Company information networks in Maine can now get quick and affordable remote help from Progent's certified security consultants to fix complex security problems. Rates are reasonable, charges are per minute, engagement is fast, and service is world class. Progent also offers help for long-term engagements that demand the expertise of seasoned security engineers with top industry certifications.

If your Maine office is away from larger urban areas such as Portland, Lewiston, or Bangor, access to nearby qualified security professionals could be problematic when there's a crisis. This can result in a drop in revenue for your company, angry customers, unproductive workers, and defocused executives. By contacting Progent's online services, you have access to a certified security consultant ready to deliver assistance whenever you have to have it to keep your computer network operating and salvage your data.

Progent can assist you at any level in your initiatives to defend your network with support ranging from security checks to developing a company-wide security strategy. Progent offers affordable service to assist small and midsize companies to configure and manage safe networks based on Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to deliver centralized management and world-class security for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified engineers are available remotely or on premises to offer a variety of urgent or project-based IT security services including:

  • Perform comprehensive security evaluations
  • Recover rapidly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure techniques for offsite and mobile access
  • Deploy effective solutions for automatic defense against viruses, spam and DHAs
  • Help create a company-wide security strategy with 24x7 network monitoring
  • Offer comprehensive Help Desk Services
  • Help Create an effective backup and disaster recovery strategy built around Data Protection Manager automated backup capability
If your company has an emergency need for computer security support, refer to Progent's Urgent Online Network Help.

Progent's consultants provide world-class services in key fields of computer security including security evaluation, firewall/VPN support, and advanced security consulting.

System Evaluation
Progent's expert security engineers can evaluate the vulnerability of your existing computer protection environment by performing comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's experience in this testing saves your company consulting fees and offers a detailed picture of gaps. The knowledge your company gains can form the basis of a security plan that will permit your information system to run safely and adapt quickly to future risks.

Automated Vulnerability Assessment
Progent provides expertise in the use of security testing packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically running a variety of programmed system testing checks to uncover potential security problems. Progent has broad knowledge of other network analysis tools including NMAP, AMAP application mapper, eEye, plus tools such as Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.

Progent can help you design protection into your company processes, install scanning applications, define and implement a secure system architecture, and recommend procedures to maximize the safety of your IT system. Progent's security engineers are available to help you configure a firewall, design safe remote access to email and business applications, and integrate VPN. Learn additional information concerning Progent's automated security audits.

Security Inventory Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages intended to allow small companies to receive an independent network security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from beyond your company firewall to uncover possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from an authorized machine within your firewall to determine the risk to internal assaults. The two security inventory services are configured and run from a secured external site. The process is directed by an engineer with top security accreditations and who produces a report that details and interprets the information captured by the scan and suggests cost-effective improvements if called for.

Stealth Penetration Analysis Support Services
Stealth intrusion checking is an important component of any successful IT system security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your company's in-house IT staff. Unannounced penetration checking uncovers whether current security defense tools such as intrusion incident warnings and event log monitoring are properly set up and consistently checked. Learn additional information on Progent's network security penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses extensive field work with leading firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and VPN Engineering Services
Cisco's security and remote connection technology provide a complete range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Read additional details about Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security strategy and choose appropriate technologies from a variety of suppliers to support your security objectives while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based analysis technology to defend endpoints as well as servers and VMs against modern malware assaults like ransomware and file-less exploits, which easily evade traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the complete threat lifecycle including blocking, identification, containment, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge tools packaged within a single agent managed from a single console. Progent's security and virtualization experts can help you to design and implement a ProSight ESP deployment that meets your company's specific needs and that helps you achieve and demonstrate compliance with government and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital data, apps and VMs that have become lost or corrupted due to component breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security companies to deliver web-based management and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a further layer of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to a different hardware solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Planning
Any company ought to have a carefully thought out security program that includes both pre-attack processes and response plans. The pre-attack plan is a set of steps designed to minimize security weaknesses. The reactive plan helps your IT security personnel to assess the impact resulting from a security penetration, repair the system, record the experience, and get business functions running as soon as feasible.

Progent's certified information security consultants can to help you to perform a full risk evaluation and define a company-wide security strategy to implement security processes and controls to reduce future assaults and threats.

CISM Certified Information Security Support Assistance
The CISM organization defines the core capabilities and international standards of skill that information security managers are required to master. CISM gives executive management the assurance that those who have earned their CISM certification have the background and knowledge to provide efficient security administration and support services. Progent can provide the support of CISM certified security professionals to help businesses with:

  • Information Security Strategies
  • Risk Management
  • Network Security Implementation Management
  • Information Security Administration
  • Recovery Planning
Read additional details concerning Progent's CISM Network Security Support Services.

CISSP Certified Security Consulting Support
CISSP recognizes mastery of an international standard for data security. ANSI has granted the CISSP credential recognition in the area of data protection under ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security areas such as:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Find out additional information about Progent's CISSP Information Security Support Professionals.

ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough testing and extensive work with network security design. The ISSAP certification represents proven mastery in the most complex demands of information system security architecture bounded by the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your company with all aspects of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecom and System Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Read additional information concerning Progent's ISSAP Qualified Secure System Architecture Support Professionals.

CISA Qualified IS Security Auditing Engineering Assistance
The CISA credential is a recognized achievement that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo an extensive test given by the ISACA professional association. Progent's CISA-qualified security audit engineers are available to help your business with:

  • IS Audit Process
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • IT Support
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Read the details concerning Progent's CISA Qualified Network Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's skills to design, implement, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers offer a variety of risk identification services such as:

  • Gather data and study documentation to identify major risk scenarios
  • Inventory statutory, regulatory, and contractual mandates and company policies associated with your network to assess their possible influence on your strategic objectives
  • Identify possible threats for your business processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your stakeholders understand IS risk so they can assist with your risk management program
  • Connect identified risk scenarios to related operational procedures to help determine risk responsibility
  • Validate risk tolerance with executive leadership and key stakeholders to make sure they match
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Engineering Support
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to verify that an accredited security consultant possesses the knowledge needed to provide services in key categories of network, information, and application software security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified IS security audit experts can assist your business with:

Learn more information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Expert
To see how to get in touch with a certified security engineer for remote or on-premises help in Maine, phone 1-800-993-9400 or go to Remote Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.