Small business computer networks in Massachusetts now have prompt and affordable online help from Progent's certified security engineers to assist with urgent security issues. The cost is reasonable, billing is by the minute, engagement is immediate, and service is world class. Progent also offers assistance for long-term engagements that requires the services of senior security engineers with top security certifications.

In case your Massachusetts company is located away from larger metropolitan areas including Boston, Worcester, Springfield, Lowell, or Cambridge, help from local accredited network security engineers may be problematic during a crisis. This can cause lost income for your company, angry clients, unproductive employees, and defocused management. By utilizing Progent, you can get in touch with a qualified security professional ready to deliver assistance when you require it to get your network running and salvage your information.

Progent can help you in a variety of ways in your efforts to defend your network with support services that can range from network security assessments to creating a comprehensive security plan. Progent provides economical service to assist small and midsize companies to configure and maintain secure IT environments based on Microsoft Windows and Cisco technology and that may include servers and desktops running UNIX or Linux platforms plus BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver centralized control and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of analysis for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's security consultants are available remotely or on premises to offer a range of urgent or longer-term computer security services such as:

  • Perform automated security audits
  • Recuperate quickly after virus and worm attacks
  • Install effective firewalls
  • Configure secure solutions for remote and mobile connectivity
  • Deploy advanced applications for protection against spam and DHAs
  • Develop a company-wide security plan with round-the-clock monitoring
  • Provide comprehensive Help Desk Support
  • Create a practical backup and disaster recovery strategy centered on Microsoft DPM high-availability technology
If your network has an urgent need for computer security help, go to Progent's Urgent Remote Technical Support.

Progent's security experts provide world-class services in key facets of system security that include security assessment, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's expert security engineers can assess the strength of your current computer protection implementation through exhaustive remote automated analysis based on advanced utilities and tested procedures. Progent's skill in administering this testing saves you money and offers an objective portrayal of system vulnerability. The information your company gains can make up the foundation of a security plan that can permit your network to run safely and adapt rapidly to new risks.

Automated Network Vulnerability Assessment
Progent offers expertise in the application of security auditing packages such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a variety of programmed system testing scans to identify potential security vulnerabilities. Progent has broad experience with additional security analysis utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus utilities like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can show you how to design protection into your company operations, install auditing tools, define and deploy a protected system environment, and suggest policies to maximize the safety of your network. Progent's security consultants are able to show you how to set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Find out additional information concerning Progent's network security assessment.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to receive an impartial network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive test of your network from outside your firewall to uncover possible weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from a secure machine inside your company firewall to determine vulnerabilities to internal attacks. The two security inventory packages are configured and run from a secured external site. The project is directed by an engineer with high-level security credentials and who generates a report that summarizes and interprets the information captured by the scan and suggests practical remediation where called for.

Network Intrusion Testing Support Services
Stealth intrusion testing is a key part of any comprehensive IT system security plan. Progentís security professionals can perform thorough penetration checks without the knowledge of your company's internal IT staff. Unannounced penetration checking uncovers whether current security defense systems such as intrusion incident alerts and event history analysis are correctly set up and consistently monitored. Find out more concerning Progent's stealth penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple companies including Cisco Systems, Microsoft, and Symantec. Progent can provide the services of consultants with key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, optimize, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote access technology provide a complete line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business goals. Find out additional information concerning Progent's Consulting Services for Cisco Security Technology and VPN Products.

Support Expertise for Other Firewall and VPN Products
Progent offers small and medium size businesses professional support for Intrusion Protection products and IPSec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and select appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget restraints.

Certified Network Security Consulting
Every company should develop a carefully considered security strategy that includes both proactive procedures and response plans. The proactive plan is a collection of steps intended to minimize vulnerabilities. The reactive plan helps your IT security engineers to assess the damage resulting from a security penetration, repair the system, document the event, and get the IT network running as rapidly as feasible.

Progent's expert information security consultants are available to assist you to perform a complete vulnerability evaluation and define a computer security plan to implement security processes and controls to mitigate ongoing attacks and dangers.

CISM Certified Network Security Support Services
The CISM committee defines the basic capabilities and global standards of performance that information security professionals are expected to learn. CISM provides business management the assurance that consultants who have earned their CISM certification have the experience and capability to provide effective security management and consulting consulting. Progent can provide the expertise of CISM qualified security consultants to help businesses with:

  • Network Security Strategies
  • Vulnerability Management
  • IS Security Program Management
  • Network Security Management
  • Response Management
Learn more details about Progent's CISM Accredited IS Security Consulting Professionals.

CISSP Accredited Security Consulting Expertise
CISSP certification denotes mastery of an international standard for information security. ANSI has awarded the CISSP credential accreditation in the area of information protection defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP Accredited Network Security Engineering Services.

ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's ISSAP certified network architecture professionals are consultants who have earned ISSAP Certification through thorough examination and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the most complex demands of information security architecture bounded by the wider scope of information system security expertise required for CISSP certification. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Protection
  • Cryptography Solutions
  • Needs Analysis and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out additional information about Progent's ISSAP Certified Secure System Architecture Engineering Services.

CISA Certified Security Auditing Engineering Services
The CISA accreditation is an important achievement that indicates mastery in IS security auditing. Accredited by ANSI, the CISA credential requires that consultants pass a comprehensive test administered by the ISACA international professional group. Progent's CISA-qualified information security audit experts are available to assist your IT organization in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Get the details about Progent's CISA Certified Network Security Auditing Engineering Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a range of risk evaluation services including:

  • Collect information and study documentation to evaluate significant risk scenarios
  • Inventory statutory, regulatory, and business mandates and organizational standards related to your network to assess their potential impact on your strategic goals
  • Point out possible threats for your operational processes to assist in analyzing your corporate risk
  • Create a risk awareness initiative and conduct training to ensure your stakeholders appreciate IS risk so they can assist with your risk control program
  • Connect key risk vectors to related business procedures to help assign risk responsibility
  • Determine risk tolerance with executive leadership and major stakeholders to make sure they match
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Network Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security experts. GIAC's goal is to ensure that an accredited professional has the skills necessary to provide support in key areas of system, information, and application program security. GIAC accreditations are acknowledged by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit experts can help your business in the areas of:

  • Auditing IT Infrastructure
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
Learn more details concerning Progent's GIAC IS Security Consulting Services.

Contact a Certified Progent Security Specialist
To see how to access a Progent security engineer for remote or on-premises expertise in Massachusetts, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.