Business IT networks in the state of Missouri now have quick and economical online technical support from Progent's qualified network security experts to assist with complex security issues. Rates are reasonable, billing is by the minute, engagement is quick, and support is unbeatable. Progent also provides help for complex engagements that demand the knowledge of senior security consultants with top industry certifications.

If your Missouri small business is located away from major metropolitan areas including Kansas City, St. Louis, Springfield, or Independence, help from nearby certified network security consultants could be limited when you have an emergency. This can result in lost productivity for your company, upset clients, idle workers, and defocused management. By contacting Progent's online services, you can get in touch with a certified security professional who can provide help when you need it to keep your system on line and salvage your information.

Progent can assist you in your initiatives to guard your IT environment with services that can range from network security assessments to developing a comprehensive security plan. Progent offers economical support to assist small and midsize companies to set up and manage protected networks based on Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security platform that uses the technology of leading information security vendors to deliver web-based management and world-class protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper layer of analysis for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, DLP, and encryption. The on-premises security gateway can also enable Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.

Progent's security experts are available remotely or in person to offer a range of urgent or project-based network security services including:

If your business has an emergency requirement for IT security help, refer to Progent's Emergency Online Network Support.

Progent's security experts offer world-class support in key fields of network protection including analysis, firewall/VPN support, and high-level security consulting.

System Security Evaluation
Progent's certified security consultants can evaluate the vulnerability of your existing network security environment through comprehensive remote automated analysis via advanced utilities and proven procedures. Progent's experience in this testing saves you money and assures an objective picture of security holes. The information your company is provided can make up the basis of a network protection plan that can permit your network to operate dependably and adapt rapidly to future threats.

Automated Vulnerability Evaluation
Progent offers expertise in the application of security analysis products such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a variety of automatic system auditing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of other security analysis utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can show you how to build security into your company processes, install scanning software, define and deploy a protected network architecture, and recommend procedures to maximize the safety of your network. Progent's security engineers are ready to assist you to set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Find out additional information on Progent's automated security audits.

Security Inventory Service Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages intended to allow small businesses to receive a professional security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from beyond your firewall to uncover potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from an authorized computer inside your company firewall to evaluate your exposure to internal attacks. The two security inventory services are configured and executed from a secured remote site. The project is directed by a consultant who has earned top security accreditations and who produces a document that summarizes and analyzes the data collected by the scan and suggests practical remediation if called for.

Network Intrusion Testing Support Services
Stealth intrusion checking is a key component of any successful network security strategy. Progent’s security professionals can run extensive intrusion tests without the awareness of your company's internal network support staff. Unannounced penetration testing shows whether current security monitoring tools such as intrusion detection warnings and event log monitoring are properly set up and actively monitored. Learn more about Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology includes in-depth field work with leading firewalls and Virtual Private Network (VPN) technology from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key industry certifications such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, optimize, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and remote access technology represent a comprehensive range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business objectives. Read more details concerning Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security plan and choose appropriate products from a variety of vendors to support your security goals while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to manage the entire malware attack lifecycle including filtering, detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows VSS and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer protection for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge technologies incorporated within one agent managed from a single console. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP environment that addresses your company's unique requirements and that helps you demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent action. Progent's consultants can also help you to install and verify a backup and restore system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical data, apps and virtual machines that have become unavailable or damaged as a result of component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to provide centralized control and comprehensive security for your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway device provides a further level of inspection for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and protect information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate as much as 50% of time wasted trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether you’re planning improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Certified Security Design
Any company should develop a carefully considered security program that includes both preventive procedures and reaction planning. The pre-attack strategy is a set of mechanisms intended to reduce security weaknesses. The post-attack plan assists your company's security engineers to evaluate the impact resulting from a security penetration, repair the system, document the event, and get business functions restored as rapidly as possible.

Progent's expert IT security engineers can to assist your business to perform a comprehensive risk evaluation and create a computer security plan to implement security policies and mechanisms to reduce ongoing attacks and dangers.

CISM Accredited Security Engineering Expertise
The Certified Information Security Manager (CISM) organization describes the core competencies and international standards of performance that information security professionals are expected to learn. It gives executive management the confidence that consultants who have earned their CISM certification possess the experience and knowledge to provide efficient security administration and support services. Progent offers the services of CISM certified security professionals to help businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Administration
  • Recovery Planning
Read more details about Progent's CISM Accredited Security Consulting Services.

CISSP Certified Security Consulting Services
The CISSP credential recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information protection defined by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your organization in a variety security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Learn more details concerning Progent's CISSP Accredited Security Consulting Services.

CISSP-ISSAP Accredited Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP status through thorough testing and extensive work with network security architecture. The ISSAP certification represents demonstrated skill in the more complex demands of IS security architecture bounded by the wider scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Security
  • Cryptography Options
  • Needs Evaluation and Security Standards
  • BCP and DRP
  • Physical Security
Find out more details about Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.

CISA Certified Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is an important achievement that represents mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass a comprehensive test given by the ISACA international professional association. Progent's CISA-certified IS security audit experts can assist your business in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Find out more information concerning Progent's CISA Qualified Security Auditing Consulting Assistance.

CRISC Experts
The CRISC certification program was established by ISACA to validate an IT professional's ability to plan, deploy, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to create and execute a workplace continuity plan that follows industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk mitigation engineers can provide a range of risk identification services such as:

  • Gather information and review documentation to help identify major vulnerabilities
  • Identify legal, industry, and contractual requirements and organizational policies associated with your information system to assess their possible influence on your strategic goals
  • Point out potential threats for your operational workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide training to make sure your organization understand information system risk so they can assist with your risk control program
  • Match identified risk vectors to your associated business processes to help determine risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to ensure they are in agreement
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Security Consulting Support
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security engineers. GIAC's goal is to make sure that an accredited security consultant possesses the knowledge needed to deliver services in vital categories of network, information, and software security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC network security audit consultants can help your IT organization in the areas of:

Find out more information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Engineer
To find out how to access a certified Progent security consultant for remote or on-premises support in Missouri, phone 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2019 Progent Corporation. All rights reserved.