Small business information networks in the state of Kansas now have fast and affordable remote access to Progent's certified security professionals to fix complex security problems. The cost is reasonable, billing is by the minute, engagement is immediate, and support is world class. Progent also provides help for long-term projects that demand the services of senior security engineers with top industry certifications.

If your Kansas business is far from major urban neighborhoods such as Wichita, Overland Park, Kansas City, or Topeka, contact with nearby qualified security professionals could be problematic during an urgent situation. This can cause a drop in revenue for your business, upset clients, idle employees, and distracted management. By utilizing Progent's remote support, you have access to a qualified security professional who can deliver expertise whenever you have to have it to keep your information system on line and restore your information.

Progent can help you at any level in your efforts to guard your information system with services that can range from network security assessments to developing a company-wide security plan. Progent provides affordable support to help small and midsize companies to design and manage safe networks powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security platform that incorporates the technology of leading information security companies to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified engineers are accessible remotely or on site to provide a range of urgent or longer-term network security services including:

  • Perform automated security audits
  • Recuperate rapidly after virus and worm attacks
  • Set up hardware and software firewalls
  • Configure safe methods for offsite and mobile connectivity
  • Install advanced applications for protection against spam and DHAs
  • Develop a company-wide security plan with 24x7 network monitoring
  • Offer comprehensive Help Desk Call Center Support
  • Develop a practical backup and disaster recovery strategy built around Microsoft DPM automated backup technology
If your network has an emergency need for IT security help, go to Progent's Urgent Remote Technical Support.

Progent's engineers offer advanced support in vital areas of network protection including security evaluation, firewall and VPN expertise, and high-level security consulting.

System Security Audits
Progent's certified security engineers can assess the vulnerability of your current network security systems by performing comprehensive remote automated analysis via advanced software tools and tested procedures. Progent's experience in administering this testing saves your company time and money and offers an objective portrayal of gaps. The knowledge your company is provided can form the basis of a network protection strategy that can permit your information system to run safely and adapt rapidly to new threats.

Automated Network Vulnerability Evaluation
Progent offers consulting in the application of security analysis utilities including Microsoft's MBSA and GFI LANguard Network Security Scanner for economically performing a set of automatic network auditing scans to identify potential security weaknesses. Progent has broad knowledge of additional network analysis tools including NMAP, AMAP application mapper, eEye, as well as utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can show you how to design security into your company processes, configure scanning software, plan and implement a protected network environment, and suggest policies to optimize the security of your network. Progent's security consultants are available to assist you to configure a firewall, implement secure remote access to email and data, and install VPN. Learn more on Progent's network security assessment.

Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small companies to get an independent network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive test of your IT infrastructure from outside your company firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from a secure machine inside your company firewall to uncover your exposure to inside assaults. Both security inventory packages are configured and run from a secured remote site. The process is overseen by a consultant with high-level security accreditations and who produces a report that details and analyzes the information collected by the scan and suggests cost-effective improvements where called for.

Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important component of any serious IT system security plan. Progentís security experts can run extensive intrusion checks without the awareness of your organization's internal IT staff. Stealth penetration testing shows whether existing security defense systems such as intrusion detection warnings and event log monitoring are correctly configured and actively checked. Learn additional information about Progent's stealth security penetration analysis consulting.

Firewalls and VPN Expertise
Progent's background in security solutions encompasses extensive field work with major firewalls and Virtual Private Network (VPN) products offered by multiple companies including Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your existing PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite access products represent a complete range of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Find out more information about Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a detailed security plan and choose appropriate technologies from multiple vendors to support your security goals while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security companies to deliver centralized control and comprehensive protection for your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis technology to guard endpoints as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily escape legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to automate the complete malware attack progression including filtering, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and enables rapid recovery of critical data, applications and virtual machines that have become lost or damaged as a result of hardware failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your critical information. Read more about ProSight DPS Managed Backup.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can save up to half of time spent trying to find critical information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any business ought to develop a thoroughly considered security program that includes both pre-attack processes and response planning. The proactive strategy is a set of procedures designed to reduce security weaknesses. The reactive strategy helps your IT security personnel to evaluate the impact caused by an attack, fix the system, document the event, and get the IT network restored as soon as feasible.

Progent's certified IS security engineers can to help your business to run a full risk evaluation and define a network security plan to implement security processes and mechanisms to minimize ongoing attacks and dangers.

CISM Qualified Network Security Support Services
The CISM committee defines the basic competencies and worldwide standards of performance that information security managers are expected to master. It gives business management the assurance that consultants who have earned their CISM certification possess the background and knowledge to deliver efficient security management and support services. Progent can provide the services of CISM qualified security consultants to help businesses with:

  • Network Security Processes
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Find out more information about Progent's CISM Accredited Security Engineering Expertise.

CISSP Accredited Security Consulting Services
CISSP certification denotes mastery of a worldwide standard for information security. ANSI has awarded the CISSP credential accreditation in the area of data protection defined by ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Preparedness
Read more information concerning Progent's CISSP Qualified Security Engineering Expertise.

ISSAP Accredited Secure System Architecture Engineering Services
Progent's ISSAP qualified information system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous testing and extensive experience with information security architecture. The ISSAP credential indicates demonstrated competence in the most challenging requirements of information system security architecture bounded by the broader scope of information security expertise needed for CISSP certification. Progent's ISSAP-qualified security specialists can help your company with all phases of architecture security including.

  • Access Control Systems and Techniques
  • Phone System and Network Infrastructure Security
  • Cryptography Options
  • Needs Analysis and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Learn more details about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.

CISA Certified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that signifies expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test administered by the ISACA international professional group. Progent's CISA-qualified IS security audit experts are available to assist your business in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Business Continuity Planning
Learn the details concerning Progent's CISA Qualified Network Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists can provide a variety of risk evaluation services including:

  • Collect information and review documentation to help identify major vulnerabilities
  • Inventory legal, regulatory, and business mandates and organizational policies associated with your information system to assess their possible impact on your business objectives
  • Point out potential threats for your business processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your organization appreciate IS risk so they can assist with your risk control process
  • Match identified risk vectors to related business procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to make sure they align
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of network security engineers. GIAC's goal is to assure that an accredited security consultant possesses the skills needed to deliver support in important categories of network, information, and application program security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit experts are available to assist your company with:

Read more information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Security Specialist
To learn how to get in touch with a security engineer for remote or onsite expertise in Kansas, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.