Small business computer networks in the state of Maryland can now get quick and affordable remote help from Progent's qualified network security engineers to fix complex security problems. Rates are affordable, charges are per minute, sign-up is immediate, and service is world class. Progent also offers assistance for complex projects that requires the expertise of senior security engineers with top industry credentials.

If your Maryland company is based some distance from more populated urban neighborhoods like Baltimore, Columbia, Silver Spring, or Dundalk, access to nearby accredited security support specialists is often problematic during an urgent situation. This can cause a loss of revenue for your company, angry customers, unproductive workers, and defocused executives. By utilizing Progent's remote support, you have access to a certified security engineer who can provide help when you require it to keep your computer network on line and recover your information.

Progent can help you in all your initiatives to defend your information system with support that ranges from security checks to developing a company-wide security plan. Progent offers economical support to help companies of any size to set up and manage safe IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and conserves network bandwidth and storage. Email Guard's onsite security gateway device provides a further level of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.

Progent's certified experts are accessible online or on site to provide a range of urgent or project-based IT security services including:

  • Perform comprehensive security evaluations
  • Recuperate promptly after serious security breaches
  • Install hardware and software firewalls
  • Implement secure solutions for remote and mobile access
  • Deploy effective applications for automatic defense against spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive network monitoring
  • Provide outsourced Help Desk Services
  • Create an effective data backup and business continuity strategy built around System Center Data Protection Manager technology
If your business has an urgent need for computer security help, refer to Progent's Urgent Remote Network Help.

Progent's consultants provide advanced support in key fields of system security including auditing, firewall and VPN solutions, and high-level security planning.

Security Evaluation
Progent's expert security engineers can assess the strength of your existing computer protection systems by performing exhaustive remote automated analysis via advanced utilities and proven procedures. Progent's skill in this testing saves your company consulting fees and offers an accurate portrayal of gaps. The information your IT organization gains can be used as the foundation of a network protection strategy that will permit your information system to operate safely and react quickly to future risks.

Automated Security Audits
Progent offers expertise in the application of security auditing software including MBSA and LANguard from GFI for economically performing a variety of automatic network auditing checks to identify possible security weaknesses. Progent has broad experience with additional network auditing utilities including NMAP, AMAP, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you build security into your business operations, install auditing applications, plan and implement a secure network environment, and suggest policies to optimize the safety of your IT system. Progent's security consultants are able to help you set up a firewall, design secure remote access to email and business applications, and integrate VPN. Learn more about Progent's automated security analysis.

Security Inventory Service Bundles for Small Companies
Progent offers two low-cost security inventory bundles intended to enable small businesses to receive an impartial security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from a secure computer within your firewall to uncover your exposure to internal attacks. The two security inventory services are set up and run from a secured external location. The project is managed by an engineer who has earned high-level security credentials and who generates a report that summarizes and interprets the information collected by the scan and suggests cost-effective remediation where called for.

Network Intrusion Testing Consulting
Stealth intrusion checking is an important component of any successful IT system security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your organization's in-house network support staff. Stealth penetration checking uncovers whether existing security monitoring systems such as intrusion detection warnings and event log monitoring are correctly set up and actively monitored. Learn more about Progent's network penetration analysis support services.

Firewall/VPN Expertise
Progent's expertise in network security solutions includes in-depth field work with major firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with important networking accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and VPN Engineering Expertise
Cisco's security and offsite access products offer a full line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Learn more details about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose appropriate products from a variety of vendors to support your security goals while sticking within your budget restraints.

Expert Network Security Planning
Every business ought to develop a carefully considered security program that includes both preventive processes and reaction plans. The proactive plan is a collection of steps intended to minimize security weaknesses. The post-attack plan helps your company's security personnel to evaluate the impact caused by an attack, repair the network, record the event, and get the IT network running as quickly as possible.

Progent's certified IT security engineers are available to help you to perform a full risk assessment and define a network security plan to establish security policies and mechanisms to mitigate ongoing attacks and threats.

CISM Certified System Security Consulting Expertise
The CISM organization defines the basic capabilities and worldwide standards of performance that IT security managers are expected to master. It gives business management the confidence that consultants who have qualified for their CISM credential possess the background and knowledge to deliver efficient security management and support services. Progent offers the expertise of CISM certified security professionals to assist companies with:

  • Network Security Processes
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Response Management
Learn more details concerning Progent's CISM Qualified Information Security Engineering Expertise.

CISSP Certified Security Engineering Support
CISSP denotes mastery of a global standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data security stipulated by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP-certified Network Security Consulting Professionals.

ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's ISSAP certified system architecture engineers are consultants who have earned ISSAP status as a result of rigorous testing and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the most in-depth requirements of information security architecture bounded by the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional information about Progent's ISSAP Qualified Secure Information System Architecture Consulting Services.

CISA Qualified Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates mastery in network security audit and control. Accredited by ANSI, the CISA accreditation has consultants undergo an extensive test given by the ISACA professional association. Progent's CISA information security audit experts are available to help your IT organization with:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Qualified Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to validate an IT professional's skills to design, deploy, and maintain information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and execute a business continuity strategy that follows industry best practices promoted by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk management engineers can provide a variety of risk evaluation services including:

  • Collect data and study documentation to identify major risk scenarios
  • Inventory legal, regulatory, and business requirements and organizational policies related to your information system to determine their potential influence on your strategic goals
  • Point out possible threats for your operational processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide training to make sure your stakeholders understand information system risk so they can assist with your risk management program
  • Match identified risk scenarios to related operational procedures to help determine risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to make sure they align
Get additional details concerning Progent's CRISC Experts.

GIAC Accredited Information System Security Consulting Assistance
GIAC was founded in 1999 to validate the knowledge of computer security engineers. GIAC's mission is to ensure that a certified security consultant possesses the skills appropriate to provide services in critical categories of network, data, and application security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit consultants are available to help your business with:

Find out additional information concerning Progent's GIAC Information Assurance Support.

Talk to a Certified Security Expert
To find out how you can contact a certified security consultant for remote or onsite support in Maryland, phone 1-800-993-9400 or go to Online Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.