Company IT networks in Minnesota can depend on fast and affordable remote access to Progent's qualified security professionals to resolve complex security issues. Rates are affordable, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also offers assistance for complex engagements that demand the knowledge of senior security engineers with top industry credentials.

In case your Minnesota small business is based some distance from more populated metropolitan areas such as Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, access to local certified network security consultants could be problematic when there's a security disaster. This could mean a loss of productivity for your business, angry customers, idle workers, and distracted management. By calling Progent's remote support, you can get in touch with a qualified security engineer who can offer assistance whenever you have to have it to keep your system on line and restore your data.

Progent can help you in your initiatives to guard your information system with services that can range from network security checks to creating a comprehensive security plan. Progent provides economical service to help companies of any size to configure and maintain safe networks based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms plus BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to provide web-based management and comprehensive security for all your email traffic. The hybrid structure of Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper level of analysis for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also enable Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall.

Progent's security consultants are accessible online or on premises to offer a variety of emergency or project-based IT security services which include:

If your network has an emergency requirement for computer security support, go to Progent's Urgent Online Technical Help.

Progent's engineers provide world-class support in key areas of network security including security evaluation, firewalls and VPN, and advanced security planning.

System Security Audits
Progent's certified security consultants can evaluate the strength of your current computer protection environment by performing exhaustive remote automated testing based on sophisticated software tools and proven techniques. Progent's experience in administering this testing saves you money and assures an objective picture of weaknesses. The knowledge your business is provided can form the basis of a security strategy that will allow your network to run safely and react rapidly to future risks.

Automated Network Vulnerability Analysis
Progent offers expertise in the application of security auditing products including Microsoft's MBSA and LANguard from GFI for economically running a variety of programmed system testing scans to uncover potential security vulnerabilities. Progent has extensive experience with additional security analysis products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can help you build protection into your business processes, install auditing applications, plan and implement a protected system architecture, and recommend procedures to optimize the security of your IT system. Progent's security consultants are able to show you how to configure a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Learn more on Progent's automated security assessment.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small businesses to get an objective security evaluation from a certified security expert. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your company firewall to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from a secure computer within your firewall to determine the risk to inside attacks. The two security inventory packages are configured and executed from a secured remote site. The project is managed by an engineer who has earned high-level security credentials and who generates a report that summarizes and analyzes the information collected by the scan and proposes practical remediation if called for.

Network Security Penetration Testing Support Services
Stealth penetration checking is a key component of any comprehensive network security strategy. Progentís security experts can run extensive intrusion tests without the awareness of your organization's in-house IT resources. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion incident alerts and event log analysis are correctly configured and actively monitored. Find out additional information on Progent's network security penetration testing support services.

Firewall and Virtual Private Network Support
Progent's background in security solutions includes extensive field work with major firewalls and VPN products from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to manage your current PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Security and VPN Engineering Services
Cisco's network security and remote access technology represent a complete range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company objectives. Find out more information about Progent's Support Services for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select the right technologies from a variety of suppliers to support your security objectives while staying within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to guard endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to manage the entire threat progression including filtering, detection, containment, remediation, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering via leading-edge technologies packaged within one agent accessible from a single console. Progent's data protection and virtualization consultants can assist your business to plan and configure a ProSight ESP environment that meets your company's specific needs and that helps you prove compliance with legal and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also assist you to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and enables fast restoration of critical data, apps and VMs that have become lost or damaged as a result of component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security companies to provide centralized control and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be moved immediately to a different hosting environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard data about your network infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can eliminate up to 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Find out more about ProSight IT Asset Management service.

Expert Security Design
Any business ought to have a carefully considered security program that includes both pre-attack procedures and reaction planning. The pre-attack strategy is a collection of mechanisms intended to reduce vulnerabilities. The reactive strategy helps your company's IT security engineers to evaluate the damage caused by a security penetration, repair the damage, document the event, and get business functions restored as soon as possible.

Progent's certified IS security engineers are available to assist you to perform a complete vulnerability evaluation and create a computer security plan to establish security policies and controls to mitigate future assaults and threats.

CISM Qualified Security Support Services
The Certified Information Security Manager (CISM) organization describes the basic capabilities and worldwide standards of skill that information security professionals are expected to master. It gives executive management the assurance that those who have qualified for their CISM credential have the experience and capability to deliver effective security administration and support services. Progent offers the services of CISM qualified security consultants to assist businesses with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • Information Security Management
  • Recovery Management
Find out more information about Progent's CISM Certified Network Security Engineering Professionals.

CISSP Certified Security Consulting Services
CISSP denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a variety security areas including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Learn more information about Progent's CISSP-certified Security Consulting Services.

ISSAP Accredited Secure System Architecture Consulting Services
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP Certification through rigorous examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the more complex demands of information security architecture bounded by the broader field of IS security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Learn additional details about Progent's ISSAP Certified Secure System Architecture Consulting Services.

CISA Certified IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a prestigious achievement that represents mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass a comprehensive examination administered by the ISACA professional association. Progent's CISA network security audit engineers can assist your business with:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Information Assets
  • Business Continuity Planning
Learn additional information about Progent's CISA Certified Security Auditing Consulting Services.

CRISC Experts
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and carry out a workplace continuity strategy based on industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants can provide a range of risk assessment services such as:

  • Gather information and review documentation to help identify major vulnerabilities
  • Inventory statutory, industry, and contractual mandates and company standards related to your network to determine their potential impact on your business objectives
  • Point out potential vulnerabilities for your business processes to help in analyzing your corporate risk
  • Create a risk awareness program and conduct training to ensure your organization understand information system risk so they can contribute to your risk control process
  • Match key risk vectors to related business processes to help determine risk responsibility
  • Validate risk tolerance with your senior management and major stakeholders to make sure they match
Find out more details concerning Progent's CRISC Experts.

GIAC Accredited Security Consulting Expertise
GIAC was established in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to verify that an accredited security consultant has the skills needed to provide services in vital categories of system, information, and software security. GIAC accreditations are acknowledged by companies and institutions around the world including and the United States NSA. Progent's GIAC-qualified security audit engineers can help your IT organization with:

  • Auditing Networks
  • Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Security Specialist
To learn how you can get in touch with a security engineer for online or onsite help in Minnesota, phone 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.