Business IT networks in Nebraska can now get fast and economical online access to Progent's qualified network security experts to fix urgent security issues. Rates are competitive, billing is by the minute, engagement is immediate, and support is world class. Progent also offers help for complex projects that demand the expertise of senior security consultants with high-level industry credentials.

In case your Nebraska organization is located far from major urban areas such as Omaha, Lincoln, Bellevue, or Grand Island, the availability of local certified security experts is often problematic during an urgent situation. This can cause a drop in income for your business, angry clients, idle workers, and defocused management. By contacting Progent's online services, you have access to a certified security professional ready to provide help whenever you have to have it to keep your information system on line and salvage your data.

Progent can assist you in a variety of ways in your efforts to guard your information system with support that can range from network security audits to creating a company-wide security strategy. Progent offers economical support to assist companies of any size to design and maintain protected networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a further layer of analysis for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter.

Progent's security experts are available remotely or in person to offer a range of emergency or longer-term network security services such as:

  • Run comprehensive security audits
  • Recuperate quickly after virus and worm attacks
  • Set up and troubleshoot firewalls
  • Configure safe solutions for remote and mobile connectivity
  • Deploy advanced solutions for automatic defense against viruses, spam and DHAs
  • Help create a company-wide security plan with round-the-clock network monitoring
  • Provide outsourced Help Desk Support
  • Help Create an effective backup and disaster recovery strategy centered on Data Protection Manager technology
If your business has an emergency requirement for computer security help, refer to Progent's Emergency Online Technical Help.

Progent's support professionals offer advanced services in vital fields of computer protection that include analysis, firewall and VPN solutions, and high-level security consulting.

System Audits
Progent's expert security consultants can evaluate the effectiveness of your current computer security implementation through exhaustive remote automated testing via advanced utilities and proven procedures. Progent's skill in this service saves you consulting fees and offers a detailed portrayal of security holes. The knowledge your company is provided can be used as the basis of a security plan that will permit your information system to run safely and react rapidly to future risks.

Automated Security Evaluation
Progent provides expertise in the use of security auditing packages including Microsoft Baseline Security Analyzer and LANguard from GFI for economically running a variety of automatic network testing scans to identify potential security problems. Progent has broad knowledge of additional security auditing utilities such as NMAP Port Scanner, AMAP, eEye, as well as utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can show you how to design security into your company operations, install auditing software, plan and implement a protected network environment, and recommend policies to maximize the safety of your network. Progent's security professionals are able to show you how to configure a firewall, design secure remote access to email and business applications, and install VPN. Learn additional information on Progent's network security audits.

Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory bundles designed to allow small companies to receive an impartial network security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from outside your firewall to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from an authorized computer inside your firewall to assess the risk to inside threats. The two security inventory packages are set up and executed from a secured remote location. The project is directed by an engineer who has earned top security credentials and who generates a report that details and interprets the information captured by the scan and suggests practical improvements where appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion testing is an important part of any comprehensive network security plan. Progentís security experts can run thorough penetration tests without the knowledge of your organization's in-house IT staff. Stealth penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event log monitoring are properly configured and consistently monitored. Find out additional information concerning Progent's network security penetration testing support services.

Firewalls and VPN Support
Progent's expertise in security solutions includes extensive familiarity with leading firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your current PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and VPN Consulting Services
Cisco's security and remote connection technology represent a full line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Find out more information concerning Progent's Support Services for Cisco Security and Virtual Private Network Products.

Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size companies professional support for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security plan and select appropriate products from multiple vendors to support your security goals while staying within your budget restraints.

Expert Network Security Planning
Every business should develop a thoroughly thought out security strategy that incorporates both preventive processes and reaction plans. The pre-attack strategy is a collection of procedures designed to minimize security weaknesses. The reactive plan assists your company's IT security personnel to assess the impact resulting from an attack, repair the system, document the event, and get business functions operational as quickly as possible.

Progent's certified IT security engineers are available to help your business to perform a full vulnerability assessment and create a network security strategy to implement security policies and controls to reduce future assaults and threats.

CISM Certified Security Support Assistance
The CISM organization defines the basic competencies and worldwide standards of skill that information security professionals are required to master. It provides executive management the confidence that those who have earned their CISM credential have the experience and capability to deliver effective security management and support consulting. Progent can provide the expertise of CISM certified security consultants to help businesses with:

  • IS Security Processes
  • Risk Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Management
Learn more details about Progent's CISM IS Security Support Professionals.

CISSP Certified Security Engineering Support
CISSP certification recognizes expertise with an international standard for data security. ANSI has granted the CISSP credential accreditation in the area of information protection under ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Planning
Learn additional information about Progent's CISSP Accredited Security Support Professionals.

ISSAP Qualified Secure IT Architecture Engineering Assistance
Progent's ISSAP qualified IT architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous testing and significant work with network security architecture. The ISSAP certification represents demonstrated mastery in the more complex requirements of information security architecture within the wider scope of information system security knowledge needed for CISSP certification. Progent's ISSAP-qualified security specialists can help your company with all aspects of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional information concerning Progent's ISSAP Accredited Secure System Architecture Consulting Expertise.

CISA Accredited Information System Security Auditing Consulting Support
The CISA credential is a prestigious qualification that signifies mastery in information system security auditing. Accredited by ANSI, the CISA credential requires that candidates undergo an extensive examination given by the ISACA international professional group. Progent's CISA IS security audit specialists can assist your business with:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Information Assets
  • Disaster Recovery Planning
Get additional information concerning Progent's CISA Certified IS Security Auditing Engineering Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's skills to design, implement, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to help you to create and execute a business continuity strategy based on leading practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC network risk mitigation engineers offer a variety of risk assessment services including:

  • Collect information and study documentation to help identify significant risk scenarios
  • Identify statutory, regulatory, and contractual requirements and organizational policies associated with your network to assess their possible influence on your business goals
  • Identify potential vulnerabilities for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to make sure your organization appreciate IT risk so they can contribute to your risk control process
  • Match key risk vectors to your associated operational procedures to help assign risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to make sure they align
Get more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security professionals. GIAC's goal is to assure that an accredited professional possesses the knowledge appropriate to provide support in critical areas of system, data, and application security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent's GIAC IS security audit experts are available to help your company with:

  • Auditing Perimeters
  • Security Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Specialist
To see how to access a security consultant for online or on-premises support in Nebraska, phone 1-800-993-9400 or visit Online Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.