Business networks in the state of Missouri now have quick and economical remote access to Progent's certified security consultants to assist with complex security problems. The cost is affordable, billing is per minute, sign-up is quick, and support is world class. Progent also offers assistance for long-term projects that demand the services of senior security consultants with top security certifications.

In case your Missouri business is based away from more populated metropolitan areas like Kansas City, St. Louis, Springfield, or Independence, access to local accredited network security experts is often limited during an emergency. This can cause a drop in productivity for your company, upset customers, unproductive employees, and distracted management. By contacting Progent, you have access to a qualified security professional who can offer assistance when you require it to keep your computer network running and salvage your information.

Progent can assist you in your efforts to protect your IT environment with support that ranges from security checks to creating a company-wide security strategy. Progent provides affordable support to assist companies of any size to design and manage protected IT environments based on Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to deliver centralized management and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a further level of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter.

Progent's security consultants are available remotely or on site to provide a variety of urgent or longer-term computer security services including:

  • Perform automated network security evaluations
  • Clean up promptly after attacks
  • Set up hardware and software firewalls
  • Configure secure solutions for remote and mobile access
  • Install effective software for protection against viruses, spam and DHAs
  • Develop a comprehensive security strategy with 24x7 monitoring
  • Provide outsourced Call Center Support
  • Help Develop an effective backup and recovery solution centered on Microsoft DPM fault-tolerant technology
If your company has an urgent requirement for IT security help, refer to Progent's Urgent Online Network Support.

Progent's consultants provide world-class support in key fields of system protection including auditing, firewalls and VPN, and advanced security consulting.

System Security Audits
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection implementation by performing exhaustive remote automated testing based on advanced software tools and proven procedures. Progent's experience in this testing saves you money and assures an accurate portrayal of gaps. The information your business gains can form the basis of a network protection strategy that will allow your network to operate safely and respond quickly to future risks.

Automated Network Vulnerability Analysis
Progent provides consulting in the use of security analysis packages such as MBSA and GFI LANguard for economically performing a variety of automatic network testing scans to uncover possible security gaps. Progent has extensive experience with other network auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye, plus tools such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can show you how to design security into your business operations, install auditing tools, plan and implement a protected system architecture, and suggest policies to maximize the security of your network. Progent's security engineers are able to show you how to set up a firewall, design secure remote access to email and business applications, and integrate virtual private network. Find out more on Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation packages intended to enable small companies to receive an objective security assessment from a certified security expert. With Progent's External Security Inventory Scan, an engineer runs a comprehensive test of your network from outside your firewalled perimeter to uncover potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from a secure computer within your company firewall to evaluate your exposure to internal assaults. The two security inventory packages are set up and executed from a protected external site. The process is overseen by a consultant with top security credentials and who produces a report that summarizes and interprets the data captured by the security scan and suggests cost-effective remediation where appropriate.

Stealth Intrusion Analysis Consulting
Stealth intrusion checking is a key part of any comprehensive IT system security plan. Progentís security experts can run thorough intrusion checks without the knowledge of your organization's internal IT staff. Unannounced penetration testing uncovers whether current security defense systems such as intrusion detection warnings and event log analysis are correctly set up and consistently checked. Find out additional information on Progent's network penetration analysis support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in network security solutions encompasses in-depth field work with major firewalls and Virtual Private Network technology from a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote connection technology provide a full range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business objectives. Read more details concerning Progent's Engineering Services for Cisco Security and VPN Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and select appropriate products from a variety of vendors to support your security objectives while staying within your budget restraints.

Certified Security Design
Every business should have a thoroughly considered security program that incorporates both proactive procedures and reaction planning. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The reactive plan assists your IT security personnel to evaluate the impact caused by a security penetration, fix the system, document the experience, and get the IT network operational as quickly as possible.

Progent's certified IT security consultants are available to assist your business to perform a complete risk assessment and create a company-wide security plan to implement security processes and mechanisms to minimize ongoing assaults and dangers.

CISM Accredited Information Security Engineering Services
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of skill that information security managers are expected to master. It gives executive management the assurance that those who have qualified for their CISM certification have the experience and capability to deliver effective security administration and consulting services. Progent offers the services of CISM certified security professionals to assist businesses with:

  • Information Security Governance
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Management
  • Response Management
Read more details about Progent's CISM Certified Security Consulting Services.

CISSP Qualified Security Consulting Services
CISSP certification denotes expertise with an international standard for data security. ANSI has awarded the CISSP credential recognition in the field of information protection under ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Preparedness
Learn more details about Progent's CISSP Qualified IS Security Consulting Professionals.

ISSAP Accredited Secure Network Architecture Consulting Support
Progent's ISSAP qualified IT architecture professionals are experts who have earned ISSAP Certification through rigorous testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most challenging requirements of IS security architecture within the wider scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your business with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Infrastructure Security
  • Cryptography Options
  • Needs Analysis and Security Standards
  • BCP and DRP
  • Physical Security
Read more information concerning Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.

CISA Qualified Network Security Auditing Consulting Services
The Certified Information Systems Auditor accreditation is a prestigious achievement that represents mastery in information system security audit and control. Certified by ANSI, the CISA credential requires that candidates undergo a comprehensive test administered by the ISACA international professional group. Progent's CISA-certified network security audit specialists are available to assist your company with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISA Accredited Network Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to create and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers offer a variety of risk evaluation services including:

  • Gather data and study documentation to identify major risk scenarios
  • Inventory statutory, regulatory, and contractual requirements and company policies associated with your network to determine their potential influence on your strategic goals
  • Identify potential vulnerabilities for your business processes to assist in evaluating your corporate risk
  • Create a risk awareness program and provide training to make sure your organization understand information system risk so they can contribute to your risk control process
  • Match key risk scenarios to your associated operational procedures to help determine risk ownership
  • Validate risk tolerance with executive management and major stakeholders to ensure they are in agreement
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Network Security Engineering Services
GIAC was established in 1999 to certify the skill of information technology security engineers. GIAC's mission is to verify that a certified security consultant has the skills appropriate to deliver support in vital areas of network, data, and program security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC-qualified security audit engineers are available to help your IT organization in the areas of:

Read more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Specialist
To find out how to contact a certified Progent security consultant for online or on-premises support in Missouri, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.