Business information networks in Maine now have fast and affordable online technical support from Progent's accredited network security consultants to assist with complex security problems. Rates are reasonable, charges are by the minute, engagement is fast, and support is unbeatable. Progent also provides help for complex engagements that requires the services of senior security consultants with high-level security credentials.

In case your Maine business is located some distance from more populated metropolitan areas including Portland, Lewiston, or Bangor, contact with local accredited security professionals could be problematic during an urgent situation. This could mean lost income for your business, angry customers, unproductive employees, and distracted executives. By contacting Progent, you have access to a qualified security consultant ready to deliver assistance when you require it to get your network operating and salvage your information.

Progent can help you in all your efforts to defend your network with services that can range from network security audits to developing a company-wide security plan. Progent offers economical service to help small and midsize companies to set up and maintain protected IT environments powered by Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security companies to provide centralized management and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further layer of inspection for incoming email. For outgoing email, the local gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's certified consultants are available remotely or on site to provide a variety of urgent or project-based network security services including:

If your network has an immediate requirement for computer security support, go to Progent's Urgent Online Technical Help.

Progent's consultants offer advanced support in key areas of network security including security assessment, firewall/VPN support, and high-level security consulting.

System Evaluation
Progent's certified security consultants can evaluate the strength of your existing computer security environment through comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's experience in this testing saves you money and offers a detailed picture of gaps. The information your IT organization gains can make up the foundation of a network protection strategy that will allow your network to operate dependably and respond rapidly to future risks.

Automated Network Vulnerability Audits
Progent provides consulting in the application of security evaluation utilities such as MBSA and GFI LANguard for affordably running a set of programmed network testing checks to uncover possible security holes. Progent has extensive experience with additional network analysis tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design protection into your company processes, configure scanning software, define and deploy a secure system architecture, and suggest policies to maximize the safety of your network. Progent's security professionals are able to help you configure a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out additional information about Progent's automated security audits.

Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small companies to receive an objective security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert administers an extensive examination of your network from outside your firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a system scan from an authorized machine within your company firewall to determine the risk to internal assaults. Both security inventory packages are configured and executed from a secured external location. The process is directed by an engineer who has earned high-level security accreditations and who produces a report that details and interprets the data captured by the security scan and proposes practical improvements where called for.

Stealth Security Penetration Testing Consulting
Stealth intrusion checking is an important component of any serious IT system security strategy. Progentís security experts can run thorough intrusion checks without the knowledge of your organization's internal IT staff. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident warnings and event log monitoring are correctly set up and actively monitored. Find out more on Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and VPN Support Expertise
Cisco's security and offsite access products provide a complete range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and CCNP certifications who can help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Read more details about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select the right technologies from multiple suppliers to achieve your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security companies to deliver centralized management and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard integrates cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper level of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily evade traditional signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to manage the complete malware attack lifecycle including protection, detection, containment, remediation, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. For a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables fast restoration of critical data, apps and VMs that have become unavailable or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your critical information. Learn more about ProSight DPS Managed Backup and Recovery.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect data about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about impending expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate up to half of time spent searching for vital information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more about ProSight IT Asset Management service.

Certified Security Consulting
Every business ought to develop a carefully considered security program that includes both preventive processes and response planning. The pre-attack strategy is a set of procedures designed to reduce vulnerabilities. The reactive plan helps your IT security engineers to assess the impact resulting from an attack, repair the system, record the experience, and get the IT network restored as rapidly as possible.

Progent's certified information security engineers are available to assist your company to perform a full risk evaluation and create a company-wide security strategy to establish security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Certified Network Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the basic competencies and international standards of performance that IT security managers are required to master. It provides executive management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to deliver effective security administration and consulting services. Progent offers the services of CISM certified security consultants to help businesses with:

  • IS Security Strategies
  • Risk Management
  • Network Security Implementation Management
  • Network Security Management
  • Recovery Planning
Find out additional details about Progent's CISM Qualified IS Security Consulting Services.

CISSP Qualified Security Engineering Services
The CISSP credential denotes expertise with a worldwide standard for network security. ANSI has awarded the CISSP credential recognition in the field of information protection defined by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Learn additional information about Progent's CISSP-certified Information Security Support Expertise.

ISSAP Accredited Secure IT Architecture Consulting Assistance
Progent's ISSAP certified IT architecture professionals are experts who have been awarded ISSAP status through thorough examination and significant work with network security architecture. The ISSAP certification indicates proven competence in the more challenging requirements of IS security architecture within the broader scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Solutions
  • Needs Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Learn additional details about Progent's ISSAP Qualified Secure IT Architecture Support Services.

CISA Qualified Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a recognized qualification that represents mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass an extensive test administered by the ISACA professional association. Progent's CISA-qualified information security audit experts are available to assist your business in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Read the details about Progent's CISA Certified Security Auditing Engineering Services.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's ability to plan, implement, and maintain information system controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management specialists can provide a range of risk assessment services such as:

  • Collect data and study documentation to help identify major risk scenarios
  • Identify legal, industry, and business requirements and organizational policies related to your network to assess their potential impact on your strategic objectives
  • Identify possible threats for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your stakeholders understand IS risk so they can assist with your risk management process
  • Connect identified risk vectors to your associated operational processes to help assign risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they match
Find out more details concerning Progent's CRISC Experts.

GIAC Accredited Network Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security engineers. GIAC's mission is to assure that an accredited security consultant has the knowledge appropriate to deliver services in important categories of system, information, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit engineers are available to assist your company in the areas of:

  • Assessing Networks
  • Security Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn additional information concerning Progent's GIAC Information Assurance Services.

Contact a Progent Security Expert
To see how to contact a Progent security engineer for remote or onsite help in Maine, phone 1-800-993-9400 or go to Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.