Company IT networks in the state of Missouri can depend on quick and economical remote access to Progent's accredited network security engineers to help with the toughest security issues. The cost is reasonable, billing is by the minute, sign-up is quick, and service is unbeatable. Progent also offers assistance for long-term engagements that requires the expertise of seasoned security engineers with top security credentials.

If your Missouri small business is located far from major metropolitan areas like Kansas City, St. Louis, Springfield, or Independence, help from local accredited network security consultants is often limited when there's a crisis. This could mean a loss of revenue for your business, upset customers, unproductive employees, and defocused management. By contacting Progent, you have access to a qualified security engineer who can offer expertise when you have to have it to keep your system on line and recover your information.

Progent can assist you at any level in your initiatives to defend your IT environment with services that ranges from security checks to creating a comprehensive security strategy. Progent offers economical service to help companies of any size to configure and manage secure networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security vendors to provide web-based control and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a further layer of inspection for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, DLP, and email encryption. The local gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified professionals are available online or on site to offer a range of emergency or project-based computer security services such as:

  • Run extensive network security evaluations
  • Recover promptly after serious security breaches
  • Configure and troubleshoot firewalls
  • Configure secure techniques for offsite and mobile connectivity
  • Deploy advanced solutions for defense against spam and DHAs
  • Develop a company-wide security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Support
  • Help Create a practical backup and disaster recovery strategy centered on Data Protection Manager automated backup technology
If your network has an immediate requirement for IT security support, go to Progent's Emergency Online Network Support.

Progent's consultants provide world-class services in key facets of network security including auditing, firewall/VPN support, and advanced security consulting.

System Evaluation
Progent's certified security engineers can evaluate the effectiveness of your existing computer security implementation by performing exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's skill in administering this service saves your company consulting fees and assures an accurate picture of weaknesses. The information your company gains can make up the basis of a security plan that can permit your network to run dependably and respond rapidly to new threats.

Automated Security Evaluation
Progent provides consulting in the use of security auditing products including MBSA and GFI LANguard NSS for economically running a variety of automatic network auditing scans to identify possible security vulnerabilities. Progent has broad knowledge of additional security auditing utilities such as NMAP, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can help you build security into your business operations, install auditing applications, define and deploy a protected network environment, and recommend policies to maximize the safety of your network. Progent's security professionals are available to show you how to set up a firewall, design safe remote connectivity to email and data, and install VPN. Learn more concerning Progent's automated security analysis.

Security Inventory Scanning Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small businesses to get an objective network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer runs a system scan from an authorized computer within your firewall to evaluate the risk to inside threats. The two security inventory services are set up and run from a protected external site. The process is directed by a consultant who has earned high-level security credentials and who produces a document that details and interprets the data collected by the security scan and suggests practical remediation where appropriate.

Stealth Intrusion Analysis Consulting
Stealth intrusion testing is an important component of any serious network security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your company's internal network support staff. Unannounced penetration testing uncovers whether existing security defense systems such as intrusion detection warnings and event log monitoring are correctly configured and actively checked. Learn additional information about Progent's network security penetration testing consulting.

Firewalls and VPN Support
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned key networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Engineering Services
Cisco's network security and offsite access products offer a full line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's VPN line features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company objectives. Learn more information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.

Engineering Services for Additional Firewall and VPN Technology
Progent offers small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select appropriate technologies from a variety of vendors to support your security objectives while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to provide centralized management and world-class security for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior analysis tools to defend endpoints as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to manage the complete malware attack lifecycle including filtering, infiltration detection, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates your backup processes and enables fast recovery of vital files, applications and VMs that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup.

Certified Network Security Planning
Any company should develop a thoroughly thought out security program that incorporates both proactive processes and response plans. The proactive strategy is a collection of procedures intended to minimize vulnerabilities. The reactive strategy helps your company's security engineers to evaluate the damage caused by a security penetration, repair the network, record the event, and get the IT network operational as rapidly as feasible.

Progent's certified IT security consultants are available to help you to perform a comprehensive vulnerability evaluation and create a network security strategy to establish security policies and mechanisms to minimize ongoing attacks and dangers.

CISM Qualified Information Security Engineering Expertise
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of skill that information security managers are expected to master. CISM provides executive management the confidence that consultants who have qualified for their CISM certification possess the background and knowledge to provide efficient security management and support consulting. Progent can provide the support of CISM certified security professionals to help businesses with:

  • IS Security Strategies
  • Risk Analysis
  • Information Security Program Management
  • Network Security Management
  • Recovery Management
Learn additional details about Progent's CISM Accredited Network Security Support Professionals.

CISSP Certified Security Engineering Services
The CISSP credential recognizes expertise with an international standard for network security. ANSI has granted certification recognition in the field of data protection defined by ISO 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Find out additional details about Progent's CISSP-certified IS Security Support Expertise.

ISSAP Qualified Secure Information System Architecture Consulting Assistance
Progent's ISSAP certified network architecture professionals are consultants who have earned ISSAP status through thorough testing and extensive work with information security architecture. The ISSAP credential represents proven mastery in the more complex requirements of information security architecture within the wider field of IS security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecommunications and System Infrastructure Security
  • Cryptography Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Find out additional details about Progent's ISSAP Accredited Secure IT Architecture Consulting Expertise.

CISA Accredited IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is an important qualification that indicates mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit specialists can help your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Support
  • Safeguarding Information Resources
  • Business Continuity Planning
Read additional information about Progent's CISA Qualified Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and execute a business continuity plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation engineers can provide a range of risk evaluation services such as:

  • Collect data and study documentation to help identify major risk scenarios
  • Identify statutory, industry, and business requirements and company standards associated with your network to determine their possible impact on your strategic goals
  • Identify possible vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness program and conduct seminars to ensure your stakeholders understand information system risk so they can contribute to your risk control process
  • Match key risk scenarios to your associated operational procedures to help determine risk responsibility
  • Validate risk tolerance with executive leadership and key stakeholders to make sure they are in agreement
Find out more information concerning Progent's CRISC Experts.

GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to verify that an accredited security consultant has the knowledge appropriate to provide services in vital areas of network, data, and application security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit engineers can help your business with:

Learn additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Specialist
To see how to get in touch with a Progent security consultant for remote or on-premises assistance in Missouri, call 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.