Small business computer networks in Nebraska now have prompt and affordable online help from Progent's qualified security engineers to resolve critical security problems. The cost is competitive, charges are per minute, sign-up is fast, and service is unbeatable. Progent also offers help for long-term projects that requires the knowledge of seasoned security engineers with high-level security certifications.

In case your Nebraska office is some distance from more populated urban neighborhoods including Omaha, Lincoln, Bellevue, or Grand Island, the availability of nearby qualified security support specialists could be limited during a security disaster. This could mean a loss of income for your business, upset clients, unproductive employees, and distracted executives. By utilizing Progent's remote support, you can get in touch with a certified security professional who can offer help when you need it to get your network running and restore your information.

Progent can assist you in all your initiatives to guard your network with services that can range from security assessments to creating a company-wide security strategy. Progent offers affordable service to help small and midsize companies to design and maintain protected IT environments powered by Windows and Cisco products and that may include computers running UNIX or Linux platforms plus mobile users with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified engineers are available remotely or on site to provide a variety of urgent or project-based network security services such as:

If your business has an urgent need for IT security support, go to Progent's Urgent Remote Technical Support.

Progent's support professionals offer world-class support in vital facets of system security that include security evaluation, firewalls and VPN, and high-level security planning.

System Security Evaluation
Progent's expert security consultants can evaluate the effectiveness of your existing network security implementation by performing comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's skill in administering this service saves you consulting fees and offers a detailed picture of security holes. The knowledge your IT organization is provided can be used as the foundation of a security strategy that will allow your network to operate dependably and respond quickly to new risks.

Automated Vulnerability Analysis
Progent provides expertise in the application of security evaluation utilities including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a set of programmed network testing scans to uncover possible security gaps. Progent has extensive knowledge of other security analysis tools including NMAP, AMAP application mapper, eEye, plus utilities like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can help you design protection into your business operations, configure auditing tools, define and implement a secure system environment, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are able to show you how to configure a firewall, implement safe remote access to email and data, and integrate VPN. Find out more on Progent's automated security analysis.

Security Inventory Packages for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to enable small businesses to get an objective network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from a secure computer inside your firewall to uncover vulnerabilities to inside attacks. Both security inventory packages are configured and executed from a secured external location. The process is managed by a consultant who has earned high-level security credentials and who generates a report that details and analyzes the information captured by the scan and suggests cost-effective improvements where appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion testing is a key part of any comprehensive IT system security strategy. Progent’s security professionals can perform extensive intrusion tests without the awareness of your company's internal IT staff. Stealth penetration checking shows whether existing security defense systems such as intrusion detection warnings and event log analysis are properly set up and actively monitored. Learn more on Progent's stealth penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security technology encompasses in-depth familiarity with leading firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned important industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection products offer a complete range of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Find out additional information about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you create a detailed security strategy and select the right technologies from multiple suppliers to achieve your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely get by legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the complete threat lifecycle including filtering, identification, containment, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools packaged within one agent managed from a unified console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that addresses your organization's specific requirements and that allows you prove compliance with government and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also help your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of vital data, applications and virtual machines that have become unavailable or damaged due to component failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR specialists can provide advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading information security vendors to provide centralized control and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard data related to your network infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you’re making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Learn more about ProSight IT Asset Management service.

Certified Security Consulting
Every business ought to develop a carefully considered security strategy that incorporates both pre-attack procedures and reaction plans. The proactive plan is a collection of procedures intended to reduce vulnerabilities. The post-attack plan assists your company's network security engineers to evaluate the impact caused by an attack, fix the system, record the experience, and get business functions running as quickly as feasible.

Progent's expert IS security consultants are available to help your company to run a comprehensive risk assessment and create a network security plan to implement security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Accredited Information Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the basic capabilities and worldwide standards of skill that IT security professionals are expected to learn. CISM provides business management the assurance that those who have earned their CISM credential possess the background and capability to deliver effective security administration and consulting consulting. Progent can provide the expertise of CISM qualified security professionals to assist companies with:

  • Network Security Governance
  • Vulnerability Management
  • Network Security Program Management
  • IS Security Administration
  • Response Planning
Learn more information concerning Progent's CISM IS Security Consulting Professionals.

CISSP Accredited Security Engineering Services
The CISSP credential denotes expertise with an international standard for network security. The American National Standards Institute has granted certification recognition in the area of data protection under ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecom, Network and Internet Security
  • Disaster Recovery Preparedness
Find out additional information about Progent's CISSP Accredited Information Security Consulting Professionals.

CISSP-ISSAP Qualified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP certified information system architecture professionals are consultants who have earned ISSAP Certification through thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the more in-depth requirements of information security architecture bounded by the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecom and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out additional details about Progent's ISSAP Accredited Secure Information System Architecture Engineering Services.

CISA Accredited Security Auditing Engineering Support
The CISA credential is an important qualification that represents expertise in IS security auditing. Certified by ANSI, the CISA accreditation has consultants pass a comprehensive examination given by the ISACA international professional association. Progent's CISA security audit specialists are available to assist your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Get additional information about Progent's CISA Certified Information System Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's ability to design, deploy, and support information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to create and execute a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-qualified IT risk management experts can provide a range of risk identification services such as:

  • Gather data and study documentation to help identify major vulnerabilities
  • Inventory legal, regulatory, and contractual mandates and organizational standards related to your information system to determine their potential impact on your strategic goals
  • Point out possible threats for your operational workflows to assist in evaluating your corporate risk
  • Develop a risk awareness program and conduct training to make sure your stakeholders understand information system risk so they can assist with your risk management program
  • Match identified risk vectors to your associated operational procedures to help determine risk ownership
  • Validate risk appetite with your senior management and major stakeholders to make sure they align
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Consulting Support
GIAC was established in 1999 to validate the skill of IT security engineers. GIAC's goal is to ensure that a certified security consultant possesses the skills necessary to provide services in important categories of system, information, and program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States NSA. Progent's GIAC-qualified network security audit engineers can assist your IT organization with:

  • Assessing Networks
  • Security Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Engineer
To learn how to contact a Progent security engineer for online or on-premises help in Nebraska, call 1-800-993-9400 or go to Remote Network Support.














© 2002- 2019 Progent Corporation. All rights reserved.