Small business IT networks in Montana can have quick and affordable online help from Progent's qualified security engineers to assist with complex security issues. The cost is competitive, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also offers assistance for long-term engagements that demand the knowledge of senior security engineers with high-level security certifications.

In case your Montana network is based outside of major metropolitan areas such as Billings, Missoula, or Great Falls, support from local certified security professionals is often limited during a crisis. This can result in a loss of revenue for your business, upset clients, unproductive workers, and distracted management. By contacting Progent, you can get in touch with a certified security professional who can deliver expertise whenever you require it to get your network running and salvage your data.

Progent can help you in your initiatives to protect your network with support services that ranges from network security audits to creating a company-wide security strategy. Progent provides economical service to assist small and midsize companies to design and maintain protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter.

Progent's certified engineers are available online or on premises to provide a range of urgent or longer-term computer security services including:

If your business has an urgent requirement for computer security support, refer to Progent's Urgent Remote Network Support.

Progent's support professionals provide advanced support in key areas of computer security that include security evaluation, firewall/VPN support, and high-level security consulting.

System Security Evaluation
Progent's expert security consultants can assess the strength of your current computer security systems by performing comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's experience in this testing saves you money and assures an accurate picture of system vulnerability. The knowledge your business gains can be used as the foundation of a security plan that can allow your information system to run dependably and adapt rapidly to future threats.

Automated Security Analysis
Progent offers consulting in the application of security evaluation software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a variety of programmed system auditing scans to uncover potential security holes. Progent has broad knowledge of other network auditing products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can show you how to build protection into your business operations, install auditing tools, define and deploy a secure network environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are available to assist you to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Find out additional information concerning Progent's automated security audits.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles intended to allow small businesses to receive an impartial network security assessment from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your network from beyond your firewalled perimeter to uncover potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from an authorized machine within your firewall to uncover your exposure to internal assaults. The two security inventory services are set up and run from a protected remote location. The project is overseen by a consultant with top security credentials and who generates a report that summarizes and analyzes the data captured by the security scan and suggests practical remediation where appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration testing is a key component of any serious network security strategy. Progentís security experts can run extensive intrusion tests without the knowledge of your organization's in-house network support staff. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection alerts and event history analysis are correctly set up and consistently checked. Learn more concerning Progent's network security penetration testing consulting.

Firewalls and VPN Support
Progent's expertise in security solutions encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Security and Virtual Private Network Consulting Services
Cisco's network security and remote connection products offer a comprehensive range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and CCNP certifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company goals. Find out additional information concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose the right products from multiple suppliers to support your security objectives while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top data security vendors to deliver centralized control and comprehensive security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of analysis for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the complete threat progression including blocking, detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates your backup activities and enables fast restoration of vital files, apps and VMs that have become lost or corrupted due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can save up to half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require when you need it. Learn more about ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to develop a carefully thought out security program that incorporates both proactive procedures and response planning. The pre-attack plan is a collection of procedures that help to minimize security weaknesses. The reactive strategy helps your company's network security engineers to evaluate the impact resulting from a security penetration, fix the network, document the event, and get business functions operational as soon as feasible.

Progent's expert information security consultants can to help your company to run a full vulnerability assessment and create a company-wide security strategy to establish security processes and mechanisms to mitigate ongoing attacks and dangers.

CISM Accredited System Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic competencies and global standards of skill that IT security professionals are required to learn. It gives business management the confidence that consultants who have earned their CISM certification have the experience and capability to deliver effective security administration and consulting consulting. Progent offers the expertise of CISM certified security professionals to help companies with:

  • Network Security Processes
  • Risk Analysis
  • Network Security Program Management
  • IS Security Administration
  • Response Management
Find out more details about Progent's CISM Certified IS Security Consulting Expertise.

CISSP Qualified Security Engineering Expertise
The CISSP credential recognizes mastery of an international standard for network security. ANSI has awarded the CISSP credential accreditation in the field of information security stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Read more information concerning Progent's CISSP Qualified Information Security Engineering Professionals.

ISSAP Certified Secure System Architecture Engineering Expertise
Progent's ISSAP certified network architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more complex requirements of information security architecture bounded by the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all aspects of architecture security including.

  • Access Control Systems and Techniques
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Site Security
Find out more information concerning Progent's ISSAP Certified Secure System Architecture Engineering Expertise.

CISA Accredited Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that represents expertise in IS security auditing. Certified by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive test given by the ISACA professional group. Progent's CISA information security audit engineers can assist your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • IT Support
  • Protecting Data Assets
  • Business Continuity Preparedness
Read additional information about Progent's CISA Accredited Information System Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA in 2010 to verify an IT professional's ability to design, deploy, and support information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management specialists can provide a range of risk assessment services such as:

  • Collect data and review documentation to identify major vulnerabilities
  • Identify statutory, industry, and business mandates and organizational policies associated with your information system to assess their potential influence on your strategic goals
  • Identify potential vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct seminars to make sure your stakeholders understand IS risk so they can contribute to your risk management program
  • Connect key risk scenarios to related business procedures to help determine risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they are in agreement
Learn the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of information technology security engineers. GIAC's goal is to make sure that a certified professional has the knowledge needed to deliver services in important categories of system, data, and application security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit engineers can help your business with:

Find out additional details about Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Expert
To learn how to get in touch with a Progent security consultant for online or onsite support in Montana, call 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.