Small business information networks in Minnesota can depend on quick and affordable remote access to Progent's qualified security experts to resolve the toughest security problems. The cost is competitive, charges are per minute, engagement is immediate, and support is world class. Progent also offers assistance for long-term engagements that requires the expertise of seasoned security consultants with top industry credentials.

In case your Minnesota network is located away from larger urban neighborhoods like Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, the availability of nearby accredited security experts could be limited during a crisis. This can cause a loss of income for your company, angry customers, unproductive workers, and defocused management. By calling Progent's online services, you have access to a certified security professional ready to offer expertise when you have to have it to keep your network operating and recover your data.

Progent can assist you in all your efforts to guard your information system with services ranging from network security checks to developing a comprehensive security strategy. Progent provides economical support to assist small and midsize companies to set up and maintain secure networks based on Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security vendors to provide web-based control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of inspection for inbound email. For outbound email, the onsite gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's security experts are accessible online or on site to offer a range of urgent or project-based computer security services such as:

  • Perform extensive security audits
  • Clean up rapidly after serious security breaches
  • Install hardware and software firewalls
  • Configure safe methods for remote and mobile access
  • Install advanced utilities for protection against viruses, spam and DHAs
  • Help create a company-wide security plan with 24x7 monitoring
  • Offer outsourced Call Center Services
  • Create an effective network backup and disaster recovery plan built around Data Protection Manager (DPM) automated backup technology
If your business has an emergency requirement for computer security help, refer to Progent's Urgent Online Technical Help.

Progent's engineers can deliver advanced services in vital facets of system security including security evaluation, firewalls and VPN, and advanced security planning.

System Evaluation
Progent's expert security engineers can assess the vulnerability of your existing network security implementation through comprehensive remote automated analysis based on advanced utilities and tested techniques. Progent's experience in administering this service saves your company time and money and assures an accurate picture of gaps. The information your business gains can form the foundation of a security plan that can allow your network to operate dependably and respond quickly to future threats.

Automated Security Audits
Progent provides expertise in the use of security evaluation utilities such as Microsoft's MBSA and GFI LANguard NSS for affordably running a set of programmed system testing checks to uncover possible security problems. Progent has broad experience with additional network analysis products such as NMAP, AMAP Application Scanner, eEye, plus utilities such as Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can help you build protection into your company operations, install scanning tools, plan and deploy a protected network architecture, and recommend policies to maximize the safety of your IT system. Progent's security engineers are available to show you how to configure a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn additional information concerning Progent's network security evaluation.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two low-cost security inventory packages designed to allow small businesses to get an independent security evaluation from a certified security consultant. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a system scan from an authorized computer within your firewall to uncover vulnerabilities to internal threats. The two security inventory packages are set up and run from a secured external location. The project is managed by an engineer who has earned high-level security credentials and who produces a report that summarizes and analyzes the data captured by the security scan and proposes cost-effective improvements where called for.

Network Penetration Analysis Support Services
Stealth intrusion testing is a key component of any comprehensive network security plan. Progentís security experts can perform extensive penetration tests without the awareness of your organization's in-house IT resources. Unannounced penetration checking uncovers whether current security defense systems such as intrusion incident warnings and event log monitoring are properly set up and consistently monitored. Learn more concerning Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Support
Progent's background in network security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network technology from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Engineering Services
Cisco's security and offsite access technology represent a comprehensive range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Find out more details concerning Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and choose appropriate products from a variety of suppliers to support your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior machine learning technology to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to address the entire threat progression including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback using Windows VSS and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device management, and web filtering via cutting-edge tools packaged within a single agent managed from a single control. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP deployment that meets your company's unique needs and that allows you achieve and demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent's consultants can also assist you to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid restoration of vital data, apps and VMs that have become unavailable or corrupted as a result of hardware failures, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can deliver advanced support to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical data. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading information security vendors to deliver web-based management and world-class security for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved easily to a different hosting environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can save as much as half of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more about ProSight IT Asset Management service.

Certified Security Design
Any business should develop a thoroughly considered security program that incorporates both pre-attack processes and reaction plans. The pre-attack strategy is a set of mechanisms intended to minimize vulnerabilities. The reactive strategy assists your company's network security engineers to evaluate the impact resulting from a security penetration, repair the damage, document the event, and get business functions restored as quickly as possible.

Progent's expert IS security consultants can to assist you to run a complete risk assessment and create a computer security plan to implement security policies and mechanisms to reduce ongoing attacks and threats.

CISM Qualified Information Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of performance that IT security managers are required to master. CISM provides executive management the confidence that consultants who have earned their CISM credential possess the background and knowledge to provide effective security management and consulting consulting. Progent can provide the support of CISM certified security consultants to assist businesses with:

  • Network Security Processes
  • Vulnerability Management
  • Network Security Program Management
  • IS Security Administration
  • Recovery Planning
Learn additional information concerning Progent's CISM Qualified Network Security Engineering Expertise.

CISSP Accredited Security Consulting Expertise
The CISSP credential recognizes expertise with a global standard for network security. ANSI has awarded certification recognition in the field of data security under ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a variety security areas including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Read additional information concerning Progent's CISSP Information Security Engineering Expertise.

ISSAP Qualified Secure System Architecture Engineering Assistance
Progent's ISSAP certified system architecture engineers are experts who have been awarded ISSAP Certification through rigorous testing and extensive experience with network security architecture. The ISSAP credential represents proven competence in the more challenging demands of information system security architecture within the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Cryptography Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and DRP
  • Hardware Security
Find out additional details concerning Progent's ISSAP Accredited Secure System Architecture Engineering Services.

CISA Accredited IS Security Auditing Engineering Services
The CISA accreditation is a prestigious qualification that indicates mastery in IS security auditing. Certified by the American National Standards Institute, the CISA credential has candidates pass an extensive test given by the ISACA professional association. Progent's CISA-qualified information security audit experts can assist your company in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Get more information about Progent's CISA Accredited Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to design, implement, and support IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to create and execute a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management experts offer a variety of risk identification services including:

  • Gather data and study documentation to identify significant risk scenarios
  • Identify statutory, industry, and business requirements and organizational standards related to your information system to determine their possible impact on your business goals
  • Point out potential threats for your operational processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
  • Connect key risk scenarios to your associated operational procedures to help determine risk responsibility
  • Determine risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Consulting Expertise
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's mission is to ensure that a certified professional has the knowledge necessary to provide services in vital areas of network, data, and software security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC-qualified IS security audit specialists can help your company with:

Find out more details about Progent's GIAC Information Assurance Support.

Contact a Progent Security Engineer
To see how you can contact a certified Progent security consultant for online or on-premises help in Minnesota, phone 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.