Small business computer networks in Minnesota can depend on prompt and economical online technical support from Progent's qualified network security support specialists to help with the toughest security problems. The cost is competitive, billing is per minute, engagement is fast, and support is unbeatable. Progent also provides assistance for long-term engagements that requires the knowledge of seasoned security engineers with high-level security credentials.

If your Minnesota business is based outside of more populated metropolitan areas such as Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, contact with nearby accredited security experts is often problematic when you have a security disaster. This could mean a drop in productivity for your company, angry clients, unproductive workers, and defocused management. By calling Progent's remote support, you can get in touch with a qualified security consultant who can deliver help whenever you require it to keep your information system operating and restore your data.

Progent can help you at any level in your initiatives to protect your IT environment with support ranging from security audits to developing a company-wide security plan. Progent offers economical support to help small and midsize companies to configure and manage protected IT environments powered by Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the technology of leading information security companies to deliver web-based management and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further level of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified engineers are accessible remotely or on site to provide a range of emergency or longer-term network security services such as:

If your network has an immediate need for IT security support, go to Progent's Emergency Remote Network Support.

Progent's engineers can deliver world-class support in key fields of computer protection including security evaluation, firewalls and VPN, and advanced security consulting.

Security Evaluation
Progent's certified security engineers can evaluate the vulnerability of your current network protection environment through comprehensive remote automated testing based on sophisticated utilities and proven techniques. Progent's experience in administering this service saves you consulting fees and assures an accurate portrayal of weaknesses. The knowledge your company is provided can be used as the basis of a security strategy that will permit your network to run dependably and respond quickly to future risks.

Automated Network Security Analysis
Progent provides consulting in the application of security evaluation utilities such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically performing a set of automatic system testing checks to identify possible security holes. Progent has extensive experience with other security analysis products including NMAP Port Scanner, AMAP, eEye, as well as utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can show you how to build security into your business operations, configure auditing applications, define and deploy a protected system environment, and suggest policies to maximize the security of your network. Progent's security consultants are ready to assist you to configure a firewall, design safe remote access to email and business applications, and install VPN. Learn more about Progent's network security assessment.

Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory scanning packages designed to enable small businesses to get an impartial security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from outside your firewall to determine possible weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized machine within your company firewall to evaluate the risk to internal assaults. Both security inventory services are set up and executed from a protected external location. The process is directed by an engineer who has earned high-level security accreditations and who produces a document that details and analyzes the information collected by the security scan and suggests practical improvements if appropriate.

Stealth Penetration Testing Support Services
Stealth intrusion checking is a key component of any comprehensive network security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your organization's internal IT resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log monitoring are correctly configured and consistently checked. Learn additional information on Progent's network penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and offsite connection products offer a comprehensive line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP certifications who are able to help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Read more details about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and VPN Technology
Progent offers small and mid-size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and choose appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent offers a collection of low-cost, set-price monthly managed services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security vendors to deliver web-based control and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper level of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior machine learning technology to defend endpoints and servers and VMs against new malware assaults like ransomware and email phishing, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to manage the complete malware attack progression including protection, detection, mitigation, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows fast restoration of vital files, applications and VMs that have become unavailable or corrupted as a result of component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver advanced support to set up ProSight Data Protection Services to be compliant with regulatory requirements such as IPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.

Certified Security Design
Any company should have a thoroughly thought out security program that includes both proactive processes and reaction planning. The pre-attack plan is a set of mechanisms designed to minimize vulnerabilities. The reactive plan helps your company's security personnel to evaluate the damage resulting from a security penetration, repair the damage, document the event, and get the IT network restored as quickly as possible.

Progent's certified IS security engineers are available to help your business to perform a full vulnerability assessment and create a computer security strategy to implement security policies and mechanisms to mitigate ongoing attacks and dangers.

CISM Certified Network Security Engineering Assistance
The Certified Information Security Manager (CISM) committee defines the core capabilities and global standards of skill that information security managers are required to master. It gives business management the assurance that those who have qualified for their CISM certification possess the experience and capability to provide efficient security management and support services. Progent offers the services of CISM qualified security consultants to assist companies with:

  • IS Security Processes
  • Risk Management
  • Information Security Program Management
  • IS Security Administration
  • Recovery Planning
Learn additional information concerning Progent's CISM IS Security Engineering Professionals.

CISSP Accredited Security Engineering Services
The CISSP credential denotes expertise with a worldwide standard for information security. The American National Standards Institute has awarded certification recognition in the area of information security stipulated by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Learn more information concerning Progent's CISSP Accredited Information Security Support Professionals.

ISSAP Accredited Secure IT Architecture Engineering Services
Progent's ISSAP certified system architecture engineers are consultants who have earned ISSAP status as a result of thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the most complex demands of information system security architecture bounded by the broader scope of information security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Data Encryption Solutions
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Learn more details about Progent's ISSAP Accredited Secure Network Architecture Consulting Professionals.

CISA Certified Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is an important achievement that signifies expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive examination administered by the ISACA international professional group. Progent's CISA-qualified security audit specialists can help your business in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Planning
Get additional information about Progent's CISA Accredited Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation consultants offer a range of risk assessment services such as:

  • Gather information and study documentation to help identify major vulnerabilities
  • Identify legal, regulatory, and contractual mandates and company standards associated with your information system to determine their possible influence on your business goals
  • Identify potential vulnerabilities for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your organization understand IT risk so they can assist with your risk management process
  • Connect key risk vectors to related operational procedures to help assign risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they are in agreement
Read the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Consulting Support
GIAC was established in 1999 to validate the knowledge of network security professionals. GIAC's mission is to verify that an accredited professional possesses the skills needed to deliver services in important categories of network, data, and software security. GIAC accreditations are recognized by companies and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified network security audit engineers can help your company in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn additional details about Progent's GIAC Information Assurance Services.

Talk to a Certified Security Specialist
To find out how you can get in touch with a certified Progent security engineer for online or onsite assistance in Minnesota, phone 1-800-993-9400 or visit Online Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.