For Small Business Information Networks: Security and Compliance Consulting and Support
Overview of Progent's Security Support Services
Progent's certified computer security engineers offer a wide range of professional services intended to help organizations of all sizes to identify and eliminate security vulnerabilities, defend against security assaults, and recover from the damage caused by a security breach. Progent can provide remote and on premise service and also has developed economical fixed-cost security evaluation packages to complement Progent's regular by-the-minute billing.
Support services delivery alternatives offered by Progent include:
Remote Security Services
Most security issues can be handled online via a mix of phone-based support and remote Internet connections between Progent's Help Desk and a customer's computer system. Progent's Help Desk support group includes security engineers with the experience and technical resources to fix some of the most challenging problems quickly, making your service expenses reasonable and reducing lost productivity. Progent offers standard online security help on a per-minute model without minimum call duration and no additional charges for setup or after hours service. Progent's pricing structure avoids scenarios where simple solutions entail big charges. Progent also offers a number of fixed-price online security and compliance evaluation bundles that provide exceptional value by utilizing Progent's advanced network monitoring software as well as Progent's consulting experience to deliver an objective and thorough analysis of your network vulnerability.
Onsite Security Support Services
For cases where on-site support is needed, Progent can dispatch a field service professional to major cities across the United States within one day to work in conjunction with one of Progent's online security consultants. This method can be an efficient way for delivering both high-level consulting and on-premise technical support to resolve network security crises such as disaster recovery. Progent's certified security consultants are in addition available to assist with jobs that require world-class security specialists to be on site, and Progent's most comprehensive security evaluation packages for enterprises include the participation of a team of certified security experts at your location.
Emergency Security Services
To get fast assistance with critical computer security issues, your business can access professional troubleshooting online from Progent's the security professionals available at Progent's Technical Response Center. Progent's emergency remote security support consultants are ready to provide efficient and economical assistance with security emergencies that are impacting the viability of your information system. Progent's accredited security consultants are certified to provide help for systems based on Microsoft Windows, Linux, Apple Mac, Sun, and major versions of UNIX. Progent's wide range of services addresses firewall expertise, email systems, protected system architecture, and data recovery. Progent's support team has been awarded the industry's most advanced security credentials including CISA and Certified Information Systems Security Professional. Progent also can provide immediate access to online Cisco CCIE network engineers who can deliver world-class support with complex network configuration problems.
Our System Has Been Attacked: What Can We Do?
In case you are currently faced with a security crisis and you have no formal response plan, refer to Progent's Emergency Remote Computer Support to find out how to receive fast assistance. Progent offers online help from skilled engineers and can escalate problems to high-level security specialists if required. Your company does not need to be a current Progent customer to get urgent support for a security breach, but you can sign up as a Progent customer in advance at no cost and your standing as a current client can save precious time when there is an emergency.
Typically, small companies have not created a response procedure in case of a security attack. This is unfortunate, since the damage from a serious security attack can be even more catastrophic for a small company than for a big enterprise. Progent's security engineers can assist your company to design an efficient recovery plan that minimizes the IT system disruption resulting from a security penetration. The formal incident response model promoted by GIAC is Progent's recommended method for responding to a serious security penetration.
Areas of Progent's Security Consulting Expertise
Managing data security plus staying ready for restoring vital data and systems following a successful attack demands an on-going program that entails an array of tools and processes. Progent's certified security experts can assist your business at all levels in your efforts to safeguard your information system, ranging from security audits to creating a comprehensive security program. Key areas covered by Progent's security consultants include Planning and Implementation, Information Recovery and Security Forensics, and Outsourced Protection from E-mail-Borne Threats.
Designing, Implementing, and Testing Secure Environments
Every business ought to have a carefully thought out security plan that incorporates both proactive and responsive activity. The pre-attack strategy is a collection of steps that helps to reduce vulnerabilities. The reactive strategy defines activities to assist IT staff to assess the losses resulting from a breach, repair the damage, document the experience, and restore business activity as quickly as feasible. Progent can advise you how to build protection into your business operations, configure scanning utilities, create and build a safe IT infrastructure, and propose processes and policies to enhance the protection of your information system. Progent's security professionals are available to help you to set up a firewall, design safe remote access to e-mail and data, and configure practical VPN connections. If your company is looking for an affordable way for outsourcing your network security administration, Progent's 24x7 Network Support Options include automated online network tracking and fast response to emergencies.
Data Recovery and Failure Analysis
Progent has skill in recovering systems and servers that have been hacked, are quarantined, or have stopped working because of a security penetration. Progent can help determine the damage caused by the attack, return your company to ordinary functions, and recover information compromised owing to the event. Progent's security specialists can also perform a thorough forensic evaluation by examining activity logs and utilizing other advanced assessment tools. Progent's background with security problems minimizes your downtime and allows Progent to propose effective ways to avoid or mitigate new assaults.
Outsourced Spam Blocking
Progent has teamed with Postini to offer small companies E-Mail Guard, a managed service that intercepts spam and email-borne threats before they are able to breach your network firewall. Learn more about E-Mail Guard Managed Spam and Virus Blocking.
