Company information networks in Massachusetts can now get fast and economical remote technical support from Progent's qualified security professionals to fix the toughest security issues. Rates are reasonable, billing is by the minute, sign-up is immediate, and support is world class. Progent also offers assistance for long-term projects that requires the knowledge of seasoned security engineers with high-level security certifications.

In case your Massachusetts small business is outside of major urban areas such as Boston, Worcester, Springfield, Lowell, or Cambridge, the availability of local certified security support specialists is often limited when you have a crisis. This could mean lost productivity for your business, upset customers, idle workers, and distracted executives. By contacting Progent, you can get in touch with a certified security consultant ready to deliver expertise whenever you require it to get your network operating and restore your information.

Progent can assist you in your efforts to protect your information system with support that ranges from network security audits to creating a comprehensive security strategy. Progent provides affordable support to assist companies of any size to configure and manage safe IT environments powered by Microsoft Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security companies to deliver centralized control and world-class security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of inspection for inbound email. For outbound email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's certified experts are available online or on premises to provide a range of urgent or longer-term network security services such as:

If your network has an immediate need for computer security support, refer to Progent's Emergency Online Network Help.

Progent's engineers provide advanced services in key fields of computer protection including auditing, firewall/VPN support, and advanced security consulting.

System Security Assessment
Progent's certified security engineers can evaluate the effectiveness of your existing computer security implementation through exhaustive remote automated testing via sophisticated utilities and tested procedures. Progent's skill in this service saves you consulting fees and assures an objective portrayal of gaps. The information your business is provided can form the basis of a security plan that can permit your information system to operate safely and respond quickly to new threats.

Automated Security Audits
Progent offers consulting in the use of security testing products including MBSA and GFI LANguard NSS for economically running a set of automatic network testing checks to identify potential security holes. Progent has extensive knowledge of other security analysis utilities including NMAP, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you design protection into your business processes, install scanning tools, define and deploy a protected system environment, and suggest procedures to optimize the security of your network. Progent's security consultants are ready to assist you to configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Find out more about Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two low-cost security inventory scanning packages intended to enable small companies to get an independent network security evaluation from an accredited security expert. With Progent's External Security Inventory Checkup, a security expert administers an extensive test of your network from outside your company firewall to uncover possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from a secure computer within your firewall to evaluate the risk to inside threats. The two security inventory packages are configured and executed from a protected remote location. The process is directed by a consultant with high-level security accreditations and who generates a document that summarizes and analyzes the information captured by the scan and proposes practical improvements where appropriate.

Stealth Intrusion Testing Support Services
Stealth intrusion testing is an important part of any serious network security plan. Progentís security professionals can run extensive intrusion tests without the knowledge of your company's in-house network support resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event log analysis are correctly set up and actively checked. Find out more about Progent's stealth security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in security technology includes extensive field work with leading firewalls and Virtual Private Network products from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Support Services
Cisco's network security and offsite access technology provide a comprehensive range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Find out additional details concerning Progent's Consulting Services for Cisco Security Technology and VPN Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and choose appropriate technologies from a variety of suppliers to achieve your security objectives while staying within your spending restraints.

Certified Security Planning
Every company should develop a thoroughly thought out security program that includes both proactive procedures and response plans. The proactive plan is a collection of steps that help to minimize security weaknesses. The reactive plan assists your network security engineers to evaluate the damage caused by a security penetration, repair the network, document the experience, and get the IT network running as quickly as feasible.

Progent's expert IT security consultants can to assist your business to run a full risk evaluation and define a computer security plan to implement security processes and mechanisms to mitigate future assaults and dangers.

CISM Accredited System Security Consulting Expertise
The CISM organization describes the basic capabilities and international standards of performance that information security professionals are required to learn. It gives business management the confidence that consultants who have earned their CISM certification have the background and knowledge to deliver efficient security management and consulting services. Progent offers the expertise of CISM certified security consultants to help companies with:

  • IS Security Processes
  • Risk Analysis
  • Network Security Program Management
  • Network Security Management
  • Response Management
Read additional information about Progent's CISM Accredited IS Security Consulting Services.

CISSP Qualified Security Consulting Services
CISSP certification recognizes mastery of a global standard for information security. ANSI has granted the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a variety security fields including:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Read more information concerning Progent's CISSP Accredited Network Security Support Services.

ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's ISSAP certified information system architecture engineers are consultants who have earned ISSAP status as a result of rigorous testing and significant work with information security design. The ISSAP certification represents proven competence in the most in-depth requirements of information security architecture within the broader scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all aspects of architecture security including.

  • Access Management Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Learn additional information concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Professionals.

CISA Certified IS Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA-certified security audit specialists can assist your IT organization in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Get more details concerning Progent's CISA Certified Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity plan based on leading practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC network risk mitigation engineers offer a range of risk identification services including:

  • Gather information and review documentation to evaluate significant risk scenarios
  • Identify statutory, regulatory, and contractual mandates and organizational standards associated with your network to assess their possible impact on your business objectives
  • Point out possible threats for your operational workflows to help in analyzing your corporate risk
  • Create a risk awareness program and conduct seminars to ensure your organization appreciate IT risk so they can contribute to your risk control process
  • Match key risk scenarios to your associated business procedures to help determine risk ownership
  • Determine risk tolerance with your senior management and key stakeholders to make sure they align
Read additional details concerning Progent's CRISC Experts.

GIAC Qualified Network Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to ensure that an accredited professional has the skills appropriate to deliver services in key categories of system, information, and application program security. GIAC certifications are recognized by businesses and institutions all over the world including and the United States National Security Agency. Progent's GIAC network security audit consultants are available to help your IT organization in the areas of:

Find out additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Progent Security Expert
To find out how to get in touch with a certified security consultant for online or on-premises assistance in Massachusetts, phone 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.