Company information networks in Nebraska now have quick and affordable online help from Progent's certified network security consultants to resolve complex security issues. Rates are reasonable, charges are per minute, engagement is immediate, and support is unbeatable. Progent also offers help for complex projects that demand the knowledge of seasoned security consultants with top industry certifications.

If your Nebraska organization is situated some distance from major metropolitan neighborhoods including Omaha, Lincoln, Bellevue, or Grand Island, the availability of nearby qualified security professionals is often problematic during an urgent situation. This can cause a drop in revenue for your business, angry clients, idle workers, and distracted executives. By calling Progent's remote support, you have access to a certified security engineer who can offer expertise when you require it to keep your system operating and restore your data.

Progent can help you at any level in your efforts to defend your IT environment with support services that ranges from security audits to creating a comprehensive security plan. Progent provides economical support to assist small and midsize companies to set up and manage safe IT environments based on Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security companies to deliver centralized control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps most threats from making it to your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance adds a further level of inspection for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall.

Progent's certified consultants are accessible remotely or in person to provide a range of emergency or project-based computer security services such as:

If your network has an urgent requirement for IT security support, go to Progent's Urgent Remote Network Support.

Progent's consultants offer advanced services in vital fields of system protection including security evaluation, firewall/VPN support, and advanced security planning.

System Assessment
Progent's certified security engineers can assess the effectiveness of your existing network protection systems through exhaustive remote automated analysis based on sophisticated utilities and proven techniques. Progent's skill in this testing saves your company time and money and offers an objective picture of system vulnerability. The information your IT organization gains can form the foundation of a network protection plan that will permit your information system to run dependably and adapt rapidly to future risks.

Automated Vulnerability Evaluation
Progent provides consulting in the use of security auditing utilities including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a set of automatic system auditing scans to uncover potential security problems. Progent has extensive knowledge of additional network analysis utilities including NMAP, AMAP, eEye, plus tools like Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to build security into your business processes, configure auditing applications, define and deploy a protected system architecture, and suggest policies to maximize the security of your IT system. Progent's security engineers are available to assist you to set up a firewall, design secure remote connectivity to email and data, and install virtual private network. Learn more concerning Progent's automated security assessment.

Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory service packages intended to enable small businesses to get a professional network security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your IT infrastructure from outside your company firewall to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer runs a network scan from an authorized computer within your company firewall to uncover vulnerabilities to inside threats. The two security inventory packages are configured and run from a protected remote site. The process is overseen by a consultant with top security accreditations and who produces a report that summarizes and analyzes the information captured by the scan and suggests practical remediation if appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion testing is an important part of any successful IT system security strategy. Progentís security experts can run extensive penetration checks without the awareness of your organization's internal IT staff. Stealth penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event log analysis are properly configured and actively monitored. Learn more concerning Progent's network security penetration testing support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses extensive field work with major firewalls and VPN technology from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned important industry accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower integration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite connection technology provide a comprehensive line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Find out more information about Progent's Consulting Services for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Other Firewall and VPN Solutions
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose the right technologies from a variety of vendors to support your security goals while staying within your budget restraints.

Progent's Flat-rate Managed Services for Information Security
Progent offers a collection of affordable, fixed-price monthly services designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security companies to provide centralized control and world-class security for all your email traffic. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper level of analysis for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based machine learning technology to defend endpoints as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily get by legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to manage the complete threat progression including blocking, identification, mitigation, remediation, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup processes and enables rapid recovery of vital data, apps and VMs that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR specialists can deliver world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as IPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.

Certified Security Consulting
Every company ought to have a carefully considered security program that includes both preventive processes and reaction plans. The proactive strategy is a set of procedures intended to reduce vulnerabilities. The reactive strategy assists your security personnel to assess the damage caused by an attack, fix the system, record the event, and get the IT network restored as soon as feasible.

Progent's expert IS security engineers are available to assist your company to perform a full vulnerability assessment and create a network security plan to implement security policies and mechanisms to minimize future assaults and threats.

CISM Certified Security Engineering Assistance
The CISM organization defines the basic capabilities and international standards of skill that IT security professionals are required to master. It gives executive management the assurance that consultants who have earned their CISM credential possess the experience and capability to provide efficient security administration and support consulting. Progent offers the expertise of CISM certified security professionals to assist companies with:

  • Network Security Governance
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Management
  • Recovery Management
Find out additional details concerning Progent's CISM Certified Information Security Support Professionals.

CISSP Accredited Security Engineering Services
CISSP denotes mastery of a global standard for network security. ANSI has granted certification accreditation in the area of data security under ISO 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security fields including:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Learn more information about Progent's CISSP-certified Information Security Support Expertise.

ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's ISSAP certified IT architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous testing and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the more in-depth requirements of information system security architecture bounded by the broader scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your business with all phases of secure network architecture including.

  • Access Management Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Learn additional details concerning Progent's ISSAP Accredited Secure IT Architecture Consulting Services.

CISA Qualified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that indicates expertise in IS security audit and control. Accredited by ANSI, the CISA credential requires that candidates pass a comprehensive examination administered by the ISACA international professional association. Progent's CISA network security audit consultants can assist your IT organization with:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Assets
  • Business Continuity Preparedness
Learn more details about Progent's CISA Certified IS Security Auditing Engineering Expertise.

CRISC Consultants
The CRISC certification program was initiated by ISACA to verify an IT professional's skills to design, deploy, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity strategy based on leading practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation specialists can provide a variety of risk evaluation services such as:

  • Collect information and review documentation to identify major risk scenarios
  • Identify legal, regulatory, and business mandates and organizational standards associated with your information system to determine their potential impact on your strategic goals
  • Point out potential threats for your operational processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IT risk so they can assist with your risk control process
  • Match identified risk scenarios to related operational procedures to help assign risk responsibility
  • Validate risk tolerance with your senior management and key stakeholders to make sure they are in agreement
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security engineers. GIAC's goal is to verify that an accredited security consultant has the knowledge necessary to deliver support in critical categories of network, data, and application security. GIAC certifications are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified security audit experts are available to assist your business in the areas of:

  • Auditing IT Infrastructure
  • Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Learn additional details about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Engineer
To learn how to access a security consultant for remote or onsite support in Nebraska, phone 1-800-993-9400 or visit Online Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.