Business computer networks in New Hampshire now have prompt and affordable remote help from Progent's accredited security engineers to assist with the toughest security issues. Rates are competitive, billing is by the minute, engagement is quick, and support is unbeatable. Progent also offers assistance for complex engagements that demand the services of seasoned security consultants with high-level security credentials.

In case your New Hampshire company is far from more populated urban neighborhoods including Manchester, Nashua, or Concord, access to nearby qualified network security engineers may be limited when you have a crisis. This could mean lost revenue for your company, upset clients, unproductive employees, and distracted executives. By calling Progent's remote support, you have access to a qualified security engineer who can offer expertise whenever you need it to keep your system on line and recover your data.

Progent can assist you at any level in your efforts to guard your information system with services that ranges from security checks to creating a company-wide security plan. Progent provides economical service to help companies of any size to set up and manage protected IT environments powered by Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of leading information security vendors to provide centralized control and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter.

Progent's security consultants are available remotely or on premises to offer a variety of emergency or longer-term computer security services which include:

If your network has an urgent requirement for IT security support, refer to Progent's Urgent Remote Technical Support.

Progent's engineers can deliver world-class services in key areas of system security including security evaluation, firewalls and VPN, and high-level security consulting.

System Security Evaluation
Progent's certified security consultants can assess the vulnerability of your current computer security environment by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in this testing saves your company time and money and offers an accurate picture of security holes. The knowledge your company gains can be used as the basis of a network protection plan that will permit your network to run dependably and react rapidly to future risks.

Automated Network Vulnerability Evaluation
Progent offers consulting in the use of security analysis utilities including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a set of automatic system testing scans to uncover possible security holes. Progent has broad experience with additional network analysis utilities including NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can show you how to build security into your company processes, configure scanning applications, define and deploy a protected system architecture, and recommend procedures to optimize the security of your network. Progent's security professionals are available to assist you to configure a firewall, design safe remote access to email and business applications, and integrate VPN. Learn more about Progent's network security analysis.

Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory scanning packages designed to allow small companies to receive an objective security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security expert runs an extensive examination of your IT infrastructure from beyond your company firewall to determine possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from a secure computer inside your company firewall to assess the risk to inside threats. Both security inventory services are configured and executed from a secured remote location. The project is managed by a consultant who has earned top security accreditations and who produces a document that details and interprets the data collected by the scan and proposes cost-effective improvements where appropriate.

Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any serious IT system security strategy. Progent’s security experts can run extensive penetration tests without the awareness of your company's in-house IT staff. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion incident warnings and event history analysis are properly configured and actively checked. Find out additional information about Progent's stealth penetration analysis consulting.

Firewalls and VPN Expertise
Progent's expertise in security solutions includes in-depth field work with leading firewalls and Virtual Private Network (VPN) products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and VPN Engineering Services
Cisco's network security and remote access products offer a comprehensive range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and CCNP certifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Find out additional details concerning Progent's Support Expertise for Cisco Security and VPN Appliances.

Engineering Services for Other Firewall and VPN Solutions
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and choose appropriate products from multiple suppliers to achieve your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology to guard endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to manage the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver economical in-depth security for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, device management, and web filtering via leading-edge technologies incorporated within a single agent accessible from a single console. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that helps you prove compliance with government and industry data protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent's consultants can also assist you to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical files, applications and virtual machines that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide advanced support to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security companies to deliver centralized control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and keeps most threats from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hardware solution without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs or domains. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether you’re planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Consulting
Every business should have a carefully considered security program that includes both proactive processes and response plans. The pre-attack strategy is a collection of steps intended to reduce vulnerabilities. The post-attack strategy helps your security engineers to assess the impact caused by an attack, fix the system, document the event, and get the IT network running as soon as possible.

Progent's certified IS security consultants can to help your company to run a complete risk evaluation and create a company-wide security plan to implement security processes and controls to minimize future attacks and threats.

CISM Qualified System Security Engineering Services
The CISM committee describes the basic competencies and international standards of skill that information security professionals are required to learn. CISM gives business management the assurance that consultants who have qualified for their CISM credential have the experience and capability to deliver efficient security management and consulting services. Progent offers the services of CISM qualified security consultants to help companies with:

  • IS Security Processes
  • Vulnerability Management
  • Network Security Implementation Management
  • Information Security Management
  • Response Management
Learn more details about Progent's CISM IS Security Consulting Expertise.

CISSP Accredited Security Engineering Expertise
The CISSP credential denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data security stipulated by ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Find out more details about Progent's CISSP Qualified Security Consulting Services.

ISSAP Qualified Secure Information System Architecture Engineering Expertise
Progent's ISSAP qualified system architecture professionals are consultants who have been awarded ISSAP status through rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven mastery in the most in-depth requirements of information system security architecture within the broader scope of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security such as.

  • Access Control Systems and Techniques
  • Phone System and Network Infrastructure Security
  • Cryptography Solutions
  • Needs Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Find out additional details about Progent's ISSAP Qualified Secure Information System Architecture Support Services.

CISA Qualified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a prestigious achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit experts are available to help your company with:

  • IS Audit Process
  • Information Technology Administration
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Protecting Data Assets
  • Business Continuity Planning
Find out more details concerning Progent's CISA Accredited Security Auditing Engineering Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's ability to plan, implement, and support information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity plan based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation consultants can provide a variety of risk assessment services including:

  • Gather data and review documentation to identify significant risk scenarios
  • Identify statutory, industry, and business mandates and company policies associated with your network to assess their potential impact on your strategic objectives
  • Identify possible vulnerabilities for your operational workflows to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders understand IS risk so they can assist with your risk management program
  • Match key risk scenarios to your associated operational procedures to help determine risk responsibility
  • Validate risk tolerance with your senior management and major stakeholders to make sure they are in agreement
Find out more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to assure that a certified professional has the skills appropriate to deliver services in critical areas of network, data, and program security. GIAC certifications are recognized by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified information security audit experts can help your IT organization with:

Read more details concerning Progent's GIAC Information Assurance Services.

Talk to a Progent Security Specialist
To see how you can contact a security consultant for remote or on-premises help in New Hampshire, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.