Business IT networks in Nebraska can have quick and economical remote technical support from Progent's qualified network security engineers to assist with the toughest security issues. Rates are affordable, charges are per minute, engagement is fast, and support is unbeatable. Progent also provides help for complex projects that demand the knowledge of seasoned security consultants with high-level industry credentials.

If your Nebraska company is situated far from major metropolitan neighborhoods such as Omaha, Lincoln, Bellevue, or Grand Island, help from nearby accredited security support specialists is often limited during a crisis. This could mean a drop in productivity for your business, upset clients, unproductive workers, and defocused management. By utilizing Progent's online services, you can get in touch with a certified security professional who can deliver assistance when you have to have it to keep your computer network on line and recover your data.

Progent can assist you in your initiatives to guard your IT environment with services ranging from security checks to developing a company-wide security plan. Progent offers economical support to help companies of any size to set up and maintain safe IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to deliver centralized control and world-class protection for your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's security experts are accessible online or on premises to offer a range of urgent or project-based network security services which include:

If your company has an emergency requirement for computer security help, refer to Progent's Urgent Remote Network Support.

Progent's support professionals provide world-class services in key facets of network protection including security assessment, firewalls and VPN, and advanced security planning.

System Assessment
Progent's certified security engineers can assess the strength of your existing computer security environment through comprehensive remote automated testing based on sophisticated utilities and tested procedures. Progent's skill in this testing saves you time and money and assures an objective portrayal of weaknesses. The knowledge your IT organization gains can form the basis of a network protection strategy that can allow your information system to run safely and adapt rapidly to new threats.

Automated Network Security Assessment
Progent provides consulting in the application of security auditing packages including Microsoft's MBSA and LANguard from GFI for economically performing a set of automatic system testing scans to identify possible security weaknesses. Progent has broad experience with other network auditing utilities such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can show you how to design protection into your company operations, configure scanning tools, define and implement a protected network architecture, and recommend policies to optimize the security of your network. Progent's security professionals are available to assist you to set up a firewall, design safe remote connectivity to email and business applications, and install VPN. Learn additional information about Progent's automated security assessment.

Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory service packages designed to enable small companies to get an objective network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to determine potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a system scan from a secure machine inside your firewall to assess vulnerabilities to internal threats. The two security inventory services are configured and run from a secured remote site. The process is overseen by an engineer who has earned high-level security credentials and who generates a report that details and analyzes the data collected by the scan and suggests cost-effective improvements where appropriate.

Network Security Penetration Testing Support Services
Stealth intrusion checking is an important component of any comprehensive IT system security strategy. Progentís security professionals can perform thorough intrusion checks without the knowledge of your organization's in-house network support resources. Unannounced penetration testing shows whether existing security defense systems such as intrusion detection alerts and event history analysis are correctly configured and consistently checked. Find out more concerning Progent's network security penetration testing support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions includes in-depth field work with major firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or Cisco ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and offsite connection products represent a complete range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your business goals. Read more details about Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate technologies from multiple suppliers to achieve your security goals while staying within your spending limits.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior machine learning technology to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily evade traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to automate the complete malware attack lifecycle including blocking, detection, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device management, and web filtering through cutting-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP environment that meets your company's specific needs and that allows you prove compliance with legal and industry data protection regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also assist your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates your backup activities and enables rapid restoration of critical data, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security vendors to deliver web-based management and comprehensive protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a further level of analysis for incoming email. For outbound email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hardware environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard information related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can eliminate up to half of time thrown away trying to find critical information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Any company ought to develop a carefully considered security strategy that includes both proactive procedures and response planning. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive plan helps your company's network security engineers to evaluate the impact resulting from a security penetration, fix the damage, record the event, and get the IT network running as soon as feasible.

Progent's certified IT security engineers are available to assist you to run a complete vulnerability evaluation and create a company-wide security strategy to establish security processes and mechanisms to reduce ongoing attacks and dangers.

CISM Accredited Security Support Services
The CISM organization describes the core competencies and global standards of performance that information security professionals are expected to learn. It gives executive management the assurance that consultants who have qualified for their CISM credential have the background and capability to provide effective security administration and support services. Progent offers the services of CISM qualified security professionals to assist businesses with:

  • Information Security Governance
  • Vulnerability Analysis
  • Network Security Implementation Management
  • IS Security Administration
  • Response Management
Find out additional information concerning Progent's CISM Information Security Engineering Professionals.

CISSP Certified Security Consulting Support
CISSP certification denotes mastery of a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security defined by ISO 17024. Progent can provide the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a variety security areas including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Find out more details concerning Progent's CISSP-certified Security Consulting Expertise.

ISSAP Accredited Secure Information System Architecture Engineering Services
Progent's ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification through rigorous examination and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most challenging requirements of information security architecture bounded by the broader field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Phone System and Network Protection
  • Data Encryption Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional information about Progent's ISSAP Accredited Secure Information System Architecture Engineering Expertise.

CISA Qualified Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a recognized qualification that signifies expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates pass an extensive examination administered by the ISACA professional group. Progent's CISA-qualified security audit experts are available to help your company in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Business Continuity Preparedness
Get the details about Progent's CISA Qualified Network Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC program was initiated by ISACA to verify a consultant's skills to design, implement, and maintain information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a business continuity strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation experts can provide a variety of risk identification services including:

  • Gather data and study documentation to help identify significant vulnerabilities
  • Inventory legal, industry, and business requirements and organizational policies related to your information system to determine their possible influence on your business goals
  • Identify possible threats for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk management program
  • Match identified risk vectors to related business procedures to help determine risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to ensure they are in agreement
Get the details concerning Progent's CRISC Consultants.

GIAC Certified Network Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security professionals. GIAC's goal is to ensure that a certified professional has the skills necessary to deliver services in key areas of network, information, and application security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-certified IS security audit experts are available to help your business with:

Learn more details concerning Progent's GIAC Information Assurance Support.

Talk to a Certified Progent Security Specialist
To learn how to get in touch with a security consultant for online or on-premises support in Nebraska, call 1-800-993-9400 or go to Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.