Company computer networks in Massachusetts now have prompt and affordable remote help from Progent's certified security support specialists to help with the toughest security problems. The cost is competitive, billing is by the minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the services of senior security consultants with high-level industry credentials.

In case your Massachusetts organization is based away from larger metropolitan areas like Boston, Worcester, Springfield, Lowell, or Cambridge, the availability of local accredited security engineers is often problematic when there's an urgent situation. This can cause lost income for your business, angry clients, unproductive workers, and distracted management. By calling Progent's remote support, you can get in touch with a qualified security professional who can provide help whenever you need it to keep your information system on line and restore your data.

Progent can assist you at any level in your efforts to guard your information system with services that can range from security checks to developing a company-wide security plan. Progent offers affordable service to help small and midsize companies to set up and manage safe IT environments powered by Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver centralized control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper layer of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.

Progent's certified consultants are available online or on premises to offer a range of urgent or project-based network security services including:

  • Run comprehensive network security evaluations
  • Recuperate quickly after virus and worm attacks
  • Set up hardware and software firewalls
  • Configure secure methods for offsite and mobile access
  • Deploy advanced software for automatic defense against viruses, spam and DHAs
  • Help create a company-wide security strategy with proactive security monitoring
  • Offer outsourced Call Center Services
  • Help Create a practical data backup and disaster recovery solution based on Data Protection Manager automated backup technology
If your business has an immediate need for computer security help, go to Progent's Emergency Remote Network Support.

Progent's security experts can deliver advanced support in key facets of computer protection including auditing, firewall/VPN support, and high-level security planning.

System Security Assessment
Progent's expert security engineers can assess the strength of your existing computer security systems through comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's skill in this testing saves you money and offers a detailed portrayal of system vulnerability. The knowledge your company is provided can be used as the basis of a security strategy that can allow your network to run safely and adapt rapidly to new risks.

Automated Network Security Assessment
Progent provides expertise in the application of security evaluation products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of programmed network auditing checks to identify possible security problems. Progent has extensive knowledge of other network auditing products including NMAP, AMAP Application Scanner, eEye, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you build security into your company operations, configure scanning software, define and deploy a secure system environment, and recommend procedures to optimize the security of your IT system. Progent's security engineers are ready to show you how to configure a firewall, design safe remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's network security evaluation.

Security Inventory Scanning Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to enable small businesses to receive a professional security assessment from an accredited security specialist. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive test of your IT infrastructure from outside your firewalled perimeter to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional executes a system scan from a secure computer inside your firewall to assess your exposure to inside assaults. Both security inventory services are configured and executed from a protected external location. The project is managed by an engineer who has earned top security credentials and who generates a document that summarizes and analyzes the data collected by the security scan and proposes cost-effective improvements where called for.

Network Intrusion Analysis Consulting
Stealth intrusion testing is an important part of any comprehensive network security plan. Progentís security professionals can perform extensive intrusion checks without the knowledge of your company's in-house IT resources. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident alerts and event log analysis are correctly set up and actively monitored. Learn more on Progent's stealth penetration analysis consulting.

Firewalls and VPN Support
Progent's expertise in security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) products from multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and remote access products offer a comprehensive range of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Find out additional information concerning Progent's Engineering Services for Cisco Security Technology and VPN Products.

Consulting Services for Other Firewall and VPN Products
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select the right products from a variety of suppliers to achieve your security objectives while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning technology to guard endpoint devices as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a single platform to automate the entire threat progression including protection, detection, containment, remediation, and post-attack forensics. Key features include single-click rollback with Windows VSS and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services deliver affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge tools packaged within a single agent managed from a unified console. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you prove compliance with government and industry data protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also help your company to install and verify a backup and restore system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup processes and allows fast restoration of vital data, apps and virtual machines that have become lost or damaged as a result of hardware failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's BDR consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security vendors to deliver centralized control and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a further layer of inspection for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. Under the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate as much as 50% of time spent trying to find critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to develop a thoroughly considered security program that includes both pre-attack processes and reaction plans. The pre-attack strategy is a collection of procedures designed to reduce vulnerabilities. The reactive strategy assists your IT security personnel to assess the damage resulting from a security penetration, repair the system, record the event, and get business functions running as quickly as possible.

Progent's certified IT security engineers are available to assist you to run a complete vulnerability evaluation and create a company-wide security strategy to establish security policies and mechanisms to reduce ongoing attacks and dangers.

CISM Qualified Security Consulting Expertise
The CISM committee defines the basic capabilities and international standards of skill that IT security professionals are expected to learn. CISM gives executive management the assurance that consultants who have earned their CISM credential possess the background and capability to deliver efficient security management and support consulting. Progent can provide the expertise of CISM qualified security professionals to assist businesses with:

  • Information Security Governance
  • Vulnerability Analysis
  • IS Security Program Management
  • Information Security Management
  • Recovery Management
Learn more information about Progent's CISM Certified Network Security Engineering Services.

CISSP Accredited Security Engineering Expertise
CISSP certification recognizes mastery of a worldwide standard for network security. The American National Standards Institute has granted certification recognition in the area of information security stipulated by ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Read additional details about Progent's CISSP Accredited Network Security Consulting Expertise.

ISSAP Accredited Secure IT Architecture Engineering Services
Progent's ISSAP certified information system architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous examination and significant experience with network security design. The ISSAP certification indicates proven competence in the most challenging demands of information security architecture within the wider scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all aspects of architecture security including.

  • Access Management Systems and Methodologies
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Find out additional details concerning Progent's ISSAP Certified Secure Network Architecture Support Professionals.

CISA Qualified IS Security Auditing Engineering Services
The CISA credential is a prestigious achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA professional group. Progent's CISA network security audit specialists are available to help your business with:

  • Information Systems Audit Process
  • Information Technology Administration
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Read additional details concerning Progent's CISA Qualified Network Security Auditing Consulting Support.

CRISC Consultants
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and support information system controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and carry out a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC IT risk management specialists can provide a range of risk evaluation services such as:

  • Collect data and study documentation to evaluate significant vulnerabilities
  • Inventory legal, industry, and business requirements and company policies associated with your network to determine their possible influence on your strategic goals
  • Point out possible threats for your business processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct training to ensure your organization understand IT risk so they can assist with your risk control process
  • Match identified risk vectors to related operational processes to help assign risk ownership
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they match
Learn the details concerning Progent's CRISC Experts.

GIAC Qualified Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of information technology security engineers. GIAC's goal is to verify that an accredited professional has the skills appropriate to provide support in key areas of system, data, and application program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit specialists are available to assist your company in the areas of:

  • Auditing Perimeters
  • Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Learn additional details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Expert
To learn how you can get in touch with a certified security consultant for online or onsite assistance in Massachusetts, call 1-800-993-9400 or go to Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.