Company information networks in the state of Kentucky now have prompt and affordable remote help from Progent's certified security consultants to help with complex security problems. The cost is affordable, billing is per minute, engagement is fast, and support is world class. Progent also provides assistance for long-term engagements that demand the expertise of senior security consultants with top security credentials.

In case your Kentucky company is outside of more populated metropolitan areas like Louisville, Lexington, Owensboro, or Bowling Green, the availability of local certified security engineers could be limited when there's a security disaster. This can cause a loss of productivity for your company, angry customers, unproductive employees, and distracted executives. By utilizing Progent, you can get in touch with a certified security engineer who can deliver help when you have to have it to keep your system operating and salvage your information.

Progent can help you in a variety of ways in your efforts to defend your information system with support services that can range from security checks to creating a comprehensive security strategy. Progent offers affordable service to assist companies of any size to configure and maintain secure networks powered by Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security companies to deliver centralized management and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a further level of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.

Progent's security experts are available remotely or on premises to provide a variety of urgent or longer-term computer security services such as:

If your company has an immediate requirement for IT security support, refer to Progent's Urgent Remote Network Help.

Progent's consultants can deliver world-class services in key facets of system protection including security assessment, firewall and VPN solutions, and advanced security consulting.

Security Assessment
Progent's expert security consultants can assess the strength of your existing computer security implementation by performing comprehensive remote automated analysis via advanced software tools and proven techniques. Progent's skill in this service saves your company time and money and assures an accurate picture of weaknesses. The knowledge your company is provided can form the basis of a network protection strategy that will allow your information system to run safely and react rapidly to new threats.

Automated Network Security Audits
Progent provides consulting in the application of security analysis utilities including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a variety of automatic network auditing scans to identify potential security weaknesses. Progent has extensive experience with additional security analysis utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build security into your business processes, install auditing software, define and implement a secure network architecture, and suggest policies to maximize the safety of your network. Progent's security consultants are ready to show you how to configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's automated security analysis.

Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles intended to enable small businesses to receive a professional network security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from outside your company firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized computer inside your company firewall to determine the risk to internal attacks. The two security inventory services are configured and run from a secured remote site. The project is directed by a consultant with top security accreditations and who generates a report that details and analyzes the data collected by the security scan and suggests cost-effective improvements where appropriate.

Network Intrusion Testing Consulting
Stealth intrusion testing is a key part of any successful IT system security strategy. Progentís security professionals can run thorough penetration tests without the knowledge of your company's internal IT resources. Stealth penetration checking uncovers whether current security defense systems such as intrusion incident warnings and event log monitoring are properly configured and actively monitored. Find out more concerning Progent's stealth security penetration testing support services.

Firewall and Virtual Private Network Support
Progent's background in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of engineers who have earned important networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and offsite connection technology offer a full range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Learn additional details about Progent's Consulting Expertise for Cisco Security and VPN Products.

Consulting Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and select the right technologies from multiple vendors to support your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of analysis for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior analysis technology to guard endpoints as well as physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by traditional signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to address the complete threat progression including protection, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates your backup processes and allows rapid restoration of vital data, apps and virtual machines that have become lost or damaged due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your business-critical information. Learn more about ProSight DPS Managed Cloud Backup.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect information related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Every company should develop a thoroughly considered security program that includes both preventive procedures and reaction plans. The pre-attack plan is a set of mechanisms that help to minimize security weaknesses. The reactive plan helps your company's IT security personnel to assess the damage resulting from an attack, repair the system, record the experience, and get business functions restored as quickly as feasible.

Progent's expert information security consultants can to assist your business to perform a comprehensive risk evaluation and create a company-wide security plan to implement security policies and controls to mitigate future attacks and dangers.

CISM Certified Information Security Engineering Services
The CISM committee defines the core competencies and global standards of skill that information security managers are expected to master. CISM provides executive management the confidence that consultants who have earned their CISM certification possess the experience and knowledge to deliver efficient security administration and support services. Progent can provide the support of CISM certified security professionals to help businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Management
  • Response Management
Read more details concerning Progent's CISM Qualified IS Security Engineering Professionals.

CISSP Accredited Security Engineering Support
The CISSP credential denotes expertise with a worldwide standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the field of data security defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Learn more information concerning Progent's CISSP-certified Security Engineering Services.

ISSAP Certified Secure IT Architecture Consulting Services
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP Certification as a result of thorough testing and extensive work with information security architecture. The ISSAP credential indicates demonstrated competence in the most in-depth requirements of IS security architecture bounded by the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Find out more information about Progent's ISSAP Accredited Secure Network Architecture Consulting Expertise.

CISA Accredited Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass a comprehensive examination given by the ISACA professional association. Progent's CISA-certified IS security audit engineers can assist your company in the areas of:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Resources
  • Business Continuity Planning
Get more information about Progent's CISA Qualified IS Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to verify an IT professional's ability to design, implement, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a business continuity plan based on leading practices identified by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management experts offer a range of risk evaluation services including:

  • Gather data and study documentation to evaluate significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and organizational standards associated with your network to assess their potential influence on your strategic goals
  • Identify potential threats for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and provide training to make sure your organization appreciate information system risk so they can assist with your risk management program
  • Connect key risk scenarios to your associated operational processes to help assign risk responsibility
  • Determine risk tolerance with executive leadership and major stakeholders to ensure they match
Get more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Engineering Support
GIAC was established in 1999 to validate the knowledge of computer security professionals. GIAC's mission is to assure that a certified security consultant possesses the skills needed to provide support in vital categories of network, data, and application program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified security audit engineers are available to help your IT organization with:

  • Auditing Perimeters
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Services.

Contact a Security Expert
To find out how you can contact a certified Progent security engineer for online or on-premises support in Kentucky, phone 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.