Small business IT networks in Maryland can depend on prompt and affordable online help from Progent's qualified network security engineers to help with the toughest security problems. The cost is affordable, billing is per minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex projects that demand the knowledge of seasoned security engineers with top industry credentials.

If your Maryland network is located away from major metropolitan neighborhoods like Baltimore, Columbia, Silver Spring, or Dundalk, contact with nearby certified security professionals could be problematic when you have an urgent situation. This could mean lost productivity for your company, upset customers, idle employees, and distracted management. By contacting Progent, you have access to a qualified security consultant who can offer help when you require it to get your computer network operating and salvage your information.

Progent can assist you in your initiatives to guard your network with support services ranging from security audits to developing a comprehensive security plan. Progent provides affordable support to help companies of any size to configure and maintain protected networks based on Microsoft Windows and Cisco products and that can include computers running UNIX or Linux operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the technology of leading information security companies to provide web-based control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also assist Exchange Server to monitor and protect internal email that stays within your security perimeter.

Progent's certified experts are available online or on premises to provide a range of emergency or longer-term network security services including:

  • Run automated security evaluations
  • Recuperate promptly after attacks
  • Set up hardware and software firewalls
  • Implement secure methods for remote and mobile access
  • Install advanced solutions for automatic defense against spam and directory harvest attacks
  • Help create a comprehensive security strategy with round-the-clock monitoring
  • Provide comprehensive Help Desk Services
  • Help Create a practical data backup and recovery strategy centered on Microsoft DPM automated backup technology
If your business has an emergency need for IT security help, refer to Progent's Emergency Remote Network Help.

Progent's consultants offer advanced support in vital fields of network protection including security assessment, firewall and VPN expertise, and advanced security consulting.

System Security Audits
Progent's expert security engineers can evaluate the vulnerability of your existing computer protection environment through exhaustive remote automated testing via advanced software tools and tested procedures. Progent's experience in this testing saves you time and money and offers an accurate picture of system vulnerability. The knowledge your company is provided can make up the basis of a network protection plan that can allow your information system to run safely and react rapidly to future threats.

Automated Network Vulnerability Evaluation
Progent provides expertise in the application of security analysis packages including Microsoft's MBSA and GFI LANguard NSS for affordably running a set of programmed network testing checks to identify potential security vulnerabilities. Progent has extensive experience with other network analysis products such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like Metasploit, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can show you how to design protection into your business operations, install scanning tools, plan and implement a secure network environment, and suggest procedures to optimize the safety of your IT system. Progent's security professionals are ready to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Learn more concerning Progent's network security analysis.

Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory scanning bundles intended to allow small businesses to receive an independent security assessment from a qualified security engineer. With Progent's External Network Security Inventory Scan, an engineer administers an extensive test of your network from beyond your firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from an authorized computer within your company firewall to determine the risk to internal threats. The two security inventory services are set up and run from a secured remote location. The project is managed by a consultant with high-level security credentials and who generates a report that details and interprets the information captured by the scan and proposes cost-effective improvements where appropriate.

Network Intrusion Testing Consulting
Stealth intrusion checking is an important part of any successful IT system security plan. Progentís security professionals can perform thorough penetration checks without the awareness of your organization's internal network support staff. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event history analysis are correctly configured and actively monitored. Learn more on Progent's network security penetration analysis consulting.

Firewalls and VPN Support
Progent's background in network security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned important networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Support Expertise
Cisco's security and remote connection technology offer a full range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Read more details concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.

Support Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a detailed security plan and choose appropriate technologies from a variety of suppliers to achieve your security objectives while staying within your spending restraints.

Certified Network Security Consulting
Every business should develop a carefully considered security program that incorporates both preventive processes and reaction planning. The proactive strategy is a set of procedures designed to minimize security weaknesses. The post-attack plan helps your network security engineers to assess the damage resulting from an attack, repair the system, document the event, and get the IT network restored as quickly as possible.

Progent's expert information security consultants can to help you to run a comprehensive vulnerability evaluation and create a network security plan to implement security policies and mechanisms to minimize future attacks and threats.

CISM Qualified Security Consulting Services
The CISM committee defines the basic competencies and international standards of performance that IT security professionals are expected to learn. It gives business management the confidence that those who have earned their CISM credential have the background and capability to provide effective security management and support consulting. Progent can provide the expertise of CISM certified security consultants to help businesses with:

  • IS Security Governance
  • Vulnerability Analysis
  • IS Security Program Management
  • IS Security Administration
  • Recovery Planning
Learn more information about Progent's CISM Qualified Network Security Support Expertise.

CISSP Certified Security Consulting Support
CISSP certification denotes mastery of an international standard for network security. ANSI has granted certification recognition in the area of information protection defined by ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Read additional details about Progent's CISSP-certified Information Security Support Expertise.

ISSAP Qualified Secure Information System Architecture Consulting Expertise
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP Certification through thorough examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the most complex demands of information system security architecture bounded by the broader scope of information security expertise needed for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Security
  • Data Encryption Solutions
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Learn more details concerning Progent's ISSAP Certified Secure Information System Architecture Support Professionals.

CISA Accredited Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a prestigious achievement that indicates expertise in network security auditing. Certified by ANSI, the CISA credential has consultants undergo a comprehensive test administered by the ISACA professional group. Progent's CISA IS security audit specialists can help your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Governance
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Data Assets
  • Business Continuity Planning
Find out more details concerning Progent's CISA Certified IS Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was established by ISACA to verify a consultant's skills to plan, implement, and support information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity plan based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation experts can provide a variety of risk assessment services such as:

  • Gather data and study documentation to help identify major risk scenarios
  • Identify legal, industry, and contractual requirements and company standards associated with your network to assess their possible impact on your business objectives
  • Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate information system risk so they can contribute to your risk management program
  • Connect key risk vectors to your associated operational processes to help assign risk responsibility
  • Determine risk appetite with your senior management and major stakeholders to make sure they match
Read additional details about Progent's CRISC Experts.

GIAC Accredited Security Consulting Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to verify that a certified security consultant possesses the skills necessary to provide services in important categories of network, information, and application program security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. NSA. Progent's GIAC-qualified information security audit engineers can assist your company in the areas of:

Find out more details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Engineer
To see how you can get in touch with a certified Progent security consultant for remote or on-premises help in Maryland, call 1-800-993-9400 or visit Online Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.