Small business computer networks in the state of Maryland now have quick and affordable remote help from Progent's qualified security professionals to fix critical security problems. Rates are reasonable, charges are per minute, engagement is fast, and support is unbeatable. Progent also provides help for long-term projects that requires the expertise of senior security engineers with high-level security certifications.

If your Maryland office is located far from major metropolitan neighborhoods like Baltimore, Columbia, Silver Spring, or Dundalk, contact with nearby certified network security professionals could be limited when there's a security disaster. This can cause a loss of income for your business, angry customers, unproductive workers, and distracted management. By utilizing Progent, you can get in touch with a certified security consultant who can provide assistance when you have to have it to get your computer network running and salvage your data.

Progent can assist you in your efforts to guard your information system with support that ranges from network security audits to developing a company-wide security plan. Progent provides affordable service to help companies of any size to set up and manage safe IT environments based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security vendors to deliver centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's certified consultants are accessible online or on site to provide a variety of emergency or project-based IT security services such as:

  • Perform comprehensive security evaluations
  • Clean up quickly after serious security breaches
  • Configure and troubleshoot firewalls
  • Configure secure methods for offsite and mobile connectivity
  • Install effective utilities for automatic defense against spam and directory harvest attacks
  • Help create a comprehensive security plan with proactive security monitoring
  • Offer comprehensive Help Desk Support
  • Help Develop an effective data backup and recovery plan centered on Microsoft DPM backup/restore capability
If your business has an urgent requirement for IT security support, go to Progent's Emergency Remote Network Support.

Progent's security experts offer advanced services in key fields of system security that include security assessment, firewall and VPN solutions, and high-level security consulting.

System Security Evaluation
Progent's expert security engineers can assess the strength of your existing network security implementation by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in administering this testing saves your company money and assures an objective portrayal of system vulnerability. The knowledge your IT organization is provided can make up the basis of a security strategy that can allow your network to run dependably and react quickly to future risks.

Automated Network Security Evaluation
Progent offers consulting in the application of security analysis products including MBSA and GFI LANguard NSS for economically running a variety of automatic system testing checks to identify potential security weaknesses. Progent has broad knowledge of other security analysis products including NMAP Port Scanner, AMAP, eEye, as well as utilities like Metasploit, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can help you design protection into your company operations, install auditing tools, define and implement a secure network environment, and suggest procedures to optimize the safety of your IT system. Progent's security engineers are able to show you how to configure a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Find out more concerning Progent's network security assessment.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory packages intended to enable small businesses to receive a professional security assessment from a certified security consultant. With Progent's External Network Security Inventory Scan, an engineer administers a comprehensive test of your network from outside your firewall to determine potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a system scan from a secure computer inside your firewall to uncover your exposure to internal threats. The two security inventory packages are configured and executed from a secured remote site. The project is managed by a consultant with high-level security accreditations and who produces a report that details and analyzes the data captured by the security scan and suggests cost-effective improvements where appropriate.

Network Intrusion Analysis Support Services
Stealth intrusion checking is a key part of any successful IT system security strategy. Progentís security professionals can run extensive penetration tests without the awareness of your company's internal IT resources. Stealth penetration checking shows whether current security monitoring tools such as intrusion detection warnings and event history monitoring are properly set up and consistently checked. Find out more about Progent's network penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security technology includes extensive familiarity with leading firewalls and Virtual Private Network products from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote connection products provide a comprehensive line of easy-to-administer security products to help protect your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and CCNP certifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Find out more information concerning Progent's Support Services for Cisco Security Technology and VPN Appliances.

Support Services for Other Firewall and VPN Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can help you design a detailed security strategy and choose the right technologies from a variety of suppliers to achieve your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a portfolio of affordable, fixed-price monthly services intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security vendors to provide centralized management and world-class protection for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks most threats from reaching your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of inspection for inbound email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily get by legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a single platform to manage the complete malware attack progression including protection, detection, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast recovery of vital files, applications and VMs that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Network Security Design
Every business ought to develop a carefully thought out security strategy that incorporates both proactive procedures and reaction plans. The pre-attack strategy is a collection of mechanisms that help to reduce security weaknesses. The reactive plan helps your company's network security engineers to evaluate the damage caused by a security penetration, repair the network, document the experience, and get business functions restored as rapidly as possible.

Progent's expert IS security consultants can to help your company to run a complete risk assessment and create a network security strategy to establish security processes and mechanisms to mitigate ongoing attacks and dangers.

CISM Accredited System Security Consulting Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of skill that information security managers are required to learn. It gives business management the confidence that those who have qualified for their CISM credential have the experience and capability to provide efficient security management and support consulting. Progent offers the services of CISM qualified security consultants to assist companies with:

  • Network Security Governance
  • Vulnerability Analysis
  • Information Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Learn more details concerning Progent's CISM Accredited Security Consulting Professionals.

CISSP Certified Security Consulting Assistance
CISSP recognizes mastery of a worldwide standard for data security. ANSI has awarded certification recognition in the area of data security defined by ISO 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Disaster Recovery Planning
Learn more information concerning Progent's CISSP-certified IS Security Support Professionals.

ISSAP Accredited Secure IT Architecture Consulting Services
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous examination and extensive work with network security design. The ISSAP certification represents proven skill in the more in-depth requirements of information security architecture within the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Phone System and System Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read additional details about Progent's ISSAP Certified Secure Network Architecture Consulting Professionals.

CISA Qualified Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that indicates mastery in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA-qualified network security audit specialists can help your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Find out the details about Progent's CISA Accredited IS Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain IS controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a business continuity plan that follows industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC IT risk management specialists offer a range of risk evaluation services including:

  • Collect information and review documentation to evaluate major vulnerabilities
  • Identify legal, industry, and contractual mandates and company standards associated with your network to determine their possible impact on your business goals
  • Identify potential threats for your operational processes to help in analyzing your enterprise risk
  • Create a risk awareness initiative and provide training to make sure your stakeholders understand information system risk so they can assist with your risk management process
  • Match identified risk vectors to related business processes to help determine risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to ensure they match
Get more details concerning Progent's CRISC Experts.

GIAC Qualified IS Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security engineers. GIAC's goal is to verify that a certified security consultant has the knowledge needed to provide services in important areas of network, data, and software security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit experts are available to assist your IT organization with:

Learn additional details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Specialist
To learn how to contact a certified security consultant for online or onsite support in Maryland, call 1-800-993-9400 or go to Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.