Business networks in the state of New Hampshire can depend on quick and economical online technical support from Progent's accredited security professionals to help with the toughest security problems. Rates are affordable, charges are by the minute, sign-up is fast, and support is world class. Progent also offers help for long-term projects that demand the knowledge of seasoned security consultants with high-level security certifications.

If your New Hampshire organization is situated some distance from major urban areas like Manchester, Nashua, or Concord, the availability of nearby qualified network security consultants is often limited during a security disaster. This can result in lost income for your business, angry clients, unproductive employees, and defocused management. By utilizing Progent, you have access to a certified security professional ready to offer expertise when you require it to get your computer network running and salvage your data.

Progent can help you in a variety of ways in your initiatives to defend your network with services ranging from network security audits to developing a company-wide security plan. Progent provides economical service to assist small and midsize companies to design and manage safe IT environments based on Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the technology of top data security companies to provide web-based control and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a deeper level of inspection for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified consultants are available online or in person to provide a variety of emergency or project-based network security services such as:

If your network has an urgent need for IT security support, refer to Progent's Emergency Online Network Help.

Progent's consultants provide world-class support in key areas of system security including security assessment, firewalls and VPN, and advanced security planning.

System Assessment
Progent's expert security engineers can evaluate the effectiveness of your existing computer protection environment by performing comprehensive remote automated analysis via sophisticated utilities and tested procedures. Progent's skill in administering this testing saves your company consulting fees and offers a detailed portrayal of gaps. The information your business gains can make up the foundation of a network protection plan that can allow your information system to run dependably and respond rapidly to future threats.

Automated Security Audits
Progent offers consulting in the application of security evaluation utilities such as MBSA and GFI LANguard Network Security Scanner for economically performing a variety of automatic system testing checks to identify potential security holes. Progent has extensive knowledge of other security analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can show you how to build protection into your business operations, install scanning applications, plan and implement a secure network architecture, and recommend policies to optimize the security of your network. Progent's security engineers are able to assist you to configure a firewall, implement safe remote access to email and data, and integrate virtual private network. Find out additional information concerning Progent's network security analysis.

Security Inventory Scanning Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles designed to enable small businesses to receive an independent security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive examination of your network from beyond your firewalled perimeter to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional runs a system scan from a secure machine inside your firewall to uncover the risk to inside attacks. Both security inventory services are configured and executed from a secured external location. The process is directed by a consultant with top security accreditations and who produces a document that details and analyzes the information captured by the scan and suggests practical remediation where called for.

Stealth Penetration Analysis Consulting
Stealth penetration testing is an important component of any comprehensive network security strategy. Progent’s security professionals can run thorough penetration tests without the awareness of your organization's in-house network support staff. Unannounced penetration testing shows whether current security defense systems such as intrusion detection warnings and event log analysis are properly set up and consistently checked. Learn additional information about Progent's stealth security penetration analysis consulting.

Firewall/VPN Support
Progent's background in network security technology includes in-depth familiarity with major firewalls and VPN technology from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote access technology represent a full range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Learn additional information about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size companies expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select the right technologies from multiple suppliers to achieve your security objectives while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to automate the complete threat progression including filtering, identification, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver economical multi-layer security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, device control, and web filtering via leading-edge technologies packaged within a single agent managed from a unified console. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP environment that addresses your company's unique requirements and that helps you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent can also help your company to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of vital files, applications and VMs that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security vendors to provide web-based control and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a further level of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate as much as 50% of time wasted looking for critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Network Security Design
Any company ought to develop a carefully considered security strategy that includes both pre-attack procedures and response plans. The proactive plan is a collection of procedures designed to reduce security weaknesses. The post-attack strategy assists your network security personnel to assess the damage resulting from an attack, fix the network, document the event, and get the IT network operational as soon as feasible.

Progent's expert information security engineers are available to help your business to run a comprehensive risk evaluation and create a network security plan to implement security policies and controls to minimize ongoing assaults and threats.

CISM Certified Network Security Support Expertise
The Certified Information Security Manager (CISM) committee describes the basic competencies and worldwide standards of skill that information security managers are required to master. It provides business management the confidence that those who have qualified for their CISM credential have the experience and knowledge to deliver efficient security administration and consulting services. Progent offers the expertise of CISM certified security professionals to help businesses with:

  • Network Security Governance
  • Vulnerability Management
  • Information Security Implementation Management
  • Information Security Management
  • Response Management
Learn additional details concerning Progent's CISM Accredited IS Security Support Services.

CISSP Qualified Security Engineering Expertise
CISSP certification denotes mastery of an international standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information protection defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security areas including:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Preparedness
Learn additional information about Progent's CISSP Qualified IS Security Consulting Professionals.

ISSAP Certified Secure System Architecture Consulting Assistance
Progent's ISSAP qualified IT architecture professionals are consultants who have earned ISSAP status as a result of rigorous examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more complex requirements of information security architecture within the broader field of information security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of architecture security including.

  • Access Control Systems and Methodologies
  • Telecommunications and Network Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • BCP and DRP
  • Site Security
Read additional details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Professionals.

CISA Accredited Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies mastery in IS security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA international professional group. Progent's CISA network security audit consultants can help your company in the areas of:

  • Information Systems Audit Process
  • IT Administration
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Get more information concerning Progent's CISA Certified IS Security Auditing Consulting Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's ability to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and execute a workplace continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management engineers offer a range of risk evaluation services such as:

  • Gather information and review documentation to help identify major vulnerