Business information networks in Maine can have prompt and affordable remote technical support from Progent's accredited security experts to help with the toughest security problems. Rates are reasonable, charges are per minute, sign-up is fast, and service is unbeatable. Progent also provides help for long-term engagements that requires the expertise of senior security engineers with top security certifications.

In case your Maine company is situated far from major urban areas including Portland, Lewiston, or Bangor, access to local certified security engineers may be problematic during a crisis. This can result in lost income for your business, upset clients, idle employees, and defocused management. By calling Progent, you can get in touch with a qualified security consultant who can deliver expertise when you need it to get your computer network on line and restore your data.

Progent can help you in a variety of ways in your efforts to guard your information system with support that can range from security audits to developing a comprehensive security plan. Progent provides affordable service to assist small and midsize companies to design and manage protected networks based on Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver web-based control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper level of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter.

Progent's certified experts are accessible online or in person to offer a variety of urgent or project-based computer security services which include:

If your network has an immediate need for computer security help, go to Progent's Urgent Remote Technical Support.

Progent's engineers offer world-class support in key areas of system protection including auditing, firewall and VPN expertise, and advanced security planning.

System Security Audits
Progent's expert security engineers can evaluate the strength of your existing computer protection implementation through comprehensive remote automated analysis based on advanced utilities and proven procedures. Progent's experience in administering this testing saves you time and money and assures an objective portrayal of gaps. The information your IT organization is provided can form the foundation of a network protection strategy that can allow your information system to operate safely and react rapidly to future risks.

Automated Network Security Evaluation
Progent offers expertise in the application of security auditing utilities including Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a variety of programmed system auditing checks to uncover potential security problems. Progent has broad knowledge of other network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can show you how to design security into your business operations, install scanning software, define and implement a protected system environment, and suggest policies to maximize the safety of your network. Progent's security engineers are ready to show you how to set up a firewall, implement safe remote connectivity to email and data, and install VPN. Find out more about Progent's network security evaluation.

Security Inventory Packages for Small Companies
Progent offers two low-cost security inventory scanning packages intended to enable small businesses to receive an objective security assessment from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from a secure computer within your firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are configured and executed from a protected external location. The process is managed by a consultant with high-level security credentials and who produces a document that summarizes and analyzes the data captured by the security scan and proposes cost-effective remediation where appropriate.

Network Intrusion Testing Consulting
Stealth penetration testing is an important part of any comprehensive network security strategy. Progent’s security professionals can perform extensive penetration checks without the awareness of your company's in-house IT staff. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event history analysis are properly set up and actively monitored. Find out additional information about Progent's stealth security penetration testing consulting.

Firewall/VPN Solutions
Progent's expertise in network security technology includes in-depth field work with major firewalls and Virtual Private Network technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and remote connection technology offer a complete line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and CCNP qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company objectives. Find out additional information about Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Products.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a detailed security strategy and select the right products from a variety of vendors to support your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-matching AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to automate the complete threat progression including filtering, detection, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alerts, device management, and web filtering via leading-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP deployment that addresses your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also help your company to install and verify a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of critical files, applications and VMs that have become unavailable or corrupted due to component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver advanced expertise to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can help you to restore your business-critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to deliver web-based control and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further layer of analysis for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to a different hardware solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard data about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSL certificates or domains. By cleaning up and organizing your IT documentation, you can save up to half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you’re making improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Consulting
Every business should have a thoroughly thought out security strategy that incorporates both pre-attack processes and response plans. The pre-attack plan is a set of mechanisms that help to minimize vulnerabilities. The post-attack strategy assists your network security engineers to evaluate the impact caused by an attack, fix the system, document the experience, and get the IT network restored as soon as possible.

Progent's certified IS security engineers can to assist your business to perform a full risk evaluation and define a computer security plan to implement security processes and mechanisms to reduce ongoing assaults and threats.

CISM Accredited Information Security Consulting Expertise
The CISM committee defines the basic capabilities and global standards of skill that IT security managers are required to learn. It provides business management the confidence that consultants who have earned their CISM credential possess the background and knowledge to provide efficient security management and support services. Progent can provide the services of CISM qualified security professionals to assist companies with:

  • Network Security Governance
  • Risk Management
  • IS Security Program Management
  • Information Security Administration
  • Recovery Management
Find out more details concerning Progent's CISM Certified Network Security Engineering Professionals.

CISSP Certified Security Consulting Services
The CISSP credential recognizes mastery of an international standard for information security. ANSI has granted certification recognition in the field of data protection stipulated by ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Learn additional information concerning Progent's CISSP Information Security Support Expertise.

CISSP-ISSAP Accredited Secure System Architecture Consulting Support
Progent's CISSP-ISSAP certified system architecture engineers are experts who have earned ISSAP status through thorough testing and significant experience with network security design. The ISSAP credential represents proven competence in the most complex demands of information system security architecture within the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security including.

  • Access Control Systems and Techniques
  • Phone System and Network Protection
  • Data Encryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and DRP
  • Hardware Security
Find out additional details concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Expertise.

CISA Qualified Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that signifies expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass a comprehensive test given by the ISACA international professional group. Progent's CISA-certified network security audit specialists can help your company in the areas of:

  • IS Audit Services
  • IT Governance
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Protecting Data Resources
  • Business Continuity Preparedness
Read the details concerning Progent's CISA Certified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's ability to design, implement, and maintain IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity plan based on industry best practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC network risk mitigation specialists offer a range of risk identification services such as:

  • Collect data and review documentation to identify major vulnerabilities
  • Inventory statutory, regulatory, and business mandates and organizational standards related to your information system to assess their possible impact on your business goals
  • Identify potential threats for your business workflows to help in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate information system risk so they can assist with your risk management program
  • Connect key risk vectors to related business procedures to help determine risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to make sure they are in agreement
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security experts. GIAC's goal is to make sure that a certified professional possesses the knowledge needed to deliver support in important areas of network, data, and application security. GIAC certifications are recognized by companies and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-certified security audit specialists can help your business with:

Read more details about Progent's GIAC Information Assurance Services.

Contact a Progent Security Specialist
To find out how you can contact a security consultant for remote or onsite assistance in Maine, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.