Business IT networks in the state of Nebraska can have prompt and affordable online access to Progent's certified security professionals to fix critical security problems. Rates are competitive, charges are by the minute, engagement is fast, and service is unbeatable. Progent also offers assistance for long-term engagements that demand the expertise of senior security consultants with high-level security credentials.

In case your Nebraska network is located away from more populated metropolitan areas like Omaha, Lincoln, Bellevue, or Grand Island, access to nearby accredited network security consultants could be problematic when you have an emergency. This can cause lost revenue for your business, upset customers, idle workers, and defocused executives. By calling Progent's remote support, you can get in touch with a qualified security engineer ready to offer help when you need it to get your computer network on line and recover your data.

Progent can assist you in all your efforts to defend your network with support services that ranges from security assessments to creating a comprehensive security plan. Progent provides economical service to assist businesses of all sizes to configure and maintain secure IT environments based on Windows and Cisco products and that can include computers running UNIX or Linux platforms as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide web-based control and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email that originates and ends within your security perimeter.

Progent's security consultants are available remotely or on premises to provide a variety of emergency or project-based IT security services such as:

If your business has an emergency need for IT security help, refer to Progent's Emergency Remote Network Support.

Progent's consultants offer advanced services in vital fields of network security that include security assessment, firewall and VPN expertise, and advanced security planning.

Security Evaluation
Progent's certified security consultants can evaluate the vulnerability of your current network protection environment by performing comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's skill in this service saves your company time and money and offers an accurate picture of security holes. The information your IT organization gains can be used as the foundation of a security strategy that can permit your network to run safely and respond rapidly to new threats.

Automated Security Evaluation
Progent provides consulting in the application of security testing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically running a variety of programmed network auditing scans to identify potential security gaps. Progent has extensive experience with additional network analysis tools including NMAP Port Scanner, AMAP application mapper, eEye, plus tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can show you how to build security into your company operations, install auditing software, define and deploy a secure network architecture, and suggest procedures to optimize the safety of your IT system. Progent's security engineers are able to help you configure a firewall, design safe remote connectivity to email and business applications, and install VPN. Learn more about Progent's automated security assessment.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages intended to enable small companies to receive an objective security assessment from a certified security expert. With Progent's External Security Inventory Checkup, an engineer administers an extensive examination of your network from beyond your firewall to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from a secure machine inside your company firewall to uncover your exposure to inside threats. Both security inventory services are set up and run from a protected external location. The process is directed by an engineer with high-level security credentials and who produces a document that details and analyzes the data collected by the security scan and proposes cost-effective remediation if called for.

Stealth Intrusion Testing Consulting
Stealth intrusion testing is a key part of any serious IT system security strategy. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's in-house network support resources. Stealth penetration testing uncovers whether current security defense systems such as intrusion detection alerts and event history analysis are properly configured and consistently monitored. Learn more concerning Progent's network security penetration testing support services.

Firewalls and VPN Solutions
Progent's background in network security technology includes extensive field work with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with important networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and VPN Consulting Expertise
Cisco's security and offsite connection technology represent a comprehensive line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who are able to assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Find out more details concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select appropriate products from a variety of suppliers to support your security goals while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security companies to deliver centralized control and world-class security for all your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis tools to guard endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely escape traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to address the complete threat lifecycle including blocking, detection, mitigation, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, applications and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, when needed, can help you to restore your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Network Security Design
Every business ought to develop a carefully thought out security program that includes both preventive processes and response planning. The pre-attack plan is a set of mechanisms that help to reduce security weaknesses. The post-attack strategy helps your security engineers to assess the damage resulting from a security penetration, fix the network, document the event, and get the IT network running as rapidly as feasible.

Progent's certified IT security consultants are available to assist you to perform a complete vulnerability evaluation and create a network security strategy to establish security policies and controls to reduce ongoing attacks and threats.

CISM Accredited System Security Support Assistance
The CISM organization describes the core competencies and international standards of performance that IT security managers are required to learn. CISM provides business management the confidence that those who have earned their CISM certification possess the background and knowledge to deliver efficient security management and consulting services. Progent can provide the support of CISM qualified security professionals to assist companies with:

  • Network Security Processes
  • Risk Management
  • Information Security Implementation Management
  • Network Security Administration
  • Response Planning
Find out more details about Progent's CISM Accredited IS Security Consulting Services.

CISSP Certified Security Consulting Expertise
CISSP recognizes mastery of a global standard for network security. The American National Standards Institute has awarded certification recognition in the area of data protection under ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Find out additional details about Progent's CISSP Accredited Information Security Consulting Professionals.

ISSAP Certified Secure Network Architecture Consulting Expertise
Progent's ISSAP certified IT architecture engineers are experts who have earned ISSAP Certification through thorough examination and significant work with network security design. The ISSAP certification indicates demonstrated mastery in the most complex demands of information security architecture within the broader scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Phone System and Network Infrastructure Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Read additional details about Progent's ISSAP Qualified Secure System Architecture Support Services.

CISA Qualified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that indicates expertise in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive examination administered by the ISACA international professional group. Progent's CISA security audit specialists can help your company with:

  • Information Systems Audit Process
  • Information Technology Administration
  • Systems and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Find out additional details concerning Progent's CISA Qualified Network Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's skills to design, deploy, and maintain information system controls to reduce risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and execute a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers offer a range of risk identification services such as:

  • Collect information and study documentation to help identify major vulnerabilities
  • Inventory statutory, regulatory, and contractual requirements and company standards associated with your network to determine their possible influence on your business objectives
  • Identify possible vulnerabilities for your operational workflows to help in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate IS risk so they can assist with your risk control process
  • Connect key risk vectors to your associated operational procedures to help determine risk responsibility
  • Determine risk appetite with your senior leadership and major stakeholders to ensure they match
Read additional details concerning Progent's CRISC Consultants.

GIAC Qualified Security Engineering Services
GIAC was established in 1999 to validate the skill of network security professionals. GIAC's mission is to assure that a certified professional possesses the knowledge necessary to deliver support in key categories of system, information, and application security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit engineers are available to assist your business with:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Expert
To learn how you can access a certified security engineer for remote or on-premises expertise in Nebraska, call 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.