Company information networks in the state of Maine can depend on fast and economical remote help from Progent's accredited network security support specialists to help with the toughest security issues. The cost is reasonable, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the knowledge of senior security consultants with top security credentials.

If your Maine organization is situated some distance from more populated metropolitan neighborhoods such as Portland, Lewiston, or Bangor, support from local qualified network security consultants is often limited when there's an emergency. This can result in lost revenue for your company, upset clients, unproductive workers, and defocused executives. By utilizing Progent's remote support, you can get in touch with a qualified security consultant ready to deliver expertise whenever you have to have it to keep your computer network operating and salvage your information.

Progent can help you in all your efforts to defend your network with support services ranging from network security assessments to developing a comprehensive security strategy. Progent offers economical service to help businesses of all sizes to set up and maintain safe IT environments based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security vendors to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, DLP, and encryption. The local gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security experts are accessible online or on premises to offer a range of urgent or project-based network security services such as:

If your company has an emergency requirement for IT security help, go to Progent's Urgent Online Technical Support.

Progent's engineers provide advanced support in vital facets of network security including security evaluation, firewall and VPN expertise, and advanced security consulting.

System Security Assessment
Progent's certified security engineers can evaluate the effectiveness of your existing computer protection environment by performing comprehensive remote automated testing based on sophisticated software tools and tested techniques. Progent's experience in this testing saves you consulting fees and assures an accurate portrayal of weaknesses. The knowledge your IT organization is provided can make up the basis of a security strategy that will permit your network to operate dependably and respond rapidly to future threats.

Automated Vulnerability Assessment
Progent offers expertise in the use of security testing utilities including Microsoft's MBSA and GFI LANguard for affordably running a variety of automatic system auditing checks to uncover possible security problems. Progent has broad experience with other security analysis products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Netcat, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can help you design protection into your business processes, configure scanning software, plan and implement a secure system environment, and suggest procedures to maximize the security of your network. Progent's security professionals are ready to help you configure a firewall, implement secure remote access to email and business applications, and install virtual private network. Learn additional information on Progent's network security assessment.

Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles intended to allow small companies to get an independent network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from a secure machine within your firewall to assess the risk to internal assaults. The two security inventory services are set up and executed from a protected remote site. The process is overseen by a consultant who has earned top security credentials and who produces a report that summarizes and interprets the data captured by the scan and suggests practical remediation if appropriate.

Stealth Penetration Testing Support Services
Stealth penetration checking is an important component of any successful network security plan. Progentís security professionals can perform extensive intrusion checks without the knowledge of your organization's internal network support resources. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident warnings and event history analysis are properly set up and consistently monitored. Find out additional information on Progent's network penetration analysis consulting.

Firewall/VPN Solutions
Progent's expertise in security technology includes extensive familiarity with leading firewalls and Virtual Private Network products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote connection technology represent a complete line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Learn more information about Progent's Consulting Expertise for Cisco Security Solutions and VPN Products.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from multiple vendors to support your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a collection of affordable, fixed-price monthly managed services designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning tools to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to automate the entire threat lifecycle including blocking, detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of vital data, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can provide world-class support to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.

Certified Security Consulting
Every business ought to develop a thoroughly considered security strategy that includes both pre-attack procedures and reaction planning. The proactive strategy is a set of mechanisms designed to minimize vulnerabilities. The post-attack strategy assists your network security personnel to assess the damage caused by a security penetration, repair the damage, record the event, and get business functions running as soon as feasible.

Progent's certified IT security engineers can to assist your company to perform a full risk assessment and create a network security plan to establish security policies and controls to minimize future attacks and dangers.

CISM Accredited System Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and global standards of performance that IT security professionals are required to learn. It provides executive management the assurance that those who have earned their CISM certification have the background and capability to provide effective security administration and consulting consulting. Progent can provide the services of CISM qualified security consultants to help companies with:

  • Information Security Governance
  • Vulnerability Management
  • Information Security Program Management
  • Network Security Management
  • Recovery Management
Find out additional details about Progent's CISM Qualified Information Security Support Services.

CISSP Accredited Security Consulting Expertise
CISSP recognizes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Learn additional information concerning Progent's CISSP Network Security Consulting Services.

ISSAP Certified Secure System Architecture Consulting Services
Progent's ISSAP certified system architecture engineers are consultants who have been awarded ISSAP status through rigorous testing and extensive work with information security architecture. The ISSAP certification represents proven skill in the most in-depth demands of information system security architecture within the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Physical Security
Read more details concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Certified IS Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive examination administered by the ISACA international professional group. Progent's CISA IS security audit experts are available to help your company in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Systems and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Read more details concerning Progent's CISA Accredited Security Auditing Consulting Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to design, deploy, and support information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and execute a workplace continuity strategy based on leading practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management consultants can provide a variety of risk identification services including:

  • Collect data and study documentation to identify significant vulnerabilities
  • Identify statutory, industry, and business mandates and company policies associated with your network to assess their possible influence on your business goals
  • Identify potential threats for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to make sure your organization appreciate IT risk so they can assist with your risk control program
  • Match key risk scenarios to related operational procedures to help determine risk responsibility
  • Validate risk tolerance with your senior management and key stakeholders to ensure they match
Learn additional information concerning Progent's CRISC Consultants.

GIAC Certified Security Engineering Support
Global Information Assurance Certification was founded in 1999 to certify the skill of IT security engineers. GIAC's mission is to assure that an accredited security consultant possesses the skills necessary to provide support in key areas of network, information, and application security. GIAC certifications are recognized by businesses and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC-qualified network security audit engineers can help your business in the areas of:

Learn more information concerning Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Expert
To learn how you can access a certified security engineer for remote or on-premises support in Maine, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.