Company IT networks in Maryland can depend on quick and affordable online technical support from Progent's accredited security professionals to resolve urgent security problems. Rates are affordable, charges are by the minute, engagement is fast, and support is unbeatable. Progent also provides assistance for long-term projects that demand the services of senior security engineers with high-level security credentials.

If your Maryland network is based some distance from major urban neighborhoods such as Baltimore, Columbia, Silver Spring, or Dundalk, help from nearby accredited security experts may be problematic during a crisis. This could mean lost productivity for your company, angry clients, unproductive employees, and distracted management. By contacting Progent's remote support, you can get in touch with a certified security professional ready to deliver expertise whenever you need it to keep your system operating and salvage your information.

Progent can help you in all your initiatives to defend your network with support services that ranges from network security checks to developing a company-wide security plan. Progent provides affordable support to assist companies of any size to configure and maintain safe networks based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to provide centralized management and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also enable Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.

Progent's certified professionals are accessible online or on premises to provide a variety of emergency or project-based computer security services such as:

If your business has an emergency requirement for computer security help, refer to Progent's Urgent Online Network Support.

Progent's engineers can deliver world-class support in vital areas of computer security that include auditing, firewall/VPN support, and advanced security consulting.

System Assessment
Progent's expert security engineers can evaluate the strength of your current computer protection implementation by performing exhaustive remote automated testing based on advanced software tools and proven procedures. Progent's experience in administering this testing saves your company consulting fees and assures an objective portrayal of security holes. The information your business is provided can make up the basis of a network protection strategy that will allow your network to run safely and respond quickly to future risks.

Automated Network Security Audits
Progent provides consulting in the use of security auditing packages such as MBSA and GFI LANguard for economically running a set of programmed system auditing checks to uncover possible security problems. Progent has extensive experience with additional network analysis tools including NMAP, AMAP application mapper, eEye, as well as tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to design protection into your company processes, install auditing tools, plan and implement a protected network architecture, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement secure remote access to email and business applications, and integrate VPN. Learn more concerning Progent's automated security analysis.

Security Inventory Service Packages for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles designed to allow small companies to get a professional network security evaluation from an accredited security expert. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive examination of your IT infrastructure from beyond your firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine within your firewall to evaluate your exposure to inside attacks. The two security inventory packages are set up and run from a protected remote site. The process is managed by an engineer who has earned top security credentials and who generates a document that summarizes and analyzes the data collected by the scan and suggests cost-effective improvements where called for.

Network Penetration Analysis Support Services
Stealth penetration checking is an important component of any successful IT system security plan. Progent’s security experts can run thorough intrusion tests without the knowledge of your organization's internal network support resources. Unannounced penetration testing shows whether current security defense tools such as intrusion detection warnings and event log monitoring are correctly configured and actively monitored. Find out more concerning Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's background in security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) products from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Support Services
Cisco's network security and offsite connection technology offer a complete line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Read additional information about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate technologies from multiple suppliers to achieve your security objectives while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis technology to guard endpoint devices and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to manage the complete threat progression including blocking, infiltration detection, mitigation, remediation, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single control. Progent's data protection and virtualization experts can help you to design and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent attention. Progent can also assist your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup activities and enables rapid restoration of vital files, apps and VMs that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide world-class expertise to configure ProSight DPS to to comply with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading information security companies to provide web-based management and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host configured and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved immediately to a different hosting solution without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you’re making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any company ought to develop a carefully considered security strategy that incorporates both pre-attack processes and reaction planning. The proactive plan is a collection of procedures intended to minimize vulnerabilities. The post-attack plan assists your company's security personnel to evaluate the damage caused by a security penetration, repair the system, document the event, and get business functions operational as rapidly as feasible.

Progent's expert IS security engineers can to help your business to perform a comprehensive risk evaluation and define a computer security plan to establish security processes and controls to minimize ongoing attacks and dangers.

CISM Certified Information Security Consulting Assistance
The CISM organization defines the basic capabilities and international standards of skill that IT security managers are expected to master. It gives executive management the assurance that consultants who have earned their CISM certification have the experience and capability to deliver effective security management and support consulting. Progent can provide the services of CISM qualified security consultants to assist companies with:

  • Network Security Governance
  • Risk Management
  • IS Security Program Management
  • IS Security Management
  • Recovery Planning
Read more information about Progent's CISM Qualified IS Security Support Expertise.

CISSP Certified Security Consulting Assistance
CISSP certification denotes mastery of a global standard for data security. ANSI has awarded the CISSP credential recognition in the field of data security under ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Preparedness
Learn more details about Progent's CISSP Qualified Cybersecurity Consulting Professionals.

CISSP-ISSAP Qualified Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP qualified system architecture professionals are experts who have earned ISSAP status through rigorous testing and extensive work with information security design. The ISSAP credential indicates proven competence in the more in-depth demands of information security architecture within the wider scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all aspects of architecture security such as.

  • Access Management Systems and Techniques
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Standards
  • BCP and DRP
  • Physical Security
Learn more information about Progent's ISSAP Accredited Secure System Architecture Support Expertise.

CISA Accredited Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that represents expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive test given by the ISACA international professional association. Progent's CISA IS security audit consultants can help your business in the areas of:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • IT Support
  • Safeguarding Information Resources
  • Business Continuity Planning
Find out more details about Progent's CISA Qualified Network Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's ability to plan, deploy, and maintain IS controls to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity plan that follows leading practices identified by CRISC and crafted to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management engineers can provide a variety of risk assessment services including:

  • Collect information and review documentation to help identify significant vulnerabilities
  • Identify legal, regulatory, and contractual mandates and company policies related to your network to determine their possible impact on your business goals
  • Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your organization appreciate IS risk so they can contribute to your risk control process
  • Match key risk scenarios to your associated business procedures to help determine risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to make sure they are in agreement
Get the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to validate the knowledge of IT security professionals. GIAC's mission is to assure that an accredited security consultant has the knowledge needed to provide support in key areas of system, information, and application security. GIAC certifications are recognized by companies and institutions around the world including and the United States NSA. Progent's GIAC-certified network security audit engineers are available to help your business with:

Read additional details concerning Progent's GIAC Information Assurance Support.

Contact a Certified Security Specialist
To learn how you can access a certified security consultant for online or onsite expertise in Maryland, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2019 Progent Corporation. All rights reserved.