Business networks in the state of Massachusetts can depend on fast and affordable remote help from Progent's accredited network security professionals to resolve complex security issues. The cost is reasonable, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also offers help for long-term engagements that demand the expertise of seasoned security engineers with high-level industry credentials.

In case your Massachusetts office is situated outside of major metropolitan areas such as Boston, Worcester, Springfield, Lowell, or Cambridge, access to nearby accredited network security experts is often problematic during a security disaster. This can result in a loss of productivity for your business, upset clients, unproductive workers, and defocused management. By utilizing Progent, you have access to a certified security professional who can deliver help when you need it to keep your system on line and salvage your data.

Progent can assist you in your efforts to defend your IT environment with support that ranges from security audits to developing a comprehensive security strategy. Progent provides economical service to assist businesses of all sizes to configure and manage secure IT environments based on Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux platforms plus mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security companies to deliver web-based control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and blocks most threats from reaching your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a further level of analysis for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall.

Progent's certified professionals are available online or on site to provide a range of urgent or longer-term computer security services which include:

If your company has an urgent need for computer security support, go to Progent's Urgent Online Network Support.

Progent's support professionals offer advanced support in key fields of system security including auditing, firewall and VPN expertise, and high-level security consulting.

System Audits
Progent's certified security engineers can evaluate the vulnerability of your existing network security implementation by performing exhaustive remote automated analysis based on advanced utilities and tested techniques. Progent's skill in this service saves you time and money and assures an objective picture of weaknesses. The knowledge your IT organization is provided can be used as the foundation of a network protection strategy that can allow your network to run dependably and respond rapidly to new risks.

Automated Network Security Analysis
Progent provides consulting in the application of security auditing utilities such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably performing a set of automatic network auditing checks to identify possible security gaps. Progent has extensive knowledge of other security analysis utilities such as NMAP, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build security into your company processes, install scanning tools, define and implement a protected network architecture, and suggest policies to optimize the safety of your network. Progent's security engineers are able to show you how to set up a firewall, implement secure remote connectivity to email and business applications, and install VPN. Find out more about Progent's automated security analysis.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles designed to enable small businesses to get a professional security evaluation from a certified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive test of your network from beyond your firewall to determine potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a system scan from an authorized computer within your company firewall to evaluate your exposure to internal threats. The two security inventory packages are configured and run from a secured external site. The process is directed by a consultant with high-level security credentials and who generates a document that details and interprets the data captured by the security scan and suggests practical remediation if appropriate.

Stealth Penetration Analysis Consulting
Stealth intrusion checking is an important component of any successful IT system security strategy. Progentís security professionals can run extensive intrusion tests without the awareness of your company's internal IT staff. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident alerts and event log monitoring are properly configured and actively checked. Find out additional information about Progent's stealth security penetration testing consulting.

Firewalls and VPN Support
Progent's expertise in security solutions includes extensive field work with major firewalls and Virtual Private Network technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with key industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Support Services
Cisco's network security and offsite connection technology represent a comprehensive line of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company goals. Read additional information concerning Progent's Consulting Expertise for Cisco Security and VPN Products.

Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and choose appropriate products from multiple suppliers to support your security objectives while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent offers a portfolio of low-cost, set-price monthly managed services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver centralized management and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper level of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely get by legacy signature-based AV products. ProSight ASM safeguards local and cloud-based resources and offers a single platform to address the entire threat progression including protection, identification, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital data, apps and VMs that have become unavailable or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide world-class expertise to set up ProSight Data Protection Services to to comply with regulatory requirements such as IPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

Expert Network Security Planning
Any company ought to have a thoroughly thought out security program that includes both preventive processes and reaction plans. The proactive plan is a collection of procedures that help to reduce security weaknesses. The reactive strategy assists your company's network security engineers to assess the impact caused by an attack, repair the network, record the experience, and get the IT network operational as soon as possible.

Progent's certified information security engineers can to assist your company to perform a complete vulnerability assessment and define a computer security plan to implement security policies and controls to minimize future assaults and dangers.

CISM Qualified System Security Engineering Assistance
The CISM committee defines the core competencies and global standards of performance that IT security professionals are required to learn. CISM provides executive management the confidence that consultants who have qualified for their CISM credential possess the experience and knowledge to deliver effective security management and support services. Progent offers the support of CISM certified security professionals to assist companies with:

  • IS Security Governance
  • Vulnerability Management
  • Information Security Program Management
  • IS Security Management
  • Recovery Management
Read more information about Progent's CISM IS Security Support Expertise.

CISSP Certified Security Engineering Assistance
CISSP denotes mastery of a global standard for network security. The American National Standards Institute has awarded the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Find out additional details concerning Progent's CISSP Network Security Support Professionals.

ISSAP Accredited Secure Information System Architecture Engineering Assistance
Progent's ISSAP certified system architecture professionals are experts who have been awarded ISSAP Certification through rigorous testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most in-depth demands of information system security architecture within the broader scope of information security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Phone System and System Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Find out additional details about Progent's ISSAP Certified Secure Network Architecture Support Expertise.

CISA Qualified Security Auditing Engineering Support
The CISA accreditation is a recognized achievement that signifies expertise in network security audit and control. Certified by ANSI, the CISA credential has consultants undergo an extensive test given by the ISACA international professional association. Progent's CISA-qualified information security audit specialists can help your company with:

  • IS Audit Process
  • IT Administration
  • Systems and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Read additional information about Progent's CISA Qualified Network Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC program was established by ISACA in 2010 to validate a consultant's skills to plan, implement, and maintain information system control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to help you to develop and carry out a business continuity strategy that follows industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation experts offer a range of risk identification services such as:

  • Gather information and study documentation to identify major vulnerabilities
  • Inventory statutory, industry, and contractual mandates and company standards related to your network to determine their potential influence on your business objectives
  • Point out possible vulnerabilities for your operational processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate information system risk so they can contribute to your risk control process
  • Connect key risk scenarios to related operational processes to help determine risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to ensure they are in agreement
Read more information concerning Progent's CRISC Consultants.

GIAC Qualified Security Consulting Assistance
GIAC was founded in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to verify that an accredited security consultant possesses the skills necessary to provide support in key categories of network, data, and program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified information security audit consultants are available to assist your business with:

  • Auditing IT Infrastructure
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To find out how you can contact a certified security engineer for remote or on-premises assistance in Massachusetts, phone 1-800-993-9400 or visit Online Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.