Business IT networks in Kentucky now have fast and economical online technical support from Progent's qualified network security professionals to help with critical security problems. Rates are affordable, charges are per minute, sign-up is immediate, and support is world class. Progent also provides help for long-term projects that demand the services of seasoned security consultants with high-level security certifications.

If your Kentucky office is located some distance from more populated metropolitan neighborhoods like Louisville, Lexington, Owensboro, or Bowling Green, help from nearby qualified security engineers may be limited when there's a crisis. This can result in a drop in productivity for your company, angry clients, unproductive employees, and defocused management. By utilizing Progent's online services, you have access to a certified security professional who can provide help whenever you require it to get your computer network operating and recover your information.

Progent can help you in all your initiatives to protect your network with support services that can range from security checks to creating a company-wide security plan. Progent offers affordable support to assist small and midsize companies to configure and maintain protected networks based on Windows and Cisco products and that can include computers running UNIX or Linux operating systems plus BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security companies to deliver centralized management and world-class security for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway device provides a deeper level of analysis for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.

Progent's security experts are accessible online or in person to offer a range of emergency or project-based computer security services which include:

  • Run automated network security audits
  • Clean up quickly after serious security breaches
  • Set up firewalls from multiple vendors
  • Implement secure solutions for remote and mobile access
  • Install effective applications for defense against spam and DHAs
  • Develop a company-wide security strategy with proactive monitoring
  • Offer outsourced Help Desk Support
  • Help Create a practical backup and business continuity strategy centered on System Center Data Protection Manager technology
If your company has an immediate need for computer security support, refer to Progent's Emergency Online Technical Help.

Progent's security experts provide world-class services in vital facets of system security including security assessment, firewalls and VPN, and high-level security planning.

System Assessment
Progent's certified security engineers can assess the vulnerability of your current network protection implementation through exhaustive remote automated analysis based on advanced utilities and proven techniques. Progent's skill in administering this testing saves your company time and money and assures an accurate picture of system vulnerability. The knowledge your company is provided can be used as the foundation of a security plan that can allow your network to run dependably and respond quickly to new threats.

Automated Network Security Evaluation
Progent offers expertise in the application of security analysis packages such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably performing a set of programmed system auditing scans to identify potential security problems. Progent has broad experience with other network auditing tools including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.

Progent can help you build protection into your company processes, install scanning tools, define and implement a protected system environment, and recommend procedures to maximize the security of your IT system. Progent's security engineers are able to help you configure a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Learn more concerning Progent's network security audits.

Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation packages intended to enable small businesses to receive a professional network security evaluation from an accredited security specialist. With Progent's External Security Inventory Scan, an engineer administers an extensive test of your network from beyond your firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from an authorized machine within your firewall to evaluate your exposure to internal assaults. Both security inventory services are configured and run from a secured external location. The project is managed by an engineer with top security credentials and who produces a document that summarizes and interprets the information collected by the scan and suggests practical improvements where appropriate.

Stealth Intrusion Testing Consulting
Stealth penetration checking is an important part of any successful network security strategy. Progentís security professionals can perform thorough penetration tests without the awareness of your organization's in-house IT staff. Unannounced penetration checking shows whether existing security defense systems such as intrusion detection warnings and event history analysis are correctly configured and consistently checked. Learn more about Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security technology includes extensive field work with major firewalls and VPN technology from a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote access technology provide a comprehensive line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Read additional information concerning Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Products.

Engineering Expertise for Additional Firewall and VPN Products
Progent offers small and medium size organizations expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and choose appropriate technologies from a variety of suppliers to achieve your security goals while sticking within your budget limits.

Expert Security Design
Every business should have a thoroughly thought out security program that includes both preventive procedures and response plans. The proactive strategy is a collection of steps designed to minimize vulnerabilities. The reactive strategy assists your company's network security engineers to evaluate the impact caused by an attack, repair the system, document the experience, and get the IT network operational as rapidly as possible.

Progent's expert information security consultants can to help your company to perform a full risk evaluation and create a computer security strategy to establish security policies and mechanisms to mitigate future attacks and threats.

CISM Certified System Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and international standards of skill that information security professionals are expected to master. It provides executive management the assurance that consultants who have earned their CISM credential have the experience and capability to provide effective security administration and support services. Progent can provide the support of CISM certified security professionals to assist companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Management
Find out more information concerning Progent's CISM Qualified Information Security Consulting Services.

CISSP Accredited Security Consulting Support
CISSP recognizes mastery of an international standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data security under ISO 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Find out more details concerning Progent's CISSP Qualified Information Security Engineering Expertise.

ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP status as a result of rigorous testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the more complex demands of IS security architecture within the broader field of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Phone System and Network Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Site Security
Learn additional information about Progent's ISSAP Certified Secure Information System Architecture Support Expertise.

CISA Qualified Information System Security Auditing Consulting Assistance
The CISA credential is a globally recognized achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants undergo an extensive test administered by the ISACA international professional group. Progent's CISA security audit engineers are available to help your IT organization with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Read additional information about Progent's CISA Accredited Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify an IT professional's skills to design, implement, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity strategy that follows leading practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk management experts offer a range of risk identification services including:

  • Collect information and review documentation to evaluate significant vulnerabilities
  • Identify statutory, industry, and contractual requirements and company policies associated with your information system to determine their potential influence on your strategic goals
  • Point out potential threats for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and provide training to ensure your organization appreciate IS risk so they can assist with your risk control program
  • Match identified risk scenarios to related business procedures to help determine risk ownership
  • Determine risk appetite with your senior management and major stakeholders to ensure they match
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Engineering Services
GIAC was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to verify that an accredited professional possesses the knowledge necessary to deliver support in key areas of system, data, and application software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC security audit specialists can help your company in the areas of:

Learn more information about Progent's GIAC Information Assurance Services.

Talk to a Certified Security Specialist
To see how to get in touch with a security engineer for remote or onsite assistance in Kentucky, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.