Business IT networks in the state of Kentucky can have quick and economical online technical support from Progent's certified security professionals to fix complex security issues. Rates are affordable, billing is per minute, engagement is immediate, and support is world class. Progent also provides help for long-term engagements that requires the services of seasoned security consultants with top industry credentials.

In case your Kentucky business is situated outside of larger metropolitan areas including Louisville, Lexington, Owensboro, or Bowling Green, access to nearby certified security support specialists is often limited when you have an urgent situation. This could mean a loss of productivity for your business, upset customers, unproductive workers, and defocused management. By contacting Progent's remote support, you can get in touch with a qualified security consultant who can provide help whenever you need it to keep your information system running and restore your information.

Progent can assist you in all your initiatives to guard your IT environment with support that can range from network security assessments to developing a comprehensive security strategy. Progent provides economical service to help small and midsize companies to design and manage safe networks based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of top information security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a further level of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security experts are accessible remotely or on site to offer a range of emergency or project-based network security services which include:

If your network has an immediate need for computer security support, refer to Progent's Emergency Remote Network Help.

Progent's security experts provide advanced support in key fields of network security including security evaluation, firewall/VPN support, and advanced security consulting.

System Security Audits
Progent's expert security consultants can evaluate the vulnerability of your current computer protection environment through comprehensive remote automated testing based on advanced software tools and tested procedures. Progent's experience in this service saves you money and offers an objective picture of weaknesses. The knowledge your IT organization is provided can form the basis of a network protection plan that can permit your network to operate dependably and adapt rapidly to new risks.

Automated Vulnerability Analysis
Progent offers consulting in the application of security evaluation software including MBSA and GFI LANguard Network Security Scanner for affordably performing a set of automatic network testing checks to identify potential security vulnerabilities. Progent has extensive knowledge of additional network analysis products including NMAP, AMAP, eEye, plus utilities like SolarWinds, Netcat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you design protection into your business processes, install scanning software, define and deploy a secure system environment, and suggest policies to optimize the safety of your network. Progent's security engineers are available to help you configure a firewall, design secure remote access to email and data, and install virtual private network. Learn additional information concerning Progent's network security evaluation.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to enable small companies to receive a professional network security assessment from a qualified security expert. With Progent's External Security Inventory Scan, an engineer administers an extensive test of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized computer within your company firewall to uncover vulnerabilities to inside threats. The two security inventory packages are set up and executed from a protected external location. The process is directed by a consultant who has earned high-level security accreditations and who generates a report that summarizes and analyzes the information captured by the security scan and suggests practical improvements where appropriate.

Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any comprehensive network security strategy. Progentís security professionals can run thorough intrusion tests without the knowledge of your company's internal IT staff. Stealth penetration checking uncovers whether current security defense systems such as intrusion detection alerts and event history analysis are correctly configured and actively checked. Find out additional information on Progent's stealth penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's background in security solutions encompasses extensive field work with major firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Support Services
Cisco's security and remote access technology offer a full range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and CCNP certifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Learn more details about Progent's Support Services for Cisco Security and VPN Appliances.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and select the right products from a variety of suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning technology to guard endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely get by legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to address the complete malware attack progression including protection, detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services offer ultra-affordable multi-layer protection for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies packaged within one agent accessible from a single control. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP deployment that addresses your organization's specific requirements and that allows you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of critical data, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide world-class expertise to configure ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading information security vendors to deliver centralized management and comprehensive security for all your email traffic. The powerful structure of Email Guard combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper level of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the apps. Since the system is virtualized, it can be ported immediately to a different hosting solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can save up to 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Expert Security Planning
Every company ought to develop a thoroughly considered security program that includes both pre-attack processes and response plans. The pre-attack plan is a set of steps intended to reduce security weaknesses. The post-attack strategy assists your company's network security engineers to evaluate the impact resulting from an attack, fix the network, record the event, and get business functions running as quickly as feasible.

Progent's certified IT security consultants are available to assist your business to run a comprehensive vulnerability assessment and define a company-wide security plan to implement security processes and mechanisms to mitigate future attacks and dangers.

CISM Accredited Network Security Support Services
The CISM organization defines the basic capabilities and worldwide standards of performance that IT security professionals are expected to master. CISM gives executive management the confidence that those who have earned their CISM credential possess the experience and capability to deliver efficient security management and support services. Progent can provide the support of CISM certified security professionals to help companies with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Information Security Program Management
  • Network Security Management
  • Response Management
Learn more information about Progent's CISM Certified Network Security Engineering Services.

CISSP Certified Security Engineering Assistance
CISSP certification denotes mastery of a global standard for network security. ANSI has granted certification recognition in the field of information security defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your business in a variety security areas such as:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Learn additional details concerning Progent's CISSP Qualified Security Support Services.

CISSP-ISSAP Qualified Secure Information System Architecture Consulting Assistance
Progent's CISSP-ISSAP certified system architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous examination and significant work with network security design. The ISSAP certification indicates proven competence in the most in-depth requirements of information system security architecture within the broader scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all phases of architecture security including.

  • Access Management Systems and Techniques
  • Phone System and Network Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Read more details about Progent's ISSAP Certified Secure Network Architecture Consulting Professionals.

CISA Qualified Network Security Auditing Consulting Expertise
The CISA credential is a globally recognized achievement that indicates expertise in information system security auditing. Accredited by ANSI, the CISA credential has candidates pass a comprehensive test administered by the ISACA international professional association. Progent's CISA IS security audit engineers are available to help your company with:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Preparedness
Learn additional details concerning Progent's CISA Accredited Security Auditing Engineering Services.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's ability to design, implement, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management consultants can provide a range of risk identification services including:

  • Collect data and study documentation to help identify major risk scenarios
  • Inventory legal, regulatory, and contractual mandates and company policies related to your network to assess their possible influence on your strategic goals
  • Identify potential threats for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and conduct training to ensure your stakeholders understand IS risk so they can contribute to your risk control program
  • Match identified risk vectors to your associated business procedures to help assign risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
Get the details about Progent's CRISC Risk Management Experts.

GIAC Certified Security Consulting Support
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security engineers. GIAC's goal is to make sure that an accredited security consultant possesses the skills necessary to deliver services in important categories of network, data, and software security. GIAC certifications are acknowledged by companies and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit consultants can help your business with:

Find out additional information about Progent's GIAC Information Assurance Services.

Talk to a Certified Security Engineer
To find out how you can get in touch with a certified Progent security engineer for online or on-premises support in Kentucky, phone 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2019 Progent Corporation. All rights reserved.