Company computer networks in the state of Massachusetts can have fast and affordable online technical support from Progent's accredited security consultants to resolve complex security issues. Rates are affordable, charges are per minute, engagement is fast, and service is unbeatable. Progent also offers assistance for long-term engagements that demand the expertise of seasoned security consultants with top security credentials.

In case your Massachusetts network is situated far from larger metropolitan neighborhoods including Boston, Worcester, Springfield, Lowell, or Cambridge, the availability of local qualified security consultants could be problematic when there's a security disaster. This can cause lost income for your business, upset customers, idle workers, and defocused management. By calling Progent's remote support, you have access to a qualified security engineer who can offer expertise whenever you require it to keep your system running and restore your data.

Progent can help you in a variety of ways in your efforts to defend your information system with services that can range from security assessments to creating a company-wide security plan. Progent offers economical service to assist small and midsize companies to design and manage safe networks powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver centralized management and comprehensive protection for your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's security experts are available remotely or on site to provide a range of urgent or longer-term IT security services which include:

  • Run thorough security evaluations
  • Clean up quickly after attacks
  • Install and troubleshoot firewalls
  • Configure secure solutions for offsite and mobile connectivity
  • Deploy advanced solutions for automatic protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security plan with 24x7 monitoring
  • Offer comprehensive Help Desk Call Center Support
  • Help Create an effective data backup and disaster recovery plan centered on Data Protection Manager backup capability
If your network has an urgent need for computer security help, refer to Progent's Emergency Online Technical Help.

Progent's security experts offer advanced services in vital areas of system security including security assessment, firewall and VPN solutions, and high-level security consulting.

System Audits
Progent's expert security consultants can evaluate the vulnerability of your current network security implementation through exhaustive remote automated testing via sophisticated software tools and proven procedures. Progent's skill in administering this service saves your company money and assures an accurate portrayal of system vulnerability. The information your business is provided can form the foundation of a security plan that will allow your network to run dependably and respond rapidly to new threats.

Automated Security Assessment
Progent offers consulting in the application of security evaluation packages including Microsoft's MBSA and GFI LANguard NSS for economically running a variety of automatic network auditing scans to identify potential security vulnerabilities. Progent has extensive knowledge of other security analysis tools including NMAP, AMAP, eEye, as well as utilities like Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and respond appropriately.

Progent can show you how to build protection into your company processes, configure auditing tools, define and implement a protected network environment, and suggest policies to optimize the security of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement secure remote access to email and business applications, and install VPN. Find out additional information on Progent's network security assessment.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles intended to allow small businesses to get an impartial security assessment from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security expert administers a comprehensive examination of your network from beyond your company firewall to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from a secure machine within your firewall to assess vulnerabilities to inside threats. Both security inventory services are configured and executed from a protected external site. The project is directed by an engineer with high-level security credentials and who generates a report that summarizes and analyzes the information collected by the security scan and suggests practical improvements where called for.

Stealth Intrusion Analysis Support Services
Stealth penetration testing is a key part of any serious IT system security strategy. Progent’s security professionals can perform extensive intrusion tests without the awareness of your organization's internal IT staff. Stealth penetration checking shows whether existing security defense tools such as intrusion detection warnings and event log monitoring are correctly configured and actively monitored. Find out additional information on Progent's stealth penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and remote connection products provide a complete range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Read more information about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.

Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and select the right products from multiple vendors to achieve your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a unified platform to manage the complete malware attack progression including protection, infiltration detection, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver affordable in-depth security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering via leading-edge tools packaged within one agent accessible from a single console. Progent's data protection and virtualization experts can help your business to design and configure a ProSight ESP deployment that meets your company's specific requirements and that allows you demonstrate compliance with legal and industry data protection standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent can also assist you to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of critical files, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR specialists can deliver advanced support to configure ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading data security companies to provide centralized management and world-class protection for all your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to a different hardware solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect data about your network infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs or domains. By cleaning up and managing your IT documentation, you can save up to half of time spent looking for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether you’re making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Every company ought to develop a thoroughly considered security program that incorporates both pre-attack procedures and reaction plans. The proactive plan is a collection of mechanisms intended to minimize security weaknesses. The post-attack plan assists your company's network security personnel to assess the impact resulting from a security penetration, fix the network, document the event, and get business functions running as quickly as feasible.

Progent's expert information security consultants can to help your company to perform a complete vulnerability evaluation and define a network security strategy to establish security processes and mechanisms to minimize future attacks and threats.

CISM Qualified Information Security Engineering Services
The CISM committee describes the basic capabilities and worldwide standards of performance that IT security managers are required to learn. It provides business management the confidence that consultants who have earned their CISM credential possess the background and capability to deliver efficient security management and support services. Progent offers the expertise of CISM qualified security professionals to help companies with:

  • Network Security Strategies
  • Vulnerability Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Recovery Management
Learn more information concerning Progent's CISM Certified Security Consulting Professionals.

CISSP Qualified Security Consulting Expertise
CISSP certification denotes expertise with a worldwide standard for network security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information protection stipulated by ISO 17024. Progent offers access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a variety security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional information concerning Progent's CISSP Information Security Engineering Professionals.

ISSAP Accredited Secure Information System Architecture Engineering Assistance
Progent's ISSAP certified network architecture professionals are consultants who have earned ISSAP status through thorough examination and significant work with network security architecture. The ISSAP certification represents demonstrated competence in the most challenging requirements of information system security architecture within the broader field of information security expertise required for CISSP certification. Progent's ISSAP-qualified security specialists can assist your business with all phases of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Phone System and Network Protection
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Learn more details about Progent's ISSAP Qualified Secure IT Architecture Engineering Expertise.

CISA Qualified Information System Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential has candidates undergo an extensive examination given by the ISACA professional association. Progent's CISA-qualified network security audit experts can help your company with:

  • IS Audit Services
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Business Continuity Planning
Find out more details concerning Progent's CISA Qualified Network Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to verify a consultant's skills to design, implement, and support IS controls to reduce risk. Progent offers the services of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation consultants offer a range of risk evaluation services including:

  • Collect data and study documentation to help identify significant risk scenarios
  • Identify statutory, regulatory, and contractual mandates and company policies related to your network to assess their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your operational workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to ensure your organization understand IT risk so they can contribute to your risk control program
  • Connect key risk scenarios to your associated operational procedures to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and major stakeholders to ensure they match
Get more details concerning Progent's CRISC Experts.

GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security professionals. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge necessary to deliver support in vital categories of system, data, and application program security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit specialists are available to assist your business with:

  • Auditing IT Infrastructure
  • Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Support.

Talk to a Security Expert
To see how to access a Progent security consultant for online or onsite assistance in Massachusetts, call 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.