Small business IT networks in Massachusetts can depend on fast and economical online technical support from Progent's qualified network security experts to assist with urgent security issues. Rates are reasonable, charges are per minute, engagement is quick, and support is unbeatable. Progent also offers help for long-term projects that requires the services of senior security consultants with top security certifications.

In case your Massachusetts network is located far from more populated urban neighborhoods like Boston, Worcester, Springfield, Lowell, or Cambridge, contact with local qualified security experts may be problematic during a security disaster. This could mean a drop in revenue for your business, angry clients, idle workers, and defocused management. By contacting Progent, you have access to a certified security consultant ready to deliver expertise when you have to have it to keep your system on line and recover your data.

Progent can help you in a variety of ways in your efforts to guard your IT environment with support services ranging from network security checks to creating a company-wide security strategy. Progent provides economical support to assist small and midsize companies to design and maintain safe IT environments powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to provide centralized management and comprehensive security for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper level of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified engineers are accessible remotely or on site to provide a range of emergency or project-based IT security services including:

If your business has an urgent need for computer security support, refer to Progent's Urgent Remote Technical Help.

Progent's security experts offer advanced support in vital facets of system security including security evaluation, firewall/VPN support, and advanced security planning.

System Security Audits
Progent's expert security consultants can evaluate the effectiveness of your existing computer security environment through comprehensive remote automated analysis via advanced software tools and tested techniques. Progent's skill in administering this service saves you consulting fees and offers an accurate picture of weaknesses. The information your company gains can make up the basis of a network protection strategy that will permit your network to run safely and respond rapidly to future threats.

Automated Security Assessment
Progent offers consulting in the application of security evaluation packages including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a set of automatic network auditing checks to uncover possible security problems. Progent has broad knowledge of additional security auditing utilities including NMAP, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you build protection into your business processes, install scanning software, plan and implement a secure system architecture, and recommend policies to optimize the security of your network. Progent's security consultants are available to assist you to configure a firewall, implement safe remote access to email and data, and integrate VPN. Find out additional information concerning Progent's network security evaluation.

Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory packages designed to allow small companies to get an independent network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your company firewall to assess the risk to inside threats. Both security inventory packages are set up and executed from a secured external site. The process is directed by a consultant with top security credentials and who produces a document that summarizes and analyzes the information captured by the security scan and suggests practical improvements if appropriate.

Stealth Security Penetration Testing Support Services
Stealth intrusion checking is a key component of any comprehensive IT system security strategy. Progent’s security experts can perform extensive intrusion checks without the knowledge of your company's internal IT resources. Unannounced penetration checking shows whether existing security defense tools such as intrusion detection alerts and event history monitoring are correctly set up and actively checked. Find out additional information concerning Progent's stealth security penetration analysis support services.

Firewall/VPN Support
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology from multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your legacy PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's security and offsite access products represent a complete range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company objectives. Read more information about Progent's Engineering Services for Cisco Security and VPN Products.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security strategy and select the right products from multiple suppliers to achieve your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes next generation behavior analysis technology to defend endpoint devices and physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the entire threat lifecycle including protection, identification, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge technologies incorporated within one agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to plan and configure a ProSight ESP deployment that meets your company's specific needs and that allows you demonstrate compliance with legal and industry data security standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require immediate action. Progent's consultants can also help your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates and monitors your backup processes and enables fast recovery of critical files, applications and virtual machines that have become unavailable or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security vendors to provide web-based control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks most threats from reaching your network firewall. This reduces your exposure to inbound threats and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to track and protect internal email that stays within your security perimeter. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved easily to a different hardware solution without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT documentation, you can eliminate as much as half of time spent searching for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether you’re making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Learn more details about ProSight IT Asset Management service.

Expert Network Security Planning
Any company ought to develop a thoroughly thought out security strategy that incorporates both preventive procedures and reaction plans. The pre-attack strategy is a set of mechanisms intended to reduce vulnerabilities. The reactive strategy assists your company's network security personnel to evaluate the impact caused by a security penetration, repair the network, record the experience, and get business functions operational as quickly as feasible.

Progent's expert information security consultants can to assist you to perform a complete vulnerability assessment and create a computer security strategy to establish security processes and controls to mitigate future attacks and threats.

CISM Qualified Network Security Engineering Services
The CISM committee describes the basic competencies and international standards of performance that information security managers are required to master. It provides executive management the confidence that those who have qualified for their CISM credential possess the background and knowledge to deliver efficient security administration and support consulting. Progent can provide the expertise of CISM certified security consultants to help companies with:

  • Network Security Governance
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Find out more information about Progent's CISM Accredited Security Support Services.

CISSP Qualified Security Consulting Expertise
CISSP certification denotes expertise with a worldwide standard for data security. ANSI has awarded the CISSP credential accreditation in the field of information security defined by ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Read more information concerning Progent's CISSP Security Consulting Expertise.

CISSP-ISSAP Qualified Secure Information System Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified system architecture engineers are experts who have earned ISSAP status through thorough examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most complex demands of information system security architecture bounded by the wider field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Cryptography Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Physical Security
Learn additional information about Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.

CISA Qualified Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a prestigious qualification that signifies mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit specialists are available to assist your business in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Systems and Architecture Lifecycle
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Get more details concerning Progent's CISA Qualified Network Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's skills to plan, implement, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation specialists can provide a variety of risk assessment services including:

  • Collect data and study documentation to evaluate significant vulnerabilities
  • Inventory legal, industry, and business requirements and organizational standards related to your network to determine their potential impact on your business goals
  • Point out potential vulnerabilities for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness program and provide training to ensure your stakeholders understand IS risk so they can assist with your risk management process
  • Match identified risk scenarios to related operational procedures to help determine risk ownership
  • Determine risk appetite with executive management and key stakeholders to make sure they match
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Consulting Support
Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to make sure that a certified professional has the skills necessary to provide support in key categories of network, information, and application software security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States National Security Agency. Progent's GIAC-certified information security audit engineers are available to assist your IT organization in the areas of:

Find out additional information about Progent's GIAC Information Assurance Support.

Talk to a Security Specialist
To learn how to get in touch with a security consultant for online or onsite help in Massachusetts, phone 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2019 Progent Corporation. All rights reserved.