Company computer networks in Kansas can now get fast and economical remote access to Progent's accredited network security professionals to resolve urgent security issues. Rates are reasonable, charges are by the minute, sign-up is immediate, and service is world class. Progent also provides help for complex engagements that requires the knowledge of seasoned security consultants with top industry credentials.

In case your Kansas business is located away from larger metropolitan areas such as Wichita, Overland Park, Kansas City, or Topeka, contact with nearby qualified security professionals is often limited when there's an emergency. This can cause lost productivity for your business, angry clients, idle workers, and distracted executives. By contacting Progent's online services, you have access to a certified security consultant who can provide expertise whenever you have to have it to get your system operating and recover your data.

Progent can assist you at any level in your efforts to defend your network with services ranging from network security audits to creating a company-wide security strategy. Progent offers affordable service to assist small and midsize companies to set up and maintain secure networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux platforms plus BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to deliver centralized management and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance adds a further level of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also enable Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security experts are available remotely or on site to offer a range of urgent or longer-term network security services such as:

If your business has an immediate need for IT security support, go to Progent's Emergency Online Technical Help.

Progent's support professionals can deliver world-class services in key fields of computer protection including security assessment, firewalls and VPN, and high-level security planning.

System Security Audits
Progent's certified security consultants can assess the effectiveness of your existing computer security systems through comprehensive remote automated analysis via advanced software tools and proven techniques. Progent's skill in this service saves you time and money and assures an accurate picture of system vulnerability. The information your company is provided can make up the basis of a network protection plan that will allow your information system to run safely and adapt quickly to future risks.

Automated Vulnerability Audits
Progent offers expertise in the use of security analysis software including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically performing a variety of programmed network auditing scans to uncover potential security weaknesses. Progent has extensive experience with other network auditing products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you design protection into your business operations, install scanning applications, define and deploy a protected network architecture, and suggest procedures to optimize the safety of your IT system. Progent's security professionals are available to assist you to set up a firewall, design secure remote access to email and business applications, and install virtual private network. Learn more on Progent's automated security assessment.

Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory bundles intended to allow small businesses to get an objective network security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your IT infrastructure from outside your firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from a secure computer inside your firewall to determine the risk to internal attacks. Both security inventory services are set up and run from a secured external location. The process is directed by a consultant with high-level security credentials and who produces a document that summarizes and analyzes the data captured by the scan and proposes practical remediation if called for.

Stealth Penetration Analysis Consulting
Stealth penetration testing is a key part of any serious network security strategy. Progentís security professionals can perform thorough penetration checks without the awareness of your company's in-house network support resources. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion detection warnings and event log analysis are correctly configured and consistently monitored. Find out more on Progent's network penetration analysis support services.

Firewall/VPN Support
Progent's background in security solutions encompasses in-depth field work with leading firewalls and VPN products offered by multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants with important networking accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services integration and debugging services.

Cisco Network Security and VPN Engineering Services
Cisco's network security and offsite connection technology offer a full line of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Learn more details concerning Progent's Engineering Services for Cisco Security Technology and VPN Appliances.

Consulting Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security plan and select appropriate products from multiple suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a selection of low-cost, fixed-price monthly managed services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security companies to provide centralized control and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily evade traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to automate the entire threat lifecycle including filtering, detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of critical files, apps and VMs that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight DPS to be compliant with government and industry regulatory requirements like IPPA, FINRA, and PCI and, whenever necessary, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup and Recovery.

Certified Network Security Planning
Any company ought to have a carefully thought out security program that includes both proactive procedures and response planning. The proactive strategy is a collection of steps designed to minimize vulnerabilities. The post-attack plan assists your network security personnel to evaluate the damage caused by an attack, repair the damage, document the experience, and get business functions running as quickly as possible.

Progent's expert IT security consultants can to assist your company to perform a complete risk assessment and create a network security strategy to implement security processes and mechanisms to reduce ongoing assaults and threats.

CISM Certified Security Consulting Services
The CISM committee defines the basic competencies and international standards of performance that IT security managers are expected to master. CISM provides business management the confidence that those who have qualified for their CISM credential have the background and capability to deliver effective security administration and consulting services. Progent offers the services of CISM qualified security professionals to assist companies with:

  • Network Security Strategies
  • Vulnerability Management
  • Network Security Implementation Management
  • IS Security Administration
  • Response Planning
Read more details concerning Progent's CISM Network Security Engineering Professionals.

CISSP Certified Security Engineering Support
The CISSP credential recognizes mastery of a worldwide standard for information security. ANSI has awarded certification accreditation in the area of information security defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Read additional information about Progent's CISSP Qualified Security Consulting Services.

ISSAP Accredited Secure Network Architecture Consulting Services
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP Certification through thorough examination and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most in-depth requirements of information system security architecture bounded by the broader field of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture including.

  • Access Management Systems and Techniques
  • Telecom and Network Protection
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Read additional information concerning Progent's ISSAP Certified Secure Network Architecture Support Professionals.

CISA Certified IS Security Auditing Consulting Expertise
The CISA accreditation is a globally recognized achievement that represents mastery in IS security audit and control. Accredited by ANSI, the CISA credential requires that candidates undergo a comprehensive examination given by the ISACA professional group. Progent's CISA-qualified network security audit experts can assist your IT organization in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Learn additional details about Progent's CISA Qualified Network Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a business continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation experts can provide a range of risk assessment services including:

  • Gather information and review documentation to evaluate significant risk scenarios
  • Identify statutory, regulatory, and business requirements and organizational policies associated with your information system to assess their possible impact on your business objectives
  • Identify potential threats for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders understand information system risk so they can assist with your risk control process
  • Connect key risk vectors to related operational processes to help determine risk responsibility
  • Determine risk tolerance with executive leadership and major stakeholders to make sure they are in agreement
Find out additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Engineering Assistance
GIAC was established in 1999 to certify the skill of computer security professionals. GIAC's mission is to ensure that an accredited security consultant has the knowledge appropriate to provide support in key categories of network, data, and program security. GIAC certifications are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-certified IS security audit engineers are available to assist your IT organization in the areas of:

Read additional details about Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Expert
To find out how you can contact a Progent security consultant for remote or onsite help in Kansas, call 1-800-993-9400 or visit Remote Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.