Company IT networks in Minnesota can now get quick and economical online help from Progent's certified network security engineers to help with complex security issues. Rates are competitive, charges are per minute, sign-up is fast, and support is world class. Progent also offers help for complex engagements that demand the services of seasoned security consultants with high-level security credentials.

In case your Minnesota network is far from more populated urban areas including Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, access to nearby qualified network security engineers may be limited when there's an urgent situation. This could mean lost income for your business, upset clients, idle employees, and defocused management. By utilizing Progent's online services, you can get in touch with a certified security engineer ready to provide expertise whenever you need it to get your information system on line and salvage your data.

Progent can assist you in your initiatives to defend your IT environment with support services that ranges from network security audits to developing a comprehensive security strategy. Progent provides economical support to assist small and midsize companies to configure and manage secure IT environments based on Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a further level of analysis for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that stays within your corporate firewall.

Progent's certified professionals are accessible online or on premises to offer a variety of urgent or project-based computer security services which include:

  • Run automated security audits
  • Recuperate promptly after virus and worm attacks
  • Install hardware and software firewalls
  • Implement safe methods for offsite and mobile connectivity
  • Deploy advanced software for defense against viruses, spam and DHAs
  • Help create a comprehensive security strategy with proactive security monitoring
  • Provide comprehensive Call Center Support
  • Help Develop an effective network backup and disaster recovery strategy centered on Data Protection Manager (DPM) backup capability
If your business has an emergency need for computer security support, refer to Progent's Emergency Online Technical Support.

Progent's consultants offer advanced services in key facets of computer protection including security evaluation, firewall and VPN expertise, and advanced security consulting.

Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your current network security environment by performing comprehensive remote automated testing based on advanced utilities and tested techniques. Progent's experience in this testing saves you time and money and offers an objective picture of weaknesses. The knowledge your company gains can make up the foundation of a network protection plan that can allow your information system to run dependably and adapt rapidly to future threats.

Automated Network Security Analysis
Progent offers expertise in the application of security testing products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a set of automatic system auditing scans to uncover possible security weaknesses. Progent has extensive knowledge of other network analysis products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.

Progent can help you build security into your company operations, configure auditing software, define and implement a secure system architecture, and suggest procedures to maximize the security of your IT system. Progent's security engineers are able to help you set up a firewall, implement secure remote access to email and business applications, and install virtual private network. Find out additional information on Progent's automated security evaluation.

Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory service bundles designed to enable small businesses to get an impartial security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, an engineer administers a comprehensive test of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a system scan from a secure machine within your company firewall to uncover the risk to internal assaults. The two security inventory packages are set up and executed from a protected remote site. The process is directed by a consultant with high-level security credentials and who generates a report that summarizes and analyzes the data captured by the security scan and suggests cost-effective improvements where called for.

Stealth Intrusion Testing Consulting
Stealth penetration testing is an important component of any comprehensive network security strategy. Progentís security professionals can run extensive intrusion checks without the awareness of your company's in-house IT resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event history monitoring are correctly configured and actively monitored. Find out additional information on Progent's stealth security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security technology includes in-depth field work with leading firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Consulting Services
Cisco's security and offsite access products represent a comprehensive range of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Learn more details about Progent's Support Services for Cisco Security and VPN Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select the right products from a variety of suppliers to achieve your security objectives while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis tools to guard endpoint devices as well as servers and VMs against modern malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to automate the entire threat progression including protection, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering through leading-edge technologies packaged within a single agent accessible from a unified control. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP environment that addresses your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry information security regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent attention. Progent can also help your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical files, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security vendors to provide web-based management and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard integrates cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most threats from reaching your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be moved easily to an alternate hardware solution without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your network documentation, you can save as much as half of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Certified Security Planning
Every company should develop a thoroughly considered security program that incorporates both preventive processes and reaction planning. The pre-attack plan is a set of procedures that help to reduce vulnerabilities. The post-attack plan helps your company's security personnel to evaluate the damage resulting from an attack, fix the system, record the experience, and get business functions restored as quickly as feasible.

Progent's certified information security engineers can to assist your business to run a comprehensive vulnerability evaluation and define a company-wide security strategy to establish security processes and mechanisms to minimize future attacks and dangers.

CISM Qualified Network Security Consulting Assistance
The CISM organization defines the basic capabilities and global standards of performance that IT security professionals are expected to learn. CISM provides business management the confidence that consultants who have qualified for their CISM certification have the experience and knowledge to provide efficient security administration and support consulting. Progent offers the support of CISM qualified security consultants to assist businesses with:

  • Information Security Strategies
  • Risk Management
  • Information Security Program Management
  • Network Security Management
  • Response Management
Learn more details concerning Progent's CISM Accredited Information Security Consulting Services.

CISSP Accredited Security Consulting Expertise
CISSP denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information protection defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your organization in a broad range of security fields such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Find out more details concerning Progent's CISSP Information Security Support Professionals.

ISSAP Accredited Secure System Architecture Consulting Assistance
Progent's ISSAP qualified system architecture professionals are consultants who have been awarded ISSAP Certification through rigorous testing and extensive experience with information security design. The ISSAP credential represents proven mastery in the more challenging requirements of information security architecture within the wider field of IS security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all aspects of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Security
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and DRP
  • Hardware Security
Read more details about Progent's ISSAP Accredited Secure Network Architecture Consulting Professionals.

CISA Certified Network Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that represents mastery in IS security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants pass an extensive test given by the ISACA international professional association. Progent's CISA-certified network security audit consultants are available to assist your business with:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Read more details concerning Progent's CISA Certified Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to design, implement, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity plan based on leading practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers can provide a range of risk assessment services including:

  • Collect information and review documentation to identify significant risk scenarios
  • Inventory legal, regulatory, and business mandates and organizational standards associated with your network to assess their potential influence on your business goals
  • Identify possible vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct seminars to ensure your organization appreciate IS risk so they can assist with your risk control program
  • Connect identified risk scenarios to related business procedures to help assign risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they match
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of computer security experts. GIAC's mission is to verify that a certified security consultant possesses the skills necessary to provide support in vital categories of system, data, and program security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit specialists can assist your business in the areas of:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional details about Progent's GIAC Information Assurance Services.

Talk to a Progent Security Engineer
To learn how to get in touch with a security engineer for remote or onsite support in Minnesota, phone 1-800-993-9400 or go to Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.