Business information networks in the state of Kentucky can now get fast and economical online technical support from Progent's accredited security engineers to assist with critical security issues. Rates are affordable, billing is per minute, engagement is immediate, and service is world class. Progent also offers help for complex engagements that demand the expertise of seasoned security consultants with high-level security certifications.

If your Kentucky office is situated some distance from major urban areas like Louisville, Lexington, Owensboro, or Bowling Green, access to nearby certified security consultants could be problematic during a crisis. This can cause lost revenue for your company, upset clients, unproductive employees, and defocused executives. By utilizing Progent's online services, you can get in touch with a certified security professional who can offer help when you need it to get your network running and salvage your information.

Progent can assist you in your initiatives to defend your information system with support ranging from network security audits to creating a comprehensive security strategy. Progent provides economical support to assist companies of any size to set up and maintain protected networks based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to provide web-based management and comprehensive protection for your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a further layer of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, DLP, and encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter.

Progent's certified engineers are accessible online or on site to provide a variety of emergency or longer-term IT security services such as:

If your company has an urgent requirement for computer security help, refer to Progent's Urgent Online Technical Support.

Progent's support professionals can deliver advanced support in vital fields of network protection that include auditing, firewall/VPN support, and high-level security consulting.

Security Audits
Progent's expert security engineers can evaluate the effectiveness of your existing network security environment through comprehensive remote automated analysis via sophisticated software tools and proven techniques. Progent's skill in administering this testing saves your company consulting fees and assures a detailed portrayal of weaknesses. The information your business gains can make up the foundation of a security strategy that will allow your information system to run dependably and adapt rapidly to new risks.

Automated Network Security Audits
Progent provides expertise in the application of security evaluation software including Microsoft's MBSA and LANguard from GFI for economically running a variety of automatic network testing checks to identify possible security problems. Progent has extensive experience with other network analysis tools such as NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities like Metasploit, Netcat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you design protection into your company processes, install auditing software, plan and implement a protected network environment, and suggest policies to optimize the safety of your IT system. Progent's security engineers are ready to help you set up a firewall, design safe remote access to email and business applications, and install virtual private network. Learn more on Progent's automated security analysis.

Security Inventory Scanning Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation packages designed to allow small businesses to get an objective security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from a secure computer within your firewall to assess vulnerabilities to internal attacks. Both security inventory services are set up and executed from a protected external location. The process is overseen by an engineer with high-level security credentials and who produces a report that summarizes and interprets the information captured by the security scan and proposes practical remediation if appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration checking is an important part of any successful network security plan. Progentís security professionals can perform thorough intrusion checks without the knowledge of your company's in-house IT resources. Stealth penetration testing uncovers whether existing security defense tools such as intrusion detection alerts and event log monitoring are correctly set up and consistently checked. Find out more concerning Progent's stealth security penetration testing support services.

Firewall and Virtual Private Network Support
Progent's expertise in security solutions includes extensive familiarity with major firewalls and Virtual Private Network technology offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite connection products offer a complete line of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Find out additional details about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Other Firewall and VPN Solutions
Progent provides small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and select appropriate products from a variety of vendors to achieve your security goals while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to deliver centralized control and comprehensive protection for all your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, DLP, and encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning technology to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily escape traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to address the complete malware attack lifecycle including blocking, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of critical files, applications and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Network Security Design
Every business ought to have a thoroughly considered security strategy that includes both proactive processes and response planning. The pre-attack strategy is a collection of procedures intended to reduce vulnerabilities. The reactive strategy helps your network security personnel to evaluate the damage resulting from a security penetration, fix the network, document the experience, and get the IT network operational as soon as possible.

Progent's expert IS security consultants are available to assist you to run a complete vulnerability assessment and define a company-wide security strategy to implement security processes and mechanisms to reduce ongoing attacks and threats.

CISM Qualified Network Security Engineering Assistance
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of performance that information security managers are required to master. CISM provides business management the confidence that consultants who have earned their CISM credential possess the experience and capability to deliver effective security management and support services. Progent offers the services of CISM qualified security consultants to assist businesses with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Planning
Find out more information concerning Progent's CISM Information Security Engineering Expertise.

CISSP Accredited Security Engineering Services
The CISSP credential recognizes mastery of a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of data security stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Learn more details concerning Progent's CISSP Qualified IS Security Support Services.

ISSAP Accredited Secure System Architecture Consulting Support
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and extensive work with information security architecture. The ISSAP credential represents demonstrated skill in the most in-depth requirements of IS security architecture within the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Cryptography Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Hardware Security
Read more details concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Professionals.

CISA Qualified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a prestigious qualification that indicates mastery in IS security audit and control. Accredited by ANSI, the CISA credential has consultants pass an extensive test given by the ISACA professional association. Progent's CISA-certified network security audit consultants can help your IT organization in the areas of:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Preparedness
Find out the details concerning Progent's CISA Qualified Security Auditing Engineering Expertise.

CRISC Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to design, implement, and support IS controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation consultants can provide a variety of risk identification services such as:

  • Gather data and study documentation to evaluate significant risk scenarios
  • Inventory statutory, regulatory, and contractual mandates and organizational standards related to your network to determine their possible influence on your strategic goals
  • Identify potential threats for your business workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization understand information system risk so they can assist with your risk management program
  • Connect key risk scenarios to your associated business processes to help determine risk responsibility
  • Determine risk appetite with executive management and major stakeholders to ensure they are in agreement
Read the details concerning Progent's CRISC Experts.

GIAC Qualified Security Consulting Expertise
GIAC was founded in 1999 to validate the skill of computer security engineers. GIAC's goal is to assure that an accredited security consultant has the knowledge appropriate to provide support in key categories of system, data, and application program security. GIAC accreditations are recognized by companies and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified network security audit consultants can assist your business with:

  • Assessing Security Systems
  • Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Support.

Contact a Progent Security Engineer
To find out how to get in touch with a certified Progent security consultant for remote or on-premises help in Kentucky, call 1-800-993-9400 or go to Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.