Business information networks in Minnesota now have quick and affordable remote technical support from Progent's qualified security consultants to help with complex security issues. Rates are affordable, charges are per minute, engagement is fast, and support is unbeatable. Progent also provides help for long-term engagements that demand the services of senior security consultants with high-level security credentials.

If your Minnesota company is located some distance from major metropolitan areas like Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, contact with local accredited network security engineers could be limited when you have an urgent situation. This can result in lost income for your business, angry clients, unproductive employees, and defocused management. By contacting Progent, you have access to a certified security engineer ready to offer expertise when you have to have it to get your information system on line and recover your data.

Progent can help you at any level in your initiatives to protect your information system with services that ranges from network security assessments to creating a company-wide security strategy. Progent provides affordable service to help businesses of all sizes to design and manage secure IT environments based on Windows and Cisco technology and that can include computers running UNIX or Linux operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall.

Progent's security engineers are accessible remotely or in person to provide a variety of emergency or project-based network security services which include:

  • Run extensive security evaluations
  • Recuperate rapidly after serious security breaches
  • Set up and troubleshoot firewalls
  • Implement safe techniques for offsite and mobile access
  • Install effective applications for automatic defense against viruses, spam and DHAs
  • Help create a company-wide security plan with proactive security monitoring
  • Offer comprehensive Call Center Support
  • Help Create an effective backup and disaster recovery strategy centered on Data Protection Manager backup/restore capability
If your company has an emergency requirement for computer security support, go to Progent's Urgent Remote Technical Support.

Progent's consultants offer world-class support in key facets of network security including auditing, firewall/VPN support, and advanced security consulting.

System Security Assessment
Progent's certified security engineers can evaluate the strength of your existing network security systems through comprehensive remote automated testing based on advanced utilities and tested procedures. Progent's experience in administering this testing saves your company consulting fees and offers an objective picture of weaknesses. The information your business is provided can form the basis of a security plan that can permit your information system to operate dependably and react rapidly to future risks.

Automated Security Assessment
Progent provides consulting in the use of security analysis utilities such as MBSA and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing checks to uncover possible security gaps. Progent has broad experience with additional network analysis tools such as NMAP, AMAP, eEye, plus utilities such as SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can show you how to design protection into your business processes, configure scanning tools, define and implement a secure network environment, and suggest policies to maximize the security of your IT system. Progent's security professionals are ready to assist you to set up a firewall, design secure remote connectivity to email and business applications, and install VPN. Find out additional information on Progent's network security assessment.

Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small companies to get an impartial network security evaluation from an accredited security specialist. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your network from outside your firewall to determine possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from a secure computer inside your firewall to determine vulnerabilities to internal attacks. The two security inventory packages are set up and executed from a protected remote site. The process is managed by an engineer with high-level security accreditations and who generates a document that details and analyzes the data captured by the scan and proposes cost-effective improvements if appropriate.

Stealth Security Penetration Testing Consulting
Stealth penetration testing is an important component of any successful network security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's in-house network support resources. Unannounced penetration testing shows whether current security monitoring tools such as intrusion detection alerts and event history analysis are properly configured and actively checked. Learn more concerning Progent's network penetration testing consulting.

Firewall/VPN Solutions
Progent's background in network security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers with important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Support Expertise
Cisco's security and offsite access technology provide a complete line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and CCNP certifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company goals. Find out more information concerning Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and VPN Products
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and select appropriate products from a variety of vendors to achieve your security objectives while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security companies to provide centralized control and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily escape traditional signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to address the complete malware attack progression including filtering, infiltration detection, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows rapid restoration of vital files, applications and VMs that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when needed, can help you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup.

Certified Security Consulting
Every company should develop a thoroughly thought out security strategy that incorporates both proactive processes and reaction plans. The proactive strategy is a collection of procedures designed to minimize vulnerabilities. The post-attack strategy helps your company's IT security personnel to evaluate the damage caused by an attack, fix the damage, document the event, and get the IT network restored as rapidly as possible.

Progent's expert IS security engineers can to help your business to run a complete risk evaluation and create a computer security strategy to implement security policies and controls to reduce future attacks and threats.

CISM Accredited Information Security Engineering Services
The CISM organization defines the core capabilities and worldwide standards of skill that information security managers are required to learn. It provides business management the confidence that consultants who have qualified for their CISM certification possess the background and capability to deliver effective security management and consulting consulting. Progent offers the expertise of CISM certified security consultants to help companies with:

  • Network Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Response Management
Find out additional details about Progent's CISM Security Engineering Services.

CISSP Qualified Security Consulting Services
The CISSP credential recognizes expertise with a worldwide standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of data security defined by ISO 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas such as:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Find out additional details about Progent's CISSP Accredited Network Security Engineering Expertise.

ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's ISSAP qualified information system architecture engineers are consultants who have earned ISSAP Certification through rigorous testing and extensive experience with network security design. The ISSAP credential represents demonstrated skill in the most complex demands of information security architecture bounded by the wider field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Find out additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Consulting Services.

CISA Accredited Network Security Auditing Engineering Support
The CISA credential is a recognized achievement that represents mastery in network security auditing. Accredited by ANSI, the CISA credential has candidates pass an extensive test administered by the ISACA professional group. Progent's CISA-qualified IS security audit specialists are available to assist your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Get more information concerning Progent's CISA Accredited IS Security Auditing Consulting Expertise.

CRISC Experts
The CRISC certification program was established by ISACA in 2010 to verify a consultant's ability to design, deploy, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management experts can provide a variety of risk assessment services including:

  • Gather information and review documentation to help identify significant risk scenarios
  • Inventory statutory, industry, and contractual mandates and organizational policies associated with your network to assess their possible influence on your business goals
  • Identify possible vulnerabilities for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders appreciate IT risk so they can contribute to your risk control process
  • Connect key risk scenarios to your associated business procedures to help assign risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to make sure they align
Read additional details concerning Progent's CRISC Experts.

GIAC Accredited Network Security Engineering Services
Global Information Assurance Certification was founded in 1999 to certify the skill of IT security experts. GIAC's goal is to assure that an accredited security consultant possesses the knowledge necessary to provide support in critical areas of network, data, and application software security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC security audit consultants can help your IT organization with:

  • Auditing IT Infrastructure
  • Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Learn additional information about Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To see how you can access a security engineer for remote or onsite assistance in Minnesota, call 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.