is an important qualification that indicates mastery in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive examination given by the ISACA international professional group. Progent's CISA network security audit engineers are available to assist your company in the areas of:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Information Assets
  • Business Continuity Planning
Get additional details concerning Progent's CISA Qualified Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to plan, implement, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and carry out a workplace continuity plan based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation consultants offer a range of risk evaluation services such as:

  • Gather data and study documentation to identify significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and organizational policies related to your network to determine their potential impact on your business goals
  • Identify possible vulnerabilities for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization appreciate IS risk so they can assist with your risk control program
  • Connect identified risk vectors to related business procedures to help assign risk responsibility
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they align
Learn additional information about Progent's CRISC Consultants.

GIAC Accredited IS Security Engineering Expertise
GIAC was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to ensure that a certified security consultant possesses the knowledge necessary to provide services in important areas of network, information, and application security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified network security audit experts are available to help your business with:

Find out more details concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Security Engineer
To learn how to get in touch with a security consultant for online or onsite support in Kansas, call 1-800-993-9400 or visit Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.