Small business computer networks in Montana now have fast and affordable online access to Progent's accredited network security experts to fix complex security problems. The cost is reasonable, charges are per minute, sign-up is immediate, and service is world class. Progent also provides assistance for complex projects that demand the knowledge of senior security engineers with high-level security certifications.

In case your Montana organization is some distance from more populated urban areas including Billings, Missoula, or Great Falls, the availability of nearby certified network security experts is often limited during a security disaster. This can result in a drop in income for your company, angry clients, idle workers, and distracted management. By utilizing Progent's remote support, you have access to a qualified security consultant ready to provide assistance when you require it to keep your information system running and recover your data.

Progent can assist you in your efforts to defend your information system with support services that ranges from network security checks to creating a comprehensive security plan. Progent offers affordable support to help companies of any size to set up and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX or Linux platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the technology of leading data security companies to provide centralized control and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, DLP, and encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's certified engineers are available remotely or on premises to provide a range of urgent or project-based computer security services which include:

  • Perform extensive security evaluations
  • Recover rapidly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Configure safe solutions for offsite and mobile access
  • Deploy advanced utilities for protection against viruses, spam and DHAs
  • Help create a company-wide security strategy with 24x7 security monitoring
  • Offer comprehensive Help Desk Support
  • Develop a practical data backup and business continuity plan centered on Data Protection Manager (DPM) automated backup capability
If your company has an urgent need for computer security help, refer to Progent's Emergency Remote Network Support.

Progent's security experts can deliver world-class support in key areas of system security that include security assessment, firewall and VPN solutions, and advanced security planning.

System Assessment
Progent's expert security consultants can assess the strength of your current network security environment by performing comprehensive remote automated testing based on sophisticated software tools and proven procedures. Progent's skill in this testing saves you time and money and assures a detailed picture of gaps. The information your company is provided can be used as the foundation of a network protection strategy that can permit your information system to run safely and respond quickly to future risks.

Automated Vulnerability Audits
Progent provides consulting in the use of security evaluation products such as Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a set of programmed system testing scans to identify potential security gaps. Progent has extensive knowledge of additional network auditing products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can show you how to design protection into your business processes, configure scanning applications, plan and implement a protected system architecture, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are able to show you how to set up a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Learn more about Progent's automated security audits.

Security Inventory Service Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to allow small companies to receive an independent security assessment from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security expert administers a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer runs a system scan from a secure machine inside your firewall to assess the risk to internal attacks. Both security inventory packages are configured and executed from a secured remote location. The project is overseen by a consultant who has earned top security accreditations and who produces a report that summarizes and analyzes the information captured by the security scan and suggests practical remediation if called for.

Stealth Penetration Testing Consulting
Stealth penetration checking is a key part of any comprehensive network security plan. Progentís security professionals can perform thorough penetration checks without the awareness of your organization's internal IT resources. Unannounced penetration testing shows whether current security monitoring systems such as intrusion detection alerts and event history monitoring are correctly configured and actively monitored. Find out additional information concerning Progent's network security penetration testing consulting.

Firewall/VPN Solutions
Progent's background in network security technology includes in-depth field work with major firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important industry accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your existing PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote access products offer a full range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Read additional information concerning Progent's Consulting Expertise for Cisco Security and VPN Products.

Support Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and select the right technologies from a variety of suppliers to support your security objectives while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a collection of low-cost, fixed-price monthly managed services intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security platform that incorporates the technology of top information security companies to deliver centralized management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite security gateway device adds a further layer of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to automate the entire threat progression including filtering, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates your backup activities and enables fast restoration of vital files, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as IPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Network Security Planning
Every business ought to have a thoroughly considered security program that includes both proactive processes and response planning. The pre-attack strategy is a collection of mechanisms designed to reduce vulnerabilities. The reactive strategy helps your network security engineers to evaluate the damage caused by a security penetration, fix the damage, record the experience, and get the IT network running as rapidly as feasible.

Progent's expert IS security engineers are available to assist your business to perform a full risk evaluation and define a network security plan to implement security processes and mechanisms to reduce ongoing attacks and dangers.

CISM Qualified Security Engineering Assistance
The CISM organization describes the basic capabilities and international standards of performance that information security professionals are expected to learn. It gives executive management the assurance that consultants who have qualified for their CISM certification possess the experience and capability to provide effective security administration and support services. Progent can provide the services of CISM certified security consultants to help businesses with:

  • Network Security Processes
  • Vulnerability Management
  • Information Security Implementation Management
  • IS Security Management
  • Response Planning
Learn additional details about Progent's CISM Qualified Information Security Support Services.

CISSP Certified Security Engineering Services
CISSP denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the area of data protection stipulated by ISO 17024. Progent offers the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields such as:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Read additional information about Progent's CISSP Accredited Security Engineering Expertise.

ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the more challenging demands of information system security architecture within the wider scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all phases of architecture security such as.

  • Access Control Systems and Methodologies
  • Telecom and Network Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Learn more information about Progent's ISSAP Certified Secure System Architecture Support Expertise.

CISA Accredited Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that signifies mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass a comprehensive examination given by the ISACA professional group. Progent's CISA security audit engineers are available to help your IT organization in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Find out additional details about Progent's CISA Certified Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to validate an IT professional's ability to plan, implement, and support information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk management specialists offer a range of risk evaluation services such as:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory statutory, industry, and business requirements and organizational standards associated with your network to determine their possible impact on your strategic objectives
  • Identify potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness program and conduct seminars to make sure your organization appreciate information system risk so they can assist with your risk management process
  • Connect key risk scenarios to related business procedures to help determine risk ownership
  • Determine risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of network security engineers. GIAC's goal is to verify that a certified professional possesses the knowledge needed to deliver services in important areas of system, information, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified information security audit consultants can help your IT organization in the areas of:

Read additional information about Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Expert
To see how you can get in touch with a certified security engineer for remote or on-premises help in Montana, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.