Company information networks in the state of Missouri can have quick and affordable remote access to Progent's accredited security support specialists to assist with the toughest security problems. Rates are competitive, billing is per minute, sign-up is fast, and support is world class. Progent also offers assistance for complex engagements that requires the services of seasoned security consultants with high-level industry credentials.

If your Missouri office is located far from larger urban areas including Kansas City, St. Louis, Springfield, or Independence, support from local qualified security professionals is often problematic during a security disaster. This can result in lost productivity for your company, angry customers, idle workers, and distracted management. By calling Progent's online services, you can get in touch with a qualified security engineer who can deliver help whenever you need it to keep your system on line and restore your information.

Progent can assist you at any level in your initiatives to defend your network with support services ranging from network security audits to developing a company-wide security strategy. Progent offers economical support to assist small and midsize companies to set up and manage secure networks based on Microsoft Windows and Cisco technology and that may include servers and desktops running UNIX or Linux operating systems plus mobile users with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to deliver web-based management and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a further level of analysis for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter.

Progent's security professionals are available remotely or on site to offer a range of urgent or longer-term IT security services such as:

If your company has an emergency requirement for IT security help, go to Progent's Urgent Online Technical Help.

Progent's consultants provide world-class support in key areas of system protection including security evaluation, firewalls and VPN, and high-level security planning.

System Assessment
Progent's expert security consultants can assess the vulnerability of your current network security systems by performing comprehensive remote automated analysis via advanced software tools and tested techniques. Progent's experience in this testing saves your company money and assures an objective picture of system vulnerability. The information your IT organization is provided can be used as the foundation of a network protection plan that can allow your information system to operate safely and react rapidly to new risks.

Automated Vulnerability Evaluation
Progent provides consulting in the application of security evaluation packages including Microsoft's MBSA and GFI LANguard NSS for affordably performing a variety of automatic system auditing scans to uncover possible security problems. Progent has broad knowledge of additional security auditing products such as NMAP, AMAP Application Scanner, eEye, as well as tools such as Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to design protection into your business operations, configure scanning applications, define and deploy a protected network architecture, and recommend procedures to maximize the safety of your network. Progent's security consultants are able to help you configure a firewall, design safe remote access to email and business applications, and install virtual private network. Learn more concerning Progent's network security assessment.

Security Inventory Bundles for Small Companies
Progent offers two ultra-affordable security inventory service packages designed to allow small businesses to get an independent security evaluation from a certified security engineer. With Progent's External Security Inventory Checkup, a security engineer runs an extensive examination of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from an authorized machine inside your company firewall to determine the risk to internal attacks. Both security inventory services are set up and executed from a protected external location. The project is managed by an engineer with top security accreditations and who generates a report that details and analyzes the information collected by the security scan and suggests practical remediation where appropriate.

Network Intrusion Testing Consulting
Stealth penetration testing is a key component of any successful IT system security strategy. Progentís security experts can run extensive penetration tests without the awareness of your organization's in-house IT resources. Unannounced penetration testing shows whether existing security defense systems such as intrusion detection warnings and event history analysis are correctly configured and consistently monitored. Learn more on Progent's stealth penetration testing consulting.

Firewalls and VPN Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of engineers who have earned important industry accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your legacy PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Support Services
Cisco's network security and offsite access technology represent a complete line of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business objectives. Learn more details concerning Progent's Consulting Services for Cisco Security Technology and VPN Appliances.

Consulting Expertise for Other Firewall and VPN Technology
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select the right products from a variety of suppliers to achieve your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top information security vendors to deliver centralized management and comprehensive security for your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway device adds a further layer of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes next generation behavior machine learning technology to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-based AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to automate the entire threat lifecycle including protection, identification, mitigation, remediation, and forensics. Key features include single-click rollback with Windows VSS and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical files, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can save as much as 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Every company ought to develop a thoroughly thought out security strategy that includes both preventive procedures and reaction planning. The pre-attack strategy is a set of procedures that help to reduce security weaknesses. The reactive strategy assists your company's IT security personnel to assess the damage caused by an attack, repair the damage, record the event, and get the IT network running as rapidly as feasible.

Progent's expert IS security consultants can to assist your company to run a complete risk evaluation and define a network security strategy to implement security processes and controls to minimize future assaults and threats.

CISM Accredited Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of skill that IT security professionals are required to master. It provides executive management the assurance that consultants who have earned their CISM credential possess the background and knowledge to provide efficient security administration and support consulting. Progent offers the support of CISM qualified security professionals to assist businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Management
Find out additional information concerning Progent's CISM Certified Network Security Consulting Expertise.

CISSP Certified Security Consulting Support
CISSP denotes mastery of a worldwide standard for data security. ANSI has granted the CISSP credential accreditation in the field of information security stipulated by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security areas including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Read additional details concerning Progent's CISSP Security Consulting Professionals.

ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's ISSAP certified system architecture engineers are experts who have been awarded ISSAP Certification as a result of thorough testing and extensive work with network security design. The ISSAP credential represents demonstrated mastery in the more complex requirements of IS security architecture within the broader field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your business with all phases of architecture security such as.

  • Access Control Systems and Techniques
  • Telecommunications and Network Protection
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Read more information concerning Progent's ISSAP Certified Secure Network Architecture Consulting Expertise.

CISA Certified Information System Security Auditing Engineering Assistance
The CISA accreditation is a prestigious qualification that represents mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-certified security audit experts can assist your business with:

  • IS Audit Process
  • IT Enforcement
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Information Assets
  • Business Continuity Planning
Get more details concerning Progent's CISA Accredited Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC IT risk mitigation engineers offer a variety of risk assessment services including:

  • Collect information and review documentation to identify major vulnerabilities
  • Inventory statutory, industry, and contractual requirements and organizational policies associated with your information system to determine their possible influence on your strategic goals
  • Identify potential threats for your operational workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your organization appreciate IT risk so they can contribute to your risk management process
  • Match identified risk vectors to your associated business processes to help determine risk responsibility
  • Determine risk tolerance with your senior leadership and major stakeholders to ensure they are in agreement
Read additional information about Progent's CRISC Consultants.

GIAC Certified Security Engineering Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security experts. GIAC's goal is to make sure that a certified security consultant has the knowledge appropriate to deliver services in important areas of network, data, and application security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit experts can assist your business with:

  • Assessing Security Systems
  • Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Specialist
To learn how to get in touch with a certified security consultant for remote or on-premises help in Missouri, call 1-800-993-9400 or visit Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.