Business computer networks in Massachusetts can now get quick and affordable online access to Progent's certified network security experts to assist with complex security problems. Rates are competitive, charges are by the minute, engagement is immediate, and service is world class. Progent also offers assistance for long-term projects that requires the expertise of seasoned security consultants with high-level industry certifications.

If your Massachusetts organization is located away from larger urban neighborhoods including Boston, Worcester, Springfield, Lowell, or Cambridge, support from local certified security consultants could be problematic when you have an urgent situation. This can result in a drop in revenue for your business, upset clients, idle employees, and defocused management. By calling Progent's online services, you can get in touch with a qualified security engineer ready to offer assistance whenever you have to have it to keep your computer network running and salvage your data.

Progent can assist you in a variety of ways in your initiatives to protect your information system with support services ranging from network security audits to creating a comprehensive security plan. Progent offers affordable support to help businesses of all sizes to configure and maintain protected networks based on Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to provide centralized control and world-class security for your inbound and outbound email. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a further level of inspection for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter.

Progent's security engineers are accessible online or on premises to offer a variety of urgent or longer-term computer security services such as:

If your business has an immediate need for IT security support, go to Progent's Emergency Remote Network Help.

Progent's consultants can deliver world-class services in key fields of system security that include security assessment, firewalls and VPN, and high-level security planning.

Security Evaluation
Progent's certified security consultants can evaluate the strength of your existing network protection implementation through exhaustive remote automated analysis based on advanced software tools and proven techniques. Progent's experience in administering this service saves you money and offers an objective picture of weaknesses. The information your business is provided can be used as the foundation of a security strategy that will permit your network to run dependably and adapt quickly to future risks.

Automated Security Evaluation
Progent offers consulting in the application of security analysis packages such as Microsoft's MBSA and LANguard from GFI for economically performing a set of automatic network testing scans to uncover potential security vulnerabilities. Progent has broad experience with additional security analysis utilities including NMAP Port Scanner, AMAP, eEye, plus tools like SolarWinds, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can show you how to build security into your business processes, install scanning software, define and implement a secure system environment, and suggest procedures to maximize the security of your network. Progent's security professionals are able to help you set up a firewall, implement safe remote connectivity to email and data, and install VPN. Learn additional information concerning Progent's automated security assessment.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory service bundles intended to allow small companies to get an impartial security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, an engineer runs a comprehensive test of your network from beyond your company firewall to determine possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from an authorized machine within your firewall to determine vulnerabilities to internal attacks. The two security inventory services are configured and executed from a protected remote location. The project is managed by a consultant with high-level security accreditations and who generates a report that summarizes and interprets the data captured by the security scan and suggests cost-effective remediation if appropriate.

Stealth Intrusion Testing Support Services
Stealth intrusion testing is a key component of any successful network security plan. Progentís security professionals can perform extensive penetration tests without the awareness of your company's in-house IT resources. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident alerts and event log analysis are correctly configured and actively monitored. Find out more about Progent's stealth penetration testing consulting.

Firewalls and VPN Expertise
Progent's expertise in network security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network technology offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and offsite connection products represent a complete line of manageable security products to help protect your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP qualifications who are able to help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Read additional information concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Products.

Engineering Expertise for Other Firewall and VPN Products
Progent offers small and mid-size companies professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security plan and select appropriate technologies from a variety of suppliers to achieve your security objectives while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security companies to provide centralized management and comprehensive protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email traffic that stays within your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to defend endpoints as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely get by traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to automate the complete threat lifecycle including filtering, identification, mitigation, remediation, and forensics. Top capabilities include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid recovery of critical data, applications and virtual machines that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Backup.

Certified Network Security Design
Any business should develop a carefully considered security program that incorporates both pre-attack procedures and reaction planning. The pre-attack strategy is a collection of procedures that help to reduce security weaknesses. The reactive strategy helps your company's security engineers to evaluate the impact resulting from an attack, repair the system, document the event, and get business functions running as soon as possible.

Progent's certified IT security consultants are available to assist your company to run a comprehensive risk evaluation and create a network security plan to implement security policies and controls to minimize future assaults and threats.

CISM Certified Network Security Support Services
The CISM committee describes the core capabilities and international standards of performance that IT security managers are required to learn. CISM provides business management the assurance that those who have earned their CISM certification possess the background and capability to deliver effective security management and support consulting. Progent offers the expertise of CISM qualified security consultants to help businesses with:

  • IS Security Governance
  • Risk Management
  • Information Security Implementation Management
  • Network Security Administration
  • Recovery Management
Learn more information about Progent's CISM Network Security Consulting Services.

CISSP Qualified Security Engineering Services
The CISSP credential recognizes mastery of an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of data security defined by ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your business in a broad range of security fields including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP Qualified IS Security Engineering Professionals.

ISSAP Accredited Secure Information System Architecture Engineering Expertise
Progent's ISSAP certified network architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the most challenging demands of IS security architecture within the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all phases of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more details about Progent's ISSAP Accredited Secure Information System Architecture Support Professionals.

CISA Certified Network Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that indicates expertise in IS security audit and control. Certified by ANSI, the CISA accreditation has candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA-certified information security audit experts can help your IT organization with:

  • IS Audit Services
  • Information Technology Administration
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Learn additional information about Progent's CISA Qualified Security Auditing Engineering Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's ability to design, implement, and maintain IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers offer a variety of risk evaluation services such as:

  • Collect information and review documentation to evaluate significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and company policies related to your network to assess their potential impact on your business goals
  • Point out possible threats for your business workflows to assist in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to make sure your organization understand IS risk so they can contribute to your risk management process
  • Connect key risk scenarios to your associated business procedures to help determine risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to make sure they match
Read additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Engineering Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to verify that an accredited professional possesses the skills needed to provide services in important categories of network, information, and application software security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC-certified information security audit consultants can assist your company with:

  • Assessing Networks
  • Security Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Services.

Contact a Security Specialist
To find out how to get in touch with a certified security consultant for online or on-premises expertise in Massachusetts, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.