Business computer networks in Minnesota can now get quick and affordable online help from Progent's qualified security consultants to assist with complex security issues. Rates are reasonable, billing is by the minute, sign-up is fast, and support is unbeatable. Progent also offers help for complex projects that requires the knowledge of senior security engineers with high-level security credentials.

In case your Minnesota small business is situated far from larger urban neighborhoods like Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, help from local accredited network security professionals may be limited when there's an urgent situation. This could mean a loss of productivity for your business, upset customers, idle employees, and defocused management. By calling Progent, you have access to a qualified security consultant ready to deliver expertise when you require it to keep your information system on line and recover your information.

Progent can help you in your efforts to defend your IT environment with services ranging from network security audits to developing a company-wide security strategy. Progent offers economical service to assist companies of any size to set up and maintain protected networks based on Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security companies to deliver web-based control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified consultants are available remotely or on site to offer a variety of emergency or project-based IT security services which include:

  • Perform automated network security audits
  • Recover promptly after attacks
  • Configure and troubleshoot firewalls
  • Configure secure methods for remote and mobile connectivity
  • Deploy effective utilities for protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with proactive network monitoring
  • Offer outsourced Help Desk Services
  • Develop a practical backup and business continuity solution based on Microsoft DPM backup/restore capability
If your business has an emergency need for IT security help, go to Progent's Emergency Remote Technical Support.

Progent's engineers can deliver advanced services in key areas of network protection including security assessment, firewall and VPN solutions, and high-level security consulting.

System Assessment
Progent's expert security engineers can assess the effectiveness of your existing network security systems by performing exhaustive remote automated testing based on advanced utilities and proven procedures. Progent's experience in administering this testing saves your company consulting fees and assures a detailed portrayal of weaknesses. The knowledge your company gains can be used as the basis of a network protection plan that will allow your information system to operate safely and respond rapidly to future threats.

Automated Vulnerability Assessment
Progent provides expertise in the use of security auditing software including Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a set of automatic system auditing checks to uncover potential security vulnerabilities. Progent has broad experience with other security analysis tools such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build protection into your company processes, configure auditing software, define and deploy a secure system architecture, and suggest procedures to maximize the safety of your IT system. Progent's security consultants are ready to show you how to configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Find out more on Progent's automated security assessment.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory service bundles designed to allow small businesses to get an independent security assessment from a certified security consultant. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive examination of your network from outside your firewalled perimeter to determine potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a system scan from a secure computer within your firewall to evaluate the risk to internal assaults. The two security inventory services are set up and executed from a secured external location. The process is managed by a consultant with high-level security credentials and who generates a document that details and analyzes the data collected by the security scan and suggests practical remediation if appropriate.

Stealth Penetration Analysis Consulting
Stealth penetration testing is a key component of any successful IT system security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's in-house IT resources. Stealth penetration testing shows whether existing security defense tools such as intrusion detection alerts and event log monitoring are properly set up and consistently checked. Find out more concerning Progent's network penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security solutions includes in-depth field work with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your legacy PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services integration and debugging services.

Cisco Network Security and VPN Consulting Services
Cisco's security and offsite access technology represent a comprehensive range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business objectives. Learn additional details concerning Progent's Engineering Services for Cisco Security Solutions and VPN Appliances.

Engineering Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and choose the right technologies from multiple suppliers to support your security goals while sticking within your spending restraints.

Expert Security Consulting
Any company should have a thoroughly thought out security strategy that incorporates both proactive processes and response plans. The proactive strategy is a collection of steps intended to minimize vulnerabilities. The post-attack plan helps your company's network security engineers to assess the impact caused by a security penetration, fix the network, document the experience, and get the IT network restored as quickly as feasible.

Progent's expert information security consultants are available to assist your business to run a full vulnerability assessment and define a network security strategy to establish security policies and mechanisms to minimize ongoing attacks and dangers.

CISM Accredited Information Security Support Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and worldwide standards of skill that IT security professionals are expected to learn. CISM provides executive management the assurance that consultants who have earned their CISM certification possess the background and capability to deliver efficient security management and consulting services. Progent can provide the services of CISM qualified security consultants to help businesses with:

  • IS Security Governance
  • Risk Analysis
  • IS Security Implementation Management
  • Network Security Administration
  • Response Planning
Learn additional information concerning Progent's CISM Certified Security Engineering Services.

CISSP Certified Security Consulting Services
The CISSP credential denotes expertise with a global standard for information security. The American National Standards Institute has awarded the CISSP credential recognition in the field of data protection stipulated by ISO 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Read additional details about Progent's CISSP Qualified Network Security Consulting Expertise.

ISSAP Qualified Secure System Architecture Consulting Support
Progent's ISSAP certified system architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough testing and extensive work with information security architecture. The ISSAP certification indicates proven mastery in the more complex requirements of IS security architecture within the wider scope of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all phases of secure network architecture including.

  • Access Control Systems and Techniques
  • Telecom and Network Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Guidelines
  • BCP and DRP
  • Physical Security
Learn more details about Progent's ISSAP Certified Secure System Architecture Support Professionals.

CISA Qualified Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a globally recognized achievement that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test administered by the ISACA professional association. Progent's CISA-certified IS security audit specialists can assist your business in the areas of:

  • Information Systems Audit Services
  • IT Administration
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Find out the details concerning Progent's CISA Accredited Network Security Auditing Engineering Assistance.

CRISC Experts
The CRISC certification program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity plan based on industry best practices promoted by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management engineers offer a variety of risk assessment services including:

  • Collect information and review documentation to help identify major vulnerabilities
  • Inventory statutory, industry, and contractual mandates and company standards associated with your network to assess their potential impact on your business objectives
  • Point out possible threats for your operational workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization understand IT risk so they can assist with your risk control process
  • Match identified risk scenarios to related business procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to make sure they match
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Consulting Support
Global Information Assurance Certification was founded in 1999 to validate the skill of network security experts. GIAC's mission is to assure that a certified security consultant has the knowledge necessary to provide support in vital categories of system, data, and application security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the United States NSA. Progent's GIAC security audit specialists can assist your business with:

  • Auditing Security Systems
  • Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Read more information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Engineer
To see how to get in touch with a certified Progent security consultant for remote or onsite help in Minnesota, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.