Business networks in the state of Massachusetts can have fast and affordable online technical support from Progent's accredited network security support specialists to help with complex security problems. The cost is affordable, charges are by the minute, sign-up is quick, and service is world class. Progent also offers help for long-term projects that demand the knowledge of seasoned security consultants with high-level industry certifications.

If your Massachusetts business is situated away from more populated metropolitan areas like Boston, Worcester, Springfield, Lowell, or Cambridge, support from local certified security engineers is often limited when there's a crisis. This can result in a drop in productivity for your company, angry clients, unproductive workers, and defocused executives. By calling Progent, you have access to a qualified security professional who can offer assistance when you need it to get your information system running and recover your information.

Progent can assist you in a variety of ways in your efforts to defend your network with services that ranges from network security checks to creating a comprehensive security strategy. Progent provides affordable service to assist companies of any size to set up and maintain safe networks powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security vendors to deliver web-based management and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter.

Progent's security consultants are accessible online or on site to provide a range of urgent or project-based network security services which include:

If your business has an urgent need for IT security help, refer to Progent's Urgent Online Network Support.

Progent's security experts can deliver advanced support in vital fields of system protection that include security evaluation, firewall and VPN solutions, and advanced security planning.

System Assessment
Progent's certified security consultants can evaluate the strength of your existing network protection environment through comprehensive remote automated analysis via sophisticated software tools and proven procedures. Progent's skill in this testing saves you consulting fees and offers an objective portrayal of gaps. The information your IT organization gains can be used as the basis of a network protection strategy that can allow your information system to run dependably and respond quickly to new threats.

Automated Vulnerability Audits
Progent provides consulting in the application of security evaluation packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically performing a variety of programmed system testing scans to identify possible security weaknesses. Progent has extensive knowledge of additional network analysis tools including NMAP, AMAP, eEye Vulnerability Scanner, plus utilities like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and react appropriately.

Progent can show you how to build protection into your business processes, install scanning tools, define and deploy a protected system architecture, and recommend procedures to maximize the security of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement secure remote access to email and data, and integrate VPN. Learn additional information on Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory bundles intended to enable small businesses to receive an independent security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from beyond your firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized computer within your company firewall to determine the risk to internal attacks. The two security inventory services are configured and run from a secured remote site. The process is managed by an engineer who has earned high-level security credentials and who produces a document that summarizes and analyzes the information captured by the security scan and suggests practical remediation if appropriate.

Network Intrusion Analysis Consulting
Stealth intrusion testing is an important part of any successful network security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your company's in-house IT staff. Stealth penetration testing shows whether current security monitoring tools such as intrusion detection warnings and event log monitoring are properly set up and consistently checked. Find out more concerning Progent's network penetration testing consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security solutions encompasses in-depth field work with major firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's security and remote connection technology represent a full range of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Read more details concerning Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select the right products from a variety of vendors to support your security objectives while staying within your budget limits.

Certified Network Security Planning
Any company should have a carefully considered security program that includes both pre-attack procedures and reaction plans. The pre-attack plan is a set of steps that help to minimize security weaknesses. The reactive strategy assists your IT security personnel to evaluate the impact resulting from an attack, fix the damage, document the event, and get the IT network restored as soon as feasible.

Progent's certified IS security engineers are available to assist you to perform a comprehensive risk assessment and define a computer security strategy to establish security processes and mechanisms to minimize future assaults and threats.

CISM Qualified Security Support Expertise
The Certified Information Security Manager (CISM) committee describes the basic capabilities and worldwide standards of skill that information security professionals are expected to master. CISM provides business management the confidence that consultants who have qualified for their CISM certification possess the experience and capability to provide effective security management and support services. Progent can provide the support of CISM certified security consultants to assist businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • Network Security Implementation Management
  • Network Security Management
  • Recovery Management
Read additional information concerning Progent's CISM Certified Information Security Support Services.

CISSP Certified Security Engineering Assistance
The CISSP credential denotes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information protection under ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security areas such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Learn additional details concerning Progent's CISSP Accredited Security Support Services.

ISSAP Certified Secure Information System Architecture Consulting Expertise
Progent's ISSAP qualified network architecture engineers are experts who have earned ISSAP status as a result of thorough testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the more complex requirements of information system security architecture bounded by the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Control Systems and Techniques
  • Phone System and Network Security
  • Cryptography Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read additional information concerning Progent's ISSAP Accredited Secure IT Architecture Support Expertise.

CISA Qualified Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination given by the ISACA professional association. Progent's CISA-qualified security audit specialists are available to assist your company in the areas of:

  • Information Systems Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Resources
  • Business Continuity Planning
Get the details about Progent's CISA Certified IS Security Auditing Consulting Support.

CRISC Consultants
The CRISC program was initiated by ISACA to validate an IT professional's ability to plan, deploy, and maintain IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC network risk management specialists can provide a range of risk assessment services including:

  • Collect data and review documentation to identify major vulnerabilities
  • Identify legal, industry, and business mandates and organizational policies associated with your network to assess their potential influence on your strategic objectives
  • Point out possible vulnerabilities for your operational workflows to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
  • Match identified risk scenarios to your associated business processes to help assign risk ownership
  • Determine risk tolerance with executive management and major stakeholders to ensure they are in agreement
Get more details about Progent's CRISC Experts.

GIAC Accredited IS Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security experts. GIAC's goal is to verify that a certified security consultant has the skills appropriate to deliver support in key areas of system, data, and software security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-certified network security audit consultants are available to help your business in the areas of:

  • Assessing Networks
  • Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Specialist
To find out how to contact a certified Progent security consultant for remote or on-premises expertise in Massachusetts, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.