Company networks in Massachusetts can depend on fast and affordable remote access to Progent's certified security support specialists to fix complex security problems. The cost is reasonable, billing is per minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for long-term engagements that demand the services of seasoned security engineers with top industry certifications.

If your Massachusetts small business is located far from more populated metropolitan neighborhoods like Boston, Worcester, Springfield, Lowell, or Cambridge, contact with local qualified security consultants may be limited during an urgent situation. This can result in lost revenue for your business, angry customers, idle employees, and defocused management. By calling Progent's remote support, you can get in touch with a certified security professional who can deliver assistance whenever you need it to get your information system operating and recover your data.

Progent can assist you in your efforts to guard your network with support services that can range from network security audits to creating a comprehensive security plan. Progent offers economical service to help businesses of all sizes to configure and maintain secure IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security companies to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a further layer of analysis for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security engineers are accessible remotely or on premises to offer a range of emergency or longer-term network security services such as:

  • Run comprehensive security audits
  • Recuperate quickly after attacks
  • Install hardware and software firewalls
  • Configure safe methods for offsite and mobile connectivity
  • Deploy effective solutions for automatic protection against viruses, spam and DHAs
  • Develop a company-wide security strategy with 24x7 security monitoring
  • Offer comprehensive Call Center Services
  • Develop a practical backup and restore plan based on Data Protection Manager fault-tolerant technology
If your business has an immediate need for computer security help, refer to Progent's Urgent Remote Network Support.

Progent's support professionals can deliver world-class services in vital facets of computer protection that include analysis, firewall/VPN support, and advanced security planning.

System Evaluation
Progent's expert security consultants can assess the effectiveness of your existing computer security implementation by performing comprehensive remote automated analysis based on advanced utilities and tested techniques. Progent's experience in administering this testing saves your company consulting fees and offers an objective picture of gaps. The knowledge your IT organization is provided can form the basis of a security strategy that will allow your network to run dependably and respond rapidly to future threats.

Automated Network Security Audits
Progent provides expertise in the application of security testing software including Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a variety of automatic network testing checks to identify possible security weaknesses. Progent has broad knowledge of other security auditing products including NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and respond appropriately.

Progent can show you how to design protection into your company processes, configure scanning software, define and implement a secure network environment, and recommend policies to optimize the safety of your network. Progent's security consultants are available to assist you to configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's network security evaluation.

Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory packages intended to enable small companies to get an independent security assessment from a qualified security engineer. With Progent's External Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from beyond your firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine inside your company firewall to assess vulnerabilities to inside attacks. Both security inventory packages are set up and run from a secured remote site. The project is managed by an engineer who has earned top security accreditations and who generates a report that summarizes and analyzes the data collected by the scan and proposes practical remediation where called for.

Stealth Penetration Analysis Consulting
Stealth penetration testing is a key component of any comprehensive network security plan. Progentís security experts can run extensive intrusion tests without the awareness of your company's internal network support resources. Stealth penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event log analysis are correctly set up and actively checked. Learn more on Progent's stealth penetration testing consulting.

Firewall and Virtual Private Network Solutions
Progent's background in security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network technology offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access products represent a complete line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and CCNP certifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Read additional information about Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security strategy and select appropriate technologies from a variety of vendors to achieve your security goals while sticking within your spending limits.

Certified Network Security Consulting
Every company should have a carefully considered security strategy that includes both preventive procedures and response planning. The pre-attack plan is a set of steps that help to reduce vulnerabilities. The reactive strategy helps your company's network security engineers to assess the damage caused by an attack, fix the network, document the experience, and get business functions running as rapidly as feasible.

Progent's certified IT security engineers can to assist your business to run a comprehensive risk evaluation and define a computer security strategy to implement security processes and mechanisms to minimize future attacks and threats.

CISM Qualified Network Security Consulting Expertise
The CISM organization defines the core capabilities and international standards of performance that information security professionals are expected to master. It provides executive management the assurance that those who have qualified for their CISM certification have the experience and capability to deliver effective security management and support consulting. Progent can provide the expertise of CISM certified security professionals to help businesses with:

  • Information Security Governance
  • Risk Analysis
  • Information Security Program Management
  • Network Security Management
  • Response Planning
Learn additional information concerning Progent's CISM Accredited Security Consulting Expertise.

CISSP Certified Security Engineering Services
CISSP certification denotes mastery of a worldwide standard for information security. The American National Standards Institute has granted certification recognition in the field of data security stipulated by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a broad range of security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Learn more details about Progent's CISSP Qualified Security Support Professionals.

ISSAP Certified Secure IT Architecture Engineering Expertise
Progent's ISSAP certified information system architecture engineers are consultants who have earned ISSAP status as a result of thorough testing and significant experience with network security design. The ISSAP certification represents demonstrated mastery in the most complex requirements of information system security architecture bounded by the wider field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Protection
  • Cryptography Options
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional details about Progent's ISSAP Accredited Secure System Architecture Support Expertise.

CISA Qualified IS Security Auditing Consulting Services
The Certified Information Systems Auditor accreditation is a recognized achievement that represents expertise in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that candidates pass an extensive test given by the ISACA international professional group. Progent's CISA-certified IS security audit specialists can help your IT organization with:

  • IS Audit Services
  • IT Administration
  • Systems and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Find out the details about Progent's CISA Accredited Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to validate a consultant's skills to design, deploy, and support IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation specialists can provide a variety of risk evaluation services such as:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory legal, industry, and contractual mandates and company policies associated with your network to determine their potential influence on your strategic objectives
  • Point out possible vulnerabilities for your operational workflows to assist in analyzing your enterprise risk
  • Create a risk awareness initiative and conduct seminars to make sure your organization understand IT risk so they can contribute to your risk management process
  • Connect identified risk vectors to your associated operational processes to help determine risk ownership
  • Determine risk appetite with executive leadership and major stakeholders to make sure they are in agreement
Get more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to validate the knowledge of network security professionals. GIAC's goal is to assure that an accredited security consultant possesses the skills needed to deliver support in important areas of network, information, and software security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC information security audit engineers can help your business with:

  • Assessing Perimeters
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Engineer
To learn how to contact a certified Progent security engineer for online or onsite support in Massachusetts, phone 1-800-993-9400 or visit Remote Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.