Company computer networks in the state of New Hampshire can have quick and affordable remote help from Progent's certified security experts to assist with critical security problems. Rates are reasonable, charges are per minute, engagement is quick, and service is world class. Progent also provides help for long-term projects that requires the expertise of seasoned security consultants with top security certifications.

In case your New Hampshire office is based some distance from major metropolitan neighborhoods such as Manchester, Nashua, or Concord, the availability of local certified network security support specialists could be limited when there's a security disaster. This can result in lost productivity for your company, angry clients, unproductive workers, and defocused management. By utilizing Progent, you have access to a certified security consultant ready to deliver help whenever you need it to get your system running and restore your information.

Progent can assist you in a variety of ways in your initiatives to defend your network with support services that ranges from network security assessments to creating a company-wide security plan. Progent provides economical support to help small and midsize companies to design and manage secure networks based on Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to provide centralized control and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's security experts are accessible remotely or in person to offer a range of emergency or project-based network security services such as:

  • Perform thorough network security audits
  • Clean up quickly after attacks
  • Set up and troubleshoot firewalls
  • Configure safe techniques for offsite and mobile access
  • Install effective solutions for automatic defense against viruses, spam and DHAs
  • Develop a company-wide security strategy with proactive monitoring
  • Provide outsourced Help Desk Call Center Services
  • Help Develop an effective data backup and restore plan based on Microsoft DPM backup/restore capability
If your network has an emergency requirement for IT security help, go to Progent's Urgent Online Technical Support.

Progent's support professionals offer advanced services in vital areas of computer protection that include analysis, firewall/VPN support, and advanced security consulting.

System Security Audits
Progent's certified security engineers can evaluate the vulnerability of your existing computer protection environment by performing comprehensive remote automated testing via sophisticated software tools and proven techniques. Progent's skill in administering this service saves you money and offers an objective portrayal of gaps. The information your IT organization is provided can form the foundation of a network protection strategy that will permit your network to run dependably and respond rapidly to future risks.

Automated Network Security Assessment
Progent provides expertise in the application of security evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a variety of programmed system testing scans to uncover potential security vulnerabilities. Progent has extensive knowledge of other security analysis tools such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you design security into your company processes, configure auditing applications, define and deploy a secure network environment, and recommend policies to optimize the safety of your network. Progent's security engineers are available to help you set up a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Find out additional information concerning Progent's network security analysis.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to get an objective security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from outside your firewall to determine possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from a secure computer within your company firewall to uncover the risk to internal assaults. Both security inventory packages are set up and executed from a secured external site. The process is overseen by an engineer who has earned top security credentials and who generates a report that details and interprets the data captured by the scan and suggests cost-effective remediation if appropriate.

Stealth Intrusion Analysis Consulting
Stealth penetration testing is an important part of any comprehensive IT system security plan. Progentís security experts can run extensive intrusion tests without the knowledge of your organization's internal network support staff. Stealth penetration testing uncovers whether existing security defense systems such as intrusion detection warnings and event log analysis are correctly configured and actively checked. Learn additional information about Progent's network security penetration testing support services.

Firewall/VPN Solutions
Progent's background in network security technology includes in-depth familiarity with leading firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your current PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and remote access technology offer a full line of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business objectives. Read more information concerning Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security strategy and choose the right technologies from a variety of suppliers to support your security objectives while sticking within your budget restraints.

Expert Security Planning
Every business ought to have a carefully thought out security program that incorporates both proactive procedures and response plans. The proactive strategy is a set of procedures designed to reduce vulnerabilities. The post-attack strategy assists your company's security engineers to assess the impact caused by an attack, repair the system, document the experience, and get the IT network running as quickly as feasible.

Progent's certified IS security consultants are available to assist you to run a complete risk evaluation and define a network security plan to establish security processes and mechanisms to reduce future assaults and dangers.

CISM Certified Information Security Consulting Assistance
The CISM organization defines the basic capabilities and worldwide standards of performance that information security professionals are expected to master. It gives business management the confidence that consultants who have qualified for their CISM certification possess the experience and capability to provide effective security administration and consulting consulting. Progent offers the expertise of CISM qualified security consultants to help businesses with:

  • Information Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • Information Security Administration
  • Recovery Management
Learn more information about Progent's CISM Accredited Information Security Engineering Professionals.

CISSP Qualified Security Engineering Support
CISSP denotes mastery of an international standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data security defined by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP-certified Security Support Services.

ISSAP Certified Secure System Architecture Engineering Services
Progent's ISSAP certified IT architecture professionals are consultants who have been awarded ISSAP status through thorough testing and extensive experience with network security architecture. The ISSAP certification represents proven skill in the most complex demands of information system security architecture within the wider scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and DRP
  • Hardware Security
Read more information concerning Progent's ISSAP Qualified Secure IT Architecture Support Professionals.

CISA Accredited IS Security Auditing Engineering Services
The Certified Information Systems Auditor credential is an important qualification that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit engineers can assist your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Safeguarding Information Resources
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Qualified IS Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, deploy, and maintain IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation consultants offer a variety of risk identification services such as:

  • Collect data and review documentation to identify significant risk scenarios
  • Identify statutory, regulatory, and contractual requirements and company policies related to your network to determine their potential impact on your business goals
  • Point out potential threats for your business processes to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct training to make sure your organization understand IT risk so they can contribute to your risk management process
  • Match key risk scenarios to related operational procedures to help determine risk responsibility
  • Determine risk appetite with executive leadership and major stakeholders to make sure they align
Find out more information about Progent's CRISC Experts.

GIAC Accredited Information System Security Engineering Services
GIAC was established in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to ensure that a certified security consultant possesses the skills necessary to provide services in critical categories of network, information, and software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified security audit experts can help your business with:

Read more details about Progent's GIAC Information Assurance Support.

Talk to a Security Engineer
To learn how to contact a security engineer for remote or on-premises assistance in New Hampshire, phone 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.