Business IT networks in Maine can have fast and economical remote technical support from Progent's accredited security professionals to fix complex security issues. Rates are competitive, billing is by the minute, sign-up is immediate, and support is world class. Progent also provides help for long-term projects that demand the expertise of seasoned security engineers with top industry credentials.

In case your Maine company is situated some distance from larger urban areas like Portland, Lewiston, or Bangor, the availability of local accredited security experts is often limited when there's an urgent situation. This can result in a drop in productivity for your company, upset clients, unproductive employees, and defocused management. By contacting Progent, you have access to a qualified security professional who can offer expertise when you require it to get your information system operating and restore your data.

Progent can help you in a variety of ways in your efforts to defend your network with services ranging from network security audits to developing a comprehensive security strategy. Progent provides economical service to assist companies of any size to set up and maintain secure IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.

Progent's security consultants are available remotely or on premises to provide a variety of urgent or longer-term computer security services such as:

  • Run thorough network security audits
  • Clean up promptly after attacks
  • Configure hardware and software firewalls
  • Implement secure techniques for remote and mobile access
  • Install advanced solutions for automatic defense against spam and directory harvest attacks
  • Help create a comprehensive security strategy with 24x7 network monitoring
  • Offer comprehensive Help Desk Services
  • Create a practical backup and restore solution based on Data Protection Manager high-availability technology
If your company has an emergency requirement for computer security support, go to Progent's Urgent Online Technical Help.

Progent's consultants offer advanced services in key fields of system protection including auditing, firewalls and VPN, and high-level security consulting.

System Security Audits
Progent's certified security engineers can assess the effectiveness of your existing network protection environment through comprehensive remote automated testing based on advanced utilities and tested techniques. Progent's experience in this service saves you time and money and assures an objective portrayal of security holes. The knowledge your company gains can be used as the basis of a network protection strategy that will permit your network to run safely and adapt rapidly to new threats.

Automated Vulnerability Assessment
Progent offers expertise in the use of security auditing software including MBSA and GFI LANguard NSS for economically performing a set of automatic network testing scans to uncover potential security weaknesses. Progent has broad experience with additional network analysis utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to design protection into your business operations, configure scanning software, plan and deploy a secure system environment, and recommend policies to optimize the safety of your network. Progent's security professionals are able to show you how to configure a firewall, implement safe remote access to email and data, and integrate VPN. Learn more concerning Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory service bundles designed to allow small companies to get an impartial security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer runs an extensive examination of your IT infrastructure from outside your firewalled perimeter to determine potential risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, an engineer runs a system scan from a secure computer within your firewall to uncover vulnerabilities to internal assaults. The two security inventory services are set up and run from a protected external location. The project is managed by a consultant with high-level security accreditations and who produces a document that details and analyzes the information collected by the scan and proposes cost-effective improvements if called for.

Stealth Security Penetration Testing Support Services
Stealth intrusion testing is a key component of any comprehensive IT system security plan. Progentís security professionals can perform extensive penetration checks without the awareness of your company's in-house network support resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion detection warnings and event history analysis are properly configured and actively monitored. Learn more concerning Progent's network penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in network security solutions encompasses in-depth familiarity with major firewalls and VPN products offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your current PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, tune, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Security and Virtual Private Network Support Services
Cisco's security and remote connection products represent a comprehensive range of manageable security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Read more information concerning Progent's Consulting Services for Cisco Security Solutions and VPN Appliances.

Engineering Services for Additional Firewall and VPN Solutions
Progent offers small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security plan and choose appropriate products from multiple suppliers to support your security objectives while sticking within your spending restraints.

Expert Security Planning
Every company ought to have a carefully thought out security strategy that incorporates both pre-attack procedures and response plans. The proactive plan is a set of steps intended to reduce security weaknesses. The reactive strategy assists your IT security engineers to assess the damage caused by a security penetration, fix the system, record the experience, and get business functions restored as soon as possible.

Progent's certified information security engineers are available to help your company to perform a comprehensive vulnerability assessment and create a computer security plan to establish security policies and mechanisms to mitigate ongoing attacks and threats.

CISM Qualified Network Security Consulting Services
The CISM committee defines the basic capabilities and global standards of skill that IT security managers are required to master. It provides business management the confidence that consultants who have earned their CISM certification possess the experience and capability to provide efficient security management and consulting services. Progent offers the support of CISM qualified security consultants to help companies with:

  • Information Security Processes
  • Risk Analysis
  • Information Security Program Management
  • Information Security Administration
  • Response Planning
Learn more information about Progent's CISM Qualified Network Security Engineering Services.

CISSP Certified Security Engineering Services
The CISSP credential recognizes expertise with an international standard for information security. ANSI has awarded the CISSP credential recognition in the field of data protection defined by ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Learn more information concerning Progent's CISSP Information Security Engineering Professionals.

ISSAP Certified Secure System Architecture Consulting Support
Progent's ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP Certification through rigorous examination and significant work with network security architecture. The ISSAP certification indicates demonstrated mastery in the most complex requirements of information security architecture within the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your business with all phases of architecture security including.

  • Access Control Systems and Techniques
  • Telecommunications and Network Protection
  • Cryptography Solutions
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional information concerning Progent's ISSAP Certified Secure System Architecture Support Services.

CISA Certified IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that represents mastery in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive test given by the ISACA professional group. Progent's CISA-qualified security audit consultants can help your IT organization with:

  • Information Systems Audit Services
  • IT Administration
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Business Continuity Planning
Learn additional information about Progent's CISA Certified Information System Security Auditing Consulting Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate an IT professional's ability to design, deploy, and maintain IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and carry out a business continuity plan based on industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk mitigation specialists offer a range of risk assessment services including:

  • Collect information and review documentation to evaluate significant vulnerabilities
  • Inventory legal, industry, and business mandates and organizational policies related to your network to assess their possible influence on your business objectives
  • Identify possible threats for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your organization understand information system risk so they can assist with your risk control program
  • Match identified risk vectors to related business processes to help determine risk ownership
  • Validate risk tolerance with executive leadership and major stakeholders to make sure they are in agreement
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Engineering Support
Global Information Assurance Certification was founded in 1999 to validate the skill of information technology security experts. GIAC's mission is to assure that an accredited security consultant possesses the knowledge needed to provide support in vital categories of system, information, and software security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC information security audit experts are available to assist your IT organization in the areas of:

Read more information concerning Progent's GIAC Information Assurance Support.

Contact a Certified Security Engineer
To see how to get in touch with a security engineer for online or on-premises expertise in Maine, phone 1-800-993-9400 or go to Online Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.