Advanced Security Services Offered by Progent
Progent's veteran engineers can provide world-class expertise in vital facets of computer compliance such as:
Security Vulnerability Evaluation and Security Compliance Testing
Progent provides expertise with security auditing tools such as Microsoft Baseline Security Analyzer and LANguard for conducting a variety of automatic system tests to identify potential security holes. Progent has extensive skills with these utilities and can assist you to analyze assessment reports and react efficiently. Progent's security engineers also can perform web software testing and can conduct objective evaluations of enterprise-wide security to validate your organization's compliance with major global security specifications such as FISMA, NIST, and ISO. In addition, Progent can assess the effectiveness of your wireless protection covering stationary wireless appliances as well as mobile devices. Find out more about Progent's Security Vulnerability Evaluation and Compliance Testing.
Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to allow small businesses to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Checkup, an engineer administers an extensive examination of your network from beyond your firewalled perimeter to determine potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine inside your company firewall to assess your exposure to internal assaults. The two security inventory services are configured and run from a secured external site. The project is managed by an engineer who has earned high-level security accreditations who produces a document that details and interprets the data captured by the scan and suggests practical improvements where appropriate.
Security Vulnerability Evaluation Packages for Large Businesses
Progent's certified security engineers can deliver a selection of set-price security evaluation service bundles designed for enterprises who need to meet security standards required by state regulators or by vendors. Progent's security assessment service packages offer larger businesses a chance to get a professional look at the strength of their protection profile. For each security evaluation bundle, Progent engineers with top security credentials analyze and report on collected data and provide recommendations for efficient remediation. The various network security audit packages include an added-cost option for onsite engineers anywhere in the U.S.
Cisco Network Security, PIX and ASA Firewall, VPN and Aironet Wireless Help
Progent can provide a Cisco Certified Internetwork Expert (CCIE) or certified CCNP to help you to choose, deploy, and maintain Cisco security technology. Progent's Cisco Certified Internetwork Experts and Cisco CCNP experts can provide in-depth technical support for Cisco's entire range of security and VPN devices such as PIX 500 Series Firewalls and ASA 5500 Firewalls, Catalyst Firewall Services Module (FWSM), secure high-speed and IS routers, Aironet wireless access points and bridges, and Catalyst switches. Get additional details concerning Cisco Protection, Virtual Private Network (VPN) and Wireless Help.
Stealth Penetration Testing Services
Stealth penetration testing is a vital technique for allowing businesses to find out how vulnerable their IT environments are to real-world threats by testing how well corporate security procedures and technologies stand up to authorized but unannounced intrusion attempts launched by veteran security specialists using advanced hacking methods. Get additional information about Progent's Stealth Intrusion Testing Services.
Progent's Security Accreditations
Progent's security professionals have been awarded the most respected accreditations offered in the security industry. These certifications require exhaustive examinations and demonstrated work background to guarantee that candidates have mastered a significant body of security information and methodologies and can offer advanced solutions to computer networks of any complexity.
Certified Information Security Manager (CISM) Security Support Expertise
CISM identifies the fundamental competencies and worldwide standards of service that IT security professionals are required to master. CISM provides executive management the confidence that those who have earned their certification have the experience and knowledge to offer effective security administration and consulting support. Progent can offer a CISM expert to assist your organization in critical security areas such as data security governance, vulnerability assessment, data security program control, and crisis response management. Get more details concerning Progent's CISM Security Support Expertise.
Certified Information Systems Security Professionals (CISSP) Security Support Expertise
Progent's CISSP experts are security specialists who have been awarded CISSP accreditation as a result of verified experience, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for information security. ANSI has given the CISSP status official recognition in the field of information security under ISO/IEC 17024. Areas of expertise included within CISSP include security administration practices, security design and models, connection control systems, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning. Read more about Progent's CISSP Consulting Assistance.
Information Systems Security Architecture Professionals (ISSAP) Engineering Services
Progent's ISSAP certified security consultants are experts who have earned ISSAP certification as a result of rigorous testing and significant experience. field experience with information security design. ISSAP security experts have acquired in-depth understanding of access management mechanisms and techniques, phone system and network infrastructure security, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's ISSAP-certified security consultants can assist your business with all aspects of secure network architecture. Learn the details about Progent's ISSAP Certified Protected Network Architecture Engineering Services.
Certified Information Systems Auditor (CISA) Support Expertise
The CISA credential is a recognized achievement that represents expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA professional group. Progent can provide the expertise of a CISA-certified security professional able to assist companies in the areas of information systems audit process, information technology governance, systems and architecture lifecycle, information technology support, protecting data resources, and business continuity planning. Get more details concerning Progent's CISA Consulting Expertise.
Global Information Assurance Certification (GIAC) Support Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to verify that an accredited professional has the knowledge needed to provide services in key categories of system, data, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of certified security engineers for any of the network security capabilities addressed within GIAC accreditation programs such as assessing perimeters, incident handling, traffic analysis, and web application security. Learn more about Progent's GIAC Support Assistance.
Depend on Progent for Network Security Help
If you need computer security expertise, telephone Progent at 800-993-9400 or email Progent at email@example.com.