Company computer networks in the state of Montana can have fast and affordable remote technical support from Progent's qualified network security experts to resolve urgent security problems. The cost is competitive, charges are per minute, engagement is fast, and support is world class. Progent also offers assistance for long-term projects that demand the expertise of seasoned security consultants with top security certifications.

In case your Montana company is based some distance from major urban neighborhoods including Billings, Missoula, or Great Falls, help from local accredited security consultants could be problematic during an emergency. This can result in a loss of income for your business, upset customers, idle employees, and defocused management. By contacting Progent's online services, you can get in touch with a certified security engineer who can provide assistance when you require it to keep your network operating and salvage your data.

Progent can help you in all your initiatives to protect your information system with services that can range from security audits to developing a company-wide security plan. Progent provides economical support to assist companies of any size to configure and maintain safe networks powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security companies to deliver centralized control and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and keeps most threats from reaching your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified consultants are accessible online or on site to offer a range of urgent or longer-term network security services including:

  • Perform extensive network security audits
  • Recuperate promptly after attacks
  • Configure and troubleshoot firewalls
  • Implement secure methods for remote and mobile connectivity
  • Install effective solutions for automatic defense against viruses, spam and directory harvest attacks
  • Help create a company-wide security strategy with round-the-clock security monitoring
  • Provide comprehensive Call Center Services
  • Develop a practical network backup and disaster recovery strategy centered on Microsoft Data Protection Manager technology
If your company has an urgent requirement for computer security help, go to Progent's Emergency Online Network Help.

Progent's consultants offer advanced services in key areas of network protection that include security evaluation, firewall and VPN expertise, and high-level security planning.

System Security Assessment
Progent's expert security consultants can evaluate the effectiveness of your existing computer security environment by performing comprehensive remote automated analysis via advanced utilities and proven procedures. Progent's skill in administering this testing saves your company consulting fees and offers an accurate picture of security holes. The knowledge your business gains can form the basis of a network protection strategy that will allow your information system to run safely and react rapidly to new threats.

Automated Vulnerability Analysis
Progent offers expertise in the application of security testing software such as MBSA and GFI LANguard NSS for affordably running a set of automatic network testing checks to identify possible security vulnerabilities. Progent has broad knowledge of other network analysis tools including NMAP Port Scanner, AMAP application mapper, eEye, plus tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can show you how to build protection into your business processes, configure auditing software, define and deploy a secure network architecture, and suggest procedures to maximize the safety of your network. Progent's security engineers are available to help you set up a firewall, implement secure remote access to email and business applications, and integrate VPN. Learn more about Progent's network security assessment.

Security Inventory Packages for Small Companies
Progent offers two low-cost security inventory scanning bundles designed to enable small businesses to get an independent network security assessment from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized computer inside your company firewall to evaluate the risk to inside threats. Both security inventory services are configured and run from a protected external location. The process is managed by an engineer who has earned high-level security credentials and who generates a report that summarizes and analyzes the information captured by the scan and proposes practical remediation if called for.

Network Security Penetration Analysis Consulting
Stealth penetration testing is a key component of any comprehensive network security plan. Progentís security professionals can perform extensive intrusion tests without the awareness of your company's in-house network support staff. Unannounced penetration checking uncovers whether current security defense systems such as intrusion incident warnings and event history monitoring are correctly configured and actively monitored. Learn additional information concerning Progent's network penetration testing support services.

Firewalls and VPN Support
Progent's expertise in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers who have earned important industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite connection technology provide a complete range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Learn more information about Progent's Engineering Services for Cisco Security Solutions and VPN Appliances.

Consulting Services for Additional Firewall and VPN Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPSec VPN technology from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose appropriate products from multiple vendors to support your security objectives while staying within your spending limits.

Expert Security Consulting
Any company should develop a carefully thought out security program that includes both pre-attack procedures and response planning. The pre-attack plan is a set of steps that help to reduce vulnerabilities. The post-attack strategy helps your security engineers to assess the damage caused by an attack, repair the damage, document the event, and get the IT network operational as quickly as feasible.

Progent's expert information security consultants are available to help your company to perform a full vulnerability assessment and define a company-wide security plan to implement security processes and mechanisms to reduce ongoing attacks and dangers.

CISM Accredited Information Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the basic competencies and global standards of skill that IT security professionals are required to master. It provides business management the assurance that consultants who have qualified for their CISM certification have the background and capability to provide effective security management and consulting consulting. Progent can provide the services of CISM certified security professionals to help businesses with:

  • Network Security Processes
  • Risk Management
  • Network Security Implementation Management
  • Information Security Management
  • Response Management
Find out additional details concerning Progent's CISM Information Security Engineering Professionals.

CISSP Certified Security Engineering Support
CISSP certification denotes expertise with an international standard for information security. The American National Standards Institute has awarded certification accreditation in the area of information protection under ISO 17024. Progent offers access to of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Read additional information concerning Progent's CISSP IS Security Support Professionals.

ISSAP Accredited Secure System Architecture Engineering Support
Progent's ISSAP qualified IT architecture engineers are consultants who have earned ISSAP status as a result of thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the most in-depth demands of IS security architecture within the wider scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture including.

  • Access Control Systems and Techniques
  • Telecommunications and Network Security
  • Data Encryption Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional details concerning Progent's ISSAP Certified Secure Information System Architecture Support Expertise.

CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a globally recognized achievement that indicates mastery in network security audit and control. Certified by ANSI, the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit engineers are available to help your company with:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Learn more details concerning Progent's CISA Certified Information System Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to validate an IT professional's skills to design, implement, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation consultants offer a variety of risk identification services including:

  • Gather information and study documentation to evaluate significant risk scenarios
  • Identify statutory, regulatory, and business requirements and company policies related to your network to assess their potential influence on your business goals
  • Point out possible vulnerabilities for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your organization appreciate IS risk so they can assist with your risk control program
  • Connect key risk vectors to related business procedures to help assign risk responsibility
  • Validate risk appetite with executive leadership and major stakeholders to make sure they are in agreement
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Information System Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to ensure that an accredited professional has the knowledge needed to provide support in critical areas of network, data, and application security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC security audit engineers are available to help your IT organization with:

Learn additional details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Engineer
To see how you can contact a security engineer for online or onsite help in Montana, call 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.