Company networks in Minnesota now have fast and economical online technical support from Progent's certified network security support specialists to resolve complex security issues. Rates are reasonable, billing is by the minute, engagement is quick, and service is unbeatable. Progent also offers assistance for long-term projects that demand the expertise of senior security engineers with high-level industry certifications.

In case your Minnesota small business is based outside of more populated metropolitan neighborhoods including Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, access to nearby accredited network security consultants is often limited when there's a crisis. This could mean lost income for your business, upset clients, idle employees, and distracted management. By calling Progent's online services, you can get in touch with a certified security consultant ready to provide help when you have to have it to keep your computer network on line and salvage your information.

Progent can help you at any level in your efforts to protect your information system with support that ranges from network security audits to developing a company-wide security strategy. Progent offers economical service to help companies of any size to set up and maintain safe IT environments powered by Microsoft Windows and Cisco technology and that can include computers based on UNIX or Linux operating systems as well as mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security companies to deliver web-based control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's certified engineers are accessible online or on site to offer a range of emergency or project-based network security services such as:

If your company has an urgent need for computer security support, go to Progent's Urgent Remote Technical Support.

Progent's support professionals provide advanced services in key areas of system protection that include security evaluation, firewall/VPN support, and high-level security consulting.

System Security Audits
Progent's expert security engineers can assess the strength of your existing computer protection environment by performing exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's skill in this testing saves your company time and money and assures an objective picture of gaps. The knowledge your business is provided can form the basis of a security strategy that can allow your network to run safely and adapt quickly to new risks.

Automated Network Security Evaluation
Progent offers expertise in the use of security auditing utilities including Microsoft's MBSA and GFI LANguard for affordably running a variety of automatic system testing checks to identify potential security weaknesses. Progent has extensive experience with other network auditing tools such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build protection into your business processes, install auditing software, plan and deploy a protected system architecture, and recommend procedures to maximize the safety of your network. Progent's security professionals are ready to show you how to configure a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn more about Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to allow small companies to get an impartial network security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your network from beyond your company firewall to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from an authorized machine within your company firewall to uncover the risk to inside attacks. Both security inventory services are set up and executed from a protected external site. The project is overseen by a consultant with high-level security accreditations and who generates a report that summarizes and interprets the data captured by the security scan and proposes cost-effective improvements where called for.

Stealth Intrusion Testing Support Services
Stealth penetration checking is an important component of any comprehensive IT system security plan. Progent’s security professionals can perform extensive intrusion tests without the knowledge of your company's internal IT staff. Unannounced penetration checking uncovers whether existing security monitoring systems such as intrusion detection alerts and event log analysis are correctly set up and actively checked. Learn additional information on Progent's stealth penetration testing consulting.

Firewalls and VPN Expertise
Progent's background in security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key networking certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your legacy PIX or Cisco ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and VPN Consulting Expertise
Cisco's network security and offsite connection technology represent a complete range of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who can help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business goals. Find out more details about Progent's Support Services for Cisco Security and Virtual Private Network Products.

Support Services for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security plan and choose appropriate technologies from multiple suppliers to support your security objectives while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior analysis tools to guard endpoints and servers and VMs against modern malware assaults such as ransomware and email phishing, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to address the entire malware attack progression including filtering, detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows VSS and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides firewall protection, penetration alerts, device control, and web filtering through leading-edge technologies incorporated within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your company's unique needs and that allows you demonstrate compliance with legal and industry data security standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent action. Progent can also assist you to set up and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup processes and allows rapid restoration of vital files, applications and VMs that have become lost or damaged as a result of hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide web-based management and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Exchange Server to track and protect internal email that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard data about your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether you’re planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Planning
Any company ought to develop a thoroughly considered security program that includes both proactive processes and response planning. The proactive strategy is a collection of steps intended to minimize security weaknesses. The post-attack plan helps your company's security engineers to assess the damage caused by an attack, fix the network, record the experience, and get business functions running as soon as feasible.

Progent's certified IS security consultants are available to help your company to perform a comprehensive vulnerability evaluation and create a company-wide security strategy to establish security processes and controls to minimize future assaults and dangers.

CISM Accredited Network Security Support Expertise
The Certified Information Security Manager (CISM) organization describes the core capabilities and worldwide standards of performance that information security professionals are required to master. CISM provides executive management the assurance that those who have qualified for their CISM credential have the experience and capability to provide effective security administration and consulting consulting. Progent can provide the services of CISM qualified security professionals to help companies with:

  • Network Security Processes
  • Vulnerability Management
  • Information Security Program Management
  • Information Security Management
  • Recovery Planning
Learn more information concerning Progent's CISM Information Security Engineering Professionals.

CISSP Accredited Security Engineering Services
CISSP denotes expertise with a worldwide standard for information security. ANSI has granted certification recognition in the area of information protection stipulated by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISSP Qualified Information Security Consulting Professionals.

CISSP-ISSAP Qualified Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP certified IT architecture engineers are consultants who have earned ISSAP status as a result of rigorous examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the most complex requirements of IS security architecture bounded by the wider field of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Protection
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and DRP
  • Hardware Security
Find out additional details about Progent's ISSAP Accredited Secure System Architecture Support Professionals.

CISA Certified Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test administered by the ISACA international professional group. Progent's CISA-certified information security audit engineers are available to help your business in the areas of:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Data Assets
  • Business Continuity Planning
Get more details concerning Progent's CISA Accredited Network Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's ability to design, implement, and maintain information system controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and execute a business continuity or disaster recovery plan that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk management engineers offer a variety of risk assessment services including:

  • Gather information and study documentation to identify significant risk scenarios
  • Identify legal, regulatory, and contractual requirements and company policies related to your information system to determine their potential impact on your strategic goals
  • Point out potential threats for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness program and conduct seminars to make sure your organization understand information system risk so they can contribute to your risk management process
  • Match key risk vectors to your associated operational procedures to help determine risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they are in agreement
Read more information about Progent's CRISC Risk Management Experts.

GIAC Accredited Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to certify the skill of information technology security engineers. GIAC's mission is to assure that a certified security consultant possesses the skills appropriate to provide services in important areas of network, data, and software security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC network security audit specialists can assist your business with:

  • Assessing Networks
  • Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Security Expert
To find out how you can contact a certified Progent security engineer for remote or on-premises help in Minnesota, phone 1-800-993-9400 or visit Online Network Help.














© 2002- 2019 Progent Corporation. All rights reserved.