Small business networks in the state of Montana can have quick and economical online help from Progent's accredited network security professionals to resolve critical security issues. The cost is competitive, charges are by the minute, engagement is immediate, and service is world class. Progent also offers help for complex engagements that requires the expertise of seasoned security consultants with top industry certifications.

In case your Montana business is some distance from major urban neighborhoods like Billings, Missoula, or Great Falls, help from nearby certified network security experts could be limited when you have an urgent situation. This can result in a drop in productivity for your business, angry customers, unproductive employees, and defocused management. By calling Progent, you have access to a qualified security consultant ready to provide help when you require it to keep your network on line and restore your information.

Progent can help you in a variety of ways in your initiatives to defend your IT environment with support services that can range from security assessments to creating a company-wide security strategy. Progent offers affordable support to help companies of any size to design and manage secure networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that uses the technology of leading information security companies to deliver web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's certified engineers are available online or in person to offer a variety of emergency or project-based computer security services such as:

  • Perform comprehensive network security audits
  • Recuperate rapidly after virus and worm attacks
  • Install firewalls from multiple vendors
  • Configure safe methods for remote and mobile access
  • Install advanced solutions for automatic defense against viruses, spam and DHAs
  • Help create a comprehensive security plan with round-the-clock security monitoring
  • Provide comprehensive Help Desk Support
  • Help Develop a practical backup and business continuity strategy built around Data Protection Manager (DPM) technology
If your company has an emergency requirement for computer security help, go to Progent's Urgent Remote Technical Support.

Progent's support professionals offer world-class services in key areas of system protection that include security assessment, firewall/VPN support, and high-level security planning.

Security Assessment
Progent's certified security consultants can assess the strength of your current network security systems by performing exhaustive remote automated testing via advanced utilities and tested techniques. Progent's skill in this service saves your company time and money and offers an objective portrayal of system vulnerability. The knowledge your IT organization gains can be used as the basis of a network protection plan that can allow your network to run safely and react quickly to future risks.

Automated Network Security Analysis
Progent provides consulting in the use of security analysis packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably performing a set of programmed network auditing checks to uncover potential security vulnerabilities. Progent has broad knowledge of other network analysis tools including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities like Metasploit, Hydra, and Nikto. Progent can help you to make sense of testing reports and react effectively.

Progent can show you how to design protection into your business operations, install scanning applications, plan and deploy a secure system architecture, and recommend procedures to maximize the security of your IT system. Progent's security engineers are able to show you how to configure a firewall, implement safe remote access to email and business applications, and install virtual private network. Learn additional information about Progent's automated security analysis.

Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory packages intended to enable small businesses to receive an independent network security evaluation from a qualified security engineer. With Progent's External Security Inventory Scan, an engineer runs an extensive examination of your IT infrastructure from beyond your firewalled perimeter to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer runs a network scan from a secure computer within your firewall to determine the risk to internal threats. The two security inventory services are configured and run from a protected external location. The project is overseen by an engineer with high-level security credentials and who generates a report that summarizes and interprets the data captured by the scan and proposes cost-effective improvements where called for.

Network Security Penetration Testing Support Services
Stealth intrusion testing is an important component of any successful IT system security plan. Progentís security professionals can perform thorough intrusion checks without the awareness of your company's internal network support staff. Unannounced penetration checking uncovers whether current security defense tools such as intrusion incident alerts and event log monitoring are correctly configured and consistently checked. Learn more concerning Progent's stealth penetration testing support services.

Firewall/VPN Solutions
Progent's background in network security technology includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with key networking accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote connection technology represent a complete range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Learn additional information about Progent's Consulting Services for Cisco Security and Virtual Private Network Products.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and choose the right products from multiple suppliers to support your security goals while staying within your spending restraints.

Certified Security Planning
Every company should have a carefully considered security strategy that includes both preventive processes and response plans. The proactive plan is a collection of steps designed to reduce vulnerabilities. The post-attack plan assists your company's IT security engineers to assess the damage resulting from a security penetration, fix the system, record the experience, and get business functions restored as soon as possible.

Progent's expert IT security engineers are available to assist you to perform a comprehensive vulnerability assessment and create a computer security plan to implement security processes and mechanisms to reduce future attacks and dangers.

CISM Qualified Network Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the core competencies and worldwide standards of performance that information security managers are expected to learn. CISM gives business management the confidence that consultants who have earned their CISM certification possess the experience and knowledge to deliver efficient security management and consulting services. Progent offers the services of CISM qualified security professionals to assist companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Response Planning
Find out more details about Progent's CISM Certified Network Security Consulting Services.

CISSP Accredited Security Consulting Services
CISSP recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security defined by ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISSP Qualified IS Security Consulting Services.

ISSAP Qualified Secure Information System Architecture Engineering Support
Progent's ISSAP qualified IT architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough testing and significant work with network security design. The ISSAP certification indicates demonstrated mastery in the more challenging demands of information system security architecture within the broader scope of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional information concerning Progent's ISSAP Accredited Secure IT Architecture Consulting Services.

CISA Qualified Information System Security Auditing Engineering Assistance
The CISA credential is a globally recognized qualification that indicates expertise in network security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates pass an extensive examination administered by the ISACA international professional association. Progent's CISA information security audit experts are available to help your IT organization with:

  • Information Systems Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Find out more information concerning Progent's CISA Qualified IS Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify a consultant's skills to plan, deploy, and maintain information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and execute a business continuity plan that follows leading practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants offer a range of risk identification services including:

  • Gather information and review documentation to identify major risk scenarios
  • Inventory statutory, industry, and business mandates and organizational policies associated with your network to determine their potential impact on your strategic objectives
  • Point out potential threats for your business processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk control program
  • Match identified risk vectors to related business processes to help determine risk ownership
  • Validate risk appetite with executive management and key stakeholders to ensure they are in agreement
Read additional information concerning Progent's CRISC Experts.

GIAC Certified Network Security Consulting Support
GIAC was founded in 1999 to certify the knowledge of network security professionals. GIAC's goal is to ensure that an accredited professional possesses the skills needed to provide support in vital areas of network, information, and software security. GIAC certifications are acknowledged by businesses and institutions around the world including and the United States NSA. Progent's GIAC security audit engineers are available to help your business with:

Learn more information concerning Progent's GIAC Information Assurance Services.

Talk to a Progent Security Engineer
To find out how you can get in touch with a security consultant for remote or onsite help in Montana, phone 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.