Small business computer networks in Maine can have quick and economical remote technical support from Progent's qualified security experts to fix critical security issues. Rates are reasonable, billing is by the minute, sign-up is quick, and support is world class. Progent also offers help for long-term projects that requires the knowledge of senior security consultants with top industry credentials.

In case your Maine company is situated outside of more populated urban areas such as Portland, Lewiston, or Bangor, the availability of local certified network security experts may be problematic when there's an emergency. This can result in a drop in revenue for your company, upset customers, unproductive workers, and defocused executives. By contacting Progent's online services, you can get in touch with a qualified security engineer ready to provide assistance whenever you require it to get your information system running and salvage your data.

Progent can assist you at any level in your initiatives to guard your information system with support services that ranges from security audits to creating a comprehensive security plan. Progent offers affordable support to assist small and midsize companies to set up and maintain protected IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security vendors to provide web-based management and comprehensive security for all your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's security consultants are accessible online or on premises to offer a range of urgent or longer-term IT security services which include:

If your business has an immediate need for IT security help, go to Progent's Urgent Online Network Support.

Progent's support professionals provide world-class support in key fields of system protection that include analysis, firewall/VPN support, and advanced security planning.

Security Evaluation
Progent's expert security consultants can evaluate the effectiveness of your existing network security environment through comprehensive remote automated analysis based on advanced software tools and tested procedures. Progent's experience in this service saves you time and money and offers a detailed portrayal of system vulnerability. The information your company is provided can form the basis of a security strategy that can permit your network to operate dependably and adapt quickly to future risks.

Automated Security Analysis
Progent offers consulting in the use of security auditing packages including MBSA and LANguard from GFI for affordably running a set of programmed system testing scans to uncover potential security holes. Progent has extensive knowledge of additional security analysis utilities including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can show you how to design security into your company processes, install scanning tools, plan and implement a protected network architecture, and suggest procedures to optimize the security of your network. Progent's security consultants are able to help you set up a firewall, design secure remote connectivity to email and data, and install VPN. Learn more on Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory packages intended to enable small companies to get an impartial network security evaluation from a qualified security specialist. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert executes a network scan from a secure machine within your firewall to uncover the risk to internal attacks. Both security inventory packages are configured and executed from a secured remote site. The process is managed by an engineer with high-level security credentials and who generates a report that summarizes and interprets the information collected by the scan and suggests practical remediation where appropriate.

Stealth Penetration Testing Consulting
Stealth penetration checking is an important part of any serious IT system security strategy. Progentís security experts can run thorough penetration tests without the knowledge of your organization's in-house network support resources. Stealth penetration checking uncovers whether current security defense systems such as intrusion detection warnings and event history analysis are properly configured and consistently monitored. Find out more concerning Progent's stealth security penetration analysis consulting.

Firewall/VPN Expertise
Progent's background in network security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with key networking accreditations including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your legacy PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite connection technology represent a comprehensive range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business goals. Find out more details about Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right products from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely escape legacy signature-matching AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to automate the entire malware attack lifecycle including filtering, detection, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to security assaults from all vectors. ProSight ESP offers firewall protection, penetration alarms, device control, and web filtering through cutting-edge technologies incorporated within one agent managed from a unified console. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that meets your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry information protection standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also assist your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables fast restoration of critical files, applications and VMs that have become lost or damaged due to component failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to deliver web-based control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the local security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be ported immediately to a different hardware solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect information about your network infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate up to half of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Design
Every company ought to have a thoroughly thought out security strategy that incorporates both pre-attack processes and reaction plans. The pre-attack plan is a collection of procedures that help to minimize security weaknesses. The post-attack plan helps your company's security engineers to evaluate the damage caused by a security penetration, fix the network, document the experience, and get the IT network running as soon as possible.

Progent's certified IT security consultants can to assist you to perform a full risk assessment and define a computer security plan to establish security policies and mechanisms to reduce future attacks and threats.

CISM Accredited Security Support Expertise
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of skill that IT security professionals are expected to master. CISM provides executive management the confidence that those who have earned their CISM certification have the background and knowledge to deliver effective security administration and support consulting. Progent can provide the services of CISM qualified security professionals to help companies with:

  • IS Security Strategies
  • Vulnerability Management
  • Information Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Learn more details about Progent's CISM Network Security Support Services.

CISSP Accredited Security Consulting Services
CISSP certification recognizes mastery of an international standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the area of data protection under ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional information about Progent's CISSP Qualified Security Support Professionals.

ISSAP Certified Secure System Architecture Engineering Expertise
Progent's ISSAP certified network architecture professionals are experts who have been awarded ISSAP status through rigorous testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most complex requirements of IS security architecture bounded by the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Infrastructure Security
  • Data Encryption Solutions
  • Requirements Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Site Security
Learn more details about Progent's ISSAP Accredited Secure IT Architecture Support Services.

CISA Qualified Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that indicates expertise in network security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA network security audit specialists can assist your business in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle
  • IT Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Learn more information concerning Progent's CISA Accredited Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and support IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity plan that follows leading practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC IT risk management specialists can provide a range of risk evaluation services including:

  • Collect information and review documentation to evaluate major vulnerabilities
  • Identify statutory, industry, and business requirements and organizational standards related to your information system to determine their possible impact on your strategic objectives
  • Identify potential threats for your operational processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk control program
  • Connect key risk scenarios to your associated business processes to help assign risk ownership
  • Determine risk tolerance with your senior leadership and major stakeholders to make sure they align
Get more information concerning Progent's CRISC Experts.

GIAC Accredited Information System Security Engineering Support
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to verify that an accredited professional possesses the skills needed to deliver support in key categories of network, data, and software security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-certified information security audit consultants are available to assist your IT organization in the areas of:

  • Assessing IT Infrastructure
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Support.

Contact a Certified Security Engineer
To learn how to access a certified security consultant for remote or onsite expertise in Maine, phone 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.