Small business information networks in Maine can now get quick and economical remote access to Progent's accredited security consultants to resolve critical security problems. The cost is reasonable, billing is by the minute, engagement is quick, and support is world class. Progent also provides assistance for long-term projects that demand the knowledge of senior security consultants with top industry credentials.

In case your Maine business is situated away from more populated urban neighborhoods such as Portland, Lewiston, or Bangor, the availability of nearby accredited security engineers may be limited during a security disaster. This could mean lost revenue for your company, angry clients, idle workers, and defocused executives. By utilizing Progent, you can get in touch with a certified security engineer ready to provide expertise when you need it to keep your information system operating and recover your information.

Progent can assist you in all your efforts to guard your network with services that ranges from security audits to developing a company-wide security plan. Progent provides affordable service to help companies of any size to set up and manage protected IT environments based on Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to deliver web-based control and comprehensive protection for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter.

Progent's certified experts are accessible remotely or in person to provide a range of emergency or longer-term computer security services including:

  • Perform extensive network security evaluations
  • Clean up promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure solutions for remote and mobile access
  • Install advanced utilities for automatic defense against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 monitoring
  • Offer comprehensive Help Desk Services
  • Develop an effective network backup and recovery solution based on Data Protection Manager (DPM) automated backup capability
If your network has an immediate need for IT security help, refer to Progent's Emergency Online Network Support.

Progent's consultants can deliver advanced support in key facets of computer security including analysis, firewall and VPN solutions, and advanced security consulting.

System Evaluation
Progent's certified security consultants can assess the vulnerability of your current computer security systems through comprehensive remote automated analysis based on sophisticated utilities and proven techniques. Progent's experience in administering this service saves you consulting fees and assures a detailed picture of security holes. The knowledge your business is provided can make up the basis of a network protection strategy that will permit your information system to operate dependably and adapt rapidly to future threats.

Automated Vulnerability Analysis
Progent provides expertise in the application of security auditing software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a set of programmed system testing checks to identify potential security holes. Progent has extensive knowledge of other security auditing products such as NMAP, AMAP, eEye Vulnerability Scanner, plus utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can help you design protection into your business operations, install auditing software, define and deploy a secure system environment, and suggest procedures to optimize the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, implement secure remote connectivity to email and data, and install VPN. Find out additional information concerning Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two ultra-affordable security inventory scanning packages intended to enable small businesses to get an impartial security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, an engineer administers an extensive test of your IT infrastructure from beyond your company firewall to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from a secure computer inside your firewall to determine your exposure to internal threats. The two security inventory services are configured and run from a secured remote location. The project is directed by an engineer who has earned top security accreditations and who generates a report that summarizes and analyzes the data captured by the scan and proposes practical remediation where called for.

Stealth Security Penetration Analysis Support Services
Stealth intrusion testing is an important part of any comprehensive IT system security strategy. Progentís security professionals can perform extensive intrusion tests without the awareness of your company's internal network support resources. Stealth penetration checking shows whether existing security defense systems such as intrusion detection warnings and event history monitoring are properly set up and actively checked. Find out more concerning Progent's stealth security penetration testing consulting.

Firewalls and VPN Expertise
Progent's expertise in security solutions encompasses extensive field work with major firewalls and Virtual Private Network technology offered by multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and VPN Consulting Services
Cisco's network security and remote connection technology provide a full line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and CCNP qualifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Read additional information concerning Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate products from a variety of vendors to achieve your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning technology to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to manage the complete threat lifecycle including protection, infiltration detection, containment, remediation, and forensics. Top features include single-click rollback using Windows VSS and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge tools incorporated within one agent managed from a single console. Progent's data protection and virtualization experts can help your business to plan and implement a ProSight ESP environment that meets your organization's unique requirements and that allows you demonstrate compliance with government and industry information security regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate action. Progent's consultants can also help your company to set up and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and allows rapid recovery of critical data, apps and virtual machines that have become unavailable or damaged due to component failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can deliver world-class expertise to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to deliver web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported easily to a different hardware solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more about ProSight IT Asset Management service.

Certified Security Design
Every company should have a carefully considered security program that includes both pre-attack processes and reaction planning. The proactive plan is a collection of steps designed to reduce security weaknesses. The post-attack strategy helps your company's network security personnel to assess the impact caused by a security penetration, repair the network, document the event, and get business functions operational as quickly as feasible.

Progent's expert IT security consultants can to help your company to perform a complete risk evaluation and create a company-wide security plan to implement security policies and mechanisms to reduce ongoing assaults and dangers.

CISM Accredited Network Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and global standards of skill that IT security managers are required to master. It provides business management the assurance that those who have qualified for their CISM credential have the background and knowledge to provide efficient security management and consulting consulting. Progent offers the services of CISM certified security consultants to help companies with:

  • Network Security Strategies
  • Vulnerability Management
  • Information Security Program Management
  • IS Security Management
  • Recovery Management
Find out more information about Progent's CISM Security Consulting Professionals.

CISSP Accredited Security Consulting Support
CISSP certification denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of information protection defined by ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecom, Network and Internet Security
  • Disaster Recovery Planning
Find out more information about Progent's CISSP-certified IS Security Support Services.

ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's ISSAP qualified network architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and significant work with network security architecture. The ISSAP certification represents proven competence in the more in-depth requirements of IS security architecture within the broader scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Telecom and Network Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Learn more details concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Expertise.

CISA Qualified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that signifies mastery in IS security auditing. Certified by ANSI, the CISA accreditation has consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-certified network security audit engineers can assist your IT organization in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Preparedness
Read additional details about Progent's CISA Certified Information System Security Auditing Consulting Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's ability to plan, implement, and maintain IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers can provide a range of risk assessment services including:

  • Gather data and review documentation to evaluate significant risk scenarios
  • Inventory legal, regulatory, and contractual mandates and organizational policies associated with your network to assess their possible impact on your business goals
  • Identify potential threats for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to make sure your stakeholders appreciate IT risk so they can assist with your risk control process
  • Match key risk scenarios to related business procedures to help assign risk ownership
  • Validate risk tolerance with executive leadership and key stakeholders to make sure they are in agreement
Get additional details about Progent's CRISC Experts.

GIAC Qualified Security Engineering Services
GIAC was founded in 1999 to certify the skill of information technology security experts. GIAC's mission is to assure that a certified professional possesses the knowledge needed to deliver services in key categories of system, data, and software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency. Progent's GIAC information security audit engineers can help your IT organization in the areas of:

Find out additional information concerning Progent's GIAC Information Assurance Support.

Contact a Security Expert
To find out how to access a certified Progent security consultant for online or onsite help in Maine, call 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.