Small business IT networks in Maryland can depend on fast and affordable remote help from Progent's qualified network security consultants to help with critical security problems. Rates are reasonable, charges are per minute, engagement is quick, and service is world class. Progent also provides help for complex projects that demand the knowledge of seasoned security engineers with top industry credentials.

If your Maryland network is situated far from major metropolitan areas such as Baltimore, Columbia, Silver Spring, or Dundalk, help from local accredited security professionals may be limited when you have an urgent situation. This can result in a drop in productivity for your company, upset clients, unproductive employees, and defocused management. By utilizing Progent's remote support, you have access to a certified security engineer ready to deliver expertise whenever you need it to get your information system on line and salvage your information.

Progent can help you at any level in your initiatives to protect your network with support that can range from network security audits to developing a company-wide security plan. Progent offers economical service to help companies of any size to design and manage safe IT environments powered by Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to provide web-based control and comprehensive protection for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further level of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's certified experts are available online or in person to offer a range of emergency or longer-term computer security services such as:

  • Perform comprehensive network security audits
  • Recover quickly after attacks
  • Install and troubleshoot firewalls
  • Implement secure solutions for offsite and mobile connectivity
  • Deploy effective software for protection against spam and directory harvest attacks
  • Help create a company-wide security strategy with 24x7 network monitoring
  • Provide outsourced Help Desk Call Center Services
  • Create a practical network backup and disaster recovery solution built around Data Protection Manager (DPM) backup capability
If your business has an urgent need for computer security support, refer to Progent's Urgent Online Network Help.

Progent's engineers can deliver advanced support in vital fields of network protection including analysis, firewalls and VPN, and advanced security consulting.

Security Assessment
Progent's expert security consultants can evaluate the strength of your current computer security systems through comprehensive remote automated analysis based on advanced utilities and proven procedures. Progent's skill in administering this service saves your company time and money and offers an objective portrayal of weaknesses. The information your IT organization is provided can make up the foundation of a security strategy that will permit your network to run dependably and adapt quickly to new threats.

Automated Vulnerability Assessment
Progent offers expertise in the application of security auditing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a variety of automatic system auditing checks to uncover possible security problems. Progent has broad knowledge of additional network analysis products including NMAP, AMAP application mapper, eEye, as well as tools such as SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can help you build protection into your company processes, configure scanning software, define and implement a secure system architecture, and suggest procedures to maximize the security of your network. Progent's security engineers are ready to assist you to set up a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Learn additional information concerning Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory service packages designed to enable small companies to receive an independent security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from an authorized machine inside your company firewall to evaluate vulnerabilities to inside threats. The two security inventory packages are set up and executed from a secured external location. The project is overseen by an engineer who has earned top security credentials and who generates a document that details and interprets the information collected by the security scan and suggests practical remediation if called for.

Network Penetration Testing Support Services
Stealth penetration checking is a key component of any comprehensive IT system security plan. Progentís security experts can perform extensive intrusion checks without the knowledge of your organization's internal network support resources. Stealth penetration checking shows whether current security defense systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently monitored. Learn additional information on Progent's stealth penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned important industry accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and offsite connection technology represent a complete range of easy-to-administer security products to help protect your local and remote information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Find out additional details about Progent's Consulting Expertise for Cisco Security and VPN Products.

Consulting Services for Other Firewall and VPN Products
Progent provides small and mid-size companies professional support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security strategy and select appropriate products from a variety of vendors to support your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security vendors to deliver web-based control and world-class protection for your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway device provides a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior-based analysis tools to guard endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the complete threat progression including blocking, identification, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of critical files, applications and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's BDR specialists can provide advanced expertise to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, when needed, can help you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Learn more about ProSight IT Asset Management service.

Expert Security Planning
Any company should develop a carefully thought out security strategy that incorporates both preventive procedures and response planning. The pre-attack strategy is a collection of mechanisms that help to reduce security weaknesses. The reactive plan helps your network security personnel to evaluate the impact caused by an attack, fix the system, document the experience, and get business functions operational as rapidly as feasible.

Progent's certified information security engineers are available to help your company to run a comprehensive risk evaluation and create a network security plan to implement security policies and controls to minimize ongoing attacks and dangers.

CISM Certified System Security Support Services
The Certified Information Security Manager (CISM) organization describes the core competencies and worldwide standards of skill that information security professionals are required to master. CISM provides executive management the confidence that those who have earned their CISM certification possess the experience and capability to provide effective security management and support services. Progent offers the expertise of CISM qualified security professionals to assist businesses with:

  • Information Security Strategies
  • Vulnerability Analysis
  • Information Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Learn additional information concerning Progent's CISM Certified IS Security Engineering Expertise.

CISSP Qualified Security Engineering Services
CISSP denotes expertise with a global standard for information security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data security defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your business in a broad range of security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out more details about Progent's CISSP Qualified Security Engineering Expertise.

ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's ISSAP certified IT architecture engineers are consultants who have been awarded ISSAP status through thorough examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the more challenging demands of IS security architecture bounded by the broader field of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of secure network architecture including.

  • Access Management Systems and Techniques
  • Telecommunications and Network Security
  • Data Encryption Options
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Find out additional information concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Services.

CISA Qualified Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that represents expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass a comprehensive test administered by the ISACA professional group. Progent's CISA-certified network security audit consultants are available to assist your company in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • IT Support
  • Protecting Data Resources
  • Business Continuity Preparedness
Read more details concerning Progent's CISA Qualified IS Security Auditing Engineering Expertise.

CRISC Experts
The CRISC program was initiated by ISACA to verify a consultant's ability to design, implement, and support information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and execute a business continuity strategy that follows industry best practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists offer a variety of risk identification services such as:

  • Gather information and study documentation to help identify significant risk scenarios
  • Inventory legal, regulatory, and business mandates and company standards related to your information system to assess their potential impact on your business objectives
  • Point out possible vulnerabilities for your business processes to help in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your organization understand IT risk so they can contribute to your risk management process
  • Connect key risk vectors to related business procedures to help determine risk responsibility
  • Determine risk tolerance with your senior management and major stakeholders to ensure they match
Find out the details about Progent's CRISC Consultants.

GIAC Qualified Security Engineering Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of computer security professionals. GIAC's goal is to ensure that an accredited security consultant possesses the knowledge appropriate to provide support in key areas of system, information, and program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified network security audit experts can help your company with:

  • Assessing IT Infrastructure
  • Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Engineer
To see how to get in touch with a Progent security engineer for online or onsite support in Maryland, call 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.