Business information networks in the state of Kentucky can now get quick and economical online technical support from Progent's certified network security support specialists to assist with the toughest security problems. Rates are competitive, charges are by the minute, sign-up is immediate, and support is unbeatable. Progent also provides help for long-term engagements that demand the knowledge of seasoned security engineers with top industry certifications.

If your Kentucky organization is based away from major urban neighborhoods including Louisville, Lexington, Owensboro, or Bowling Green, help from local qualified security engineers may be limited during a security disaster. This can cause a drop in revenue for your business, angry customers, idle workers, and distracted executives. By calling Progent, you can get in touch with a certified security consultant who can deliver expertise when you have to have it to keep your computer network on line and recover your data.

Progent can assist you in all your initiatives to defend your information system with support services ranging from network security assessments to developing a company-wide security strategy. Progent offers affordable service to help companies of any size to configure and manage protected networks powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems plus BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security vendors to provide web-based management and world-class protection for your email traffic. The powerful architecture of Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall.

Progent's certified experts are available remotely or on premises to offer a range of emergency or project-based IT security services which include:

  • Perform comprehensive security evaluations
  • Clean up promptly after serious security breaches
  • Set up firewalls from multiple vendors
  • Implement secure methods for remote and mobile connectivity
  • Install advanced software for protection against spam and directory harvest attacks
  • Help create a comprehensive security plan with proactive monitoring
  • Provide comprehensive Call Center Support
  • Help Develop a practical backup and recovery solution based on Data Protection Manager (DPM) backup/restore technology
If your network has an immediate requirement for computer security help, go to Progent's Emergency Online Network Support.

Progent's support professionals offer advanced services in vital areas of network security including auditing, firewall and VPN solutions, and advanced security planning.

System Security Evaluation
Progent's certified security engineers can evaluate the strength of your existing computer protection implementation by performing exhaustive remote automated testing via advanced software tools and proven techniques. Progent's skill in administering this testing saves your company consulting fees and offers a detailed picture of security holes. The information your business gains can be used as the foundation of a network protection plan that will permit your information system to run dependably and adapt quickly to new threats.

Automated Network Vulnerability Audits
Progent provides expertise in the application of security evaluation packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a variety of programmed network testing scans to uncover possible security weaknesses. Progent has extensive knowledge of additional network auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to build protection into your company processes, install auditing tools, plan and deploy a secure network architecture, and recommend procedures to maximize the safety of your IT system. Progent's security engineers are ready to help you configure a firewall, implement safe remote access to email and business applications, and install VPN. Find out more about Progent's network security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to enable small businesses to receive an impartial security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your IT infrastructure from beyond your company firewall to determine possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a system scan from an authorized machine within your company firewall to uncover your exposure to inside assaults. The two security inventory services are set up and executed from a protected external location. The project is directed by a consultant with top security credentials and who produces a report that summarizes and interprets the data captured by the security scan and suggests cost-effective improvements if called for.

Stealth Security Penetration Testing Support Services
Stealth intrusion testing is an important part of any serious IT system security strategy. Progentís security experts can run extensive penetration tests without the knowledge of your company's in-house network support resources. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion detection warnings and event log analysis are properly configured and actively checked. Find out additional information concerning Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in network security solutions encompasses extensive familiarity with leading firewalls and VPN products offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with key networking certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your existing PIX or Cisco ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access products offer a comprehensive line of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your business goals. Learn more information about Progent's Engineering Expertise for Cisco Security Solutions and VPN Appliances.

Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select the right technologies from multiple suppliers to support your security objectives while sticking within your spending restraints.

Expert Network Security Consulting
Every company should have a thoroughly thought out security strategy that includes both proactive procedures and reaction planning. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The reactive plan helps your network security engineers to evaluate the damage caused by a security penetration, repair the network, document the experience, and get the IT network restored as soon as possible.

Progent's expert IT security consultants can to assist your business to run a comprehensive vulnerability evaluation and create a company-wide security plan to implement security processes and mechanisms to minimize ongoing assaults and threats.

CISM Qualified System Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and global standards of skill that information security managers are required to master. CISM provides business management the confidence that those who have earned their CISM certification have the background and capability to provide effective security administration and support services. Progent offers the expertise of CISM certified security professionals to help companies with:

  • Information Security Strategies
  • Risk Management
  • Network Security Implementation Management
  • Network Security Administration
  • Recovery Management
Learn more details concerning Progent's CISM Qualified Network Security Support Services.

CISSP Accredited Security Engineering Assistance
The CISSP credential recognizes expertise with an international standard for data security. ANSI has awarded the CISSP credential accreditation in the field of information protection stipulated by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Read more details about Progent's CISSP Accredited Network Security Support Expertise.

ISSAP Accredited Secure Network Architecture Engineering Services
Progent's ISSAP qualified system architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more challenging requirements of information security architecture bounded by the broader scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your company with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Learn additional details concerning Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.

CISA Certified IS Security Auditing Consulting Assistance
The CISA credential is a prestigious achievement that represents mastery in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-certified network security audit engineers can assist your IT organization with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Read additional details concerning Progent's CISA Accredited Information System Security Auditing Engineering Expertise.

CRISC Experts
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's skills to design, deploy, and support information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity strategy based on industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation experts offer a variety of risk assessment services such as:

  • Gather data and review documentation to identify major vulnerabilities
  • Inventory legal, regulatory, and business requirements and organizational standards related to your network to assess their possible impact on your business objectives
  • Identify potential vulnerabilities for your business processes to assist in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk control program
  • Connect key risk scenarios to your associated business processes to help assign risk ownership
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they are in agreement
Get more information concerning Progent's CRISC Experts.

GIAC Certified Information System Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security professionals. GIAC's mission is to verify that a certified security consultant has the skills needed to deliver support in key areas of system, information, and application security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. NSA. Progent's GIAC network security audit consultants can assist your IT organization with:

Find out additional information about Progent's GIAC Information Assurance Support.

Talk to a Progent Security Expert
To find out how to access a security consultant for online or onsite expertise in Kentucky, phone 1-800-993-9400 or visit Remote Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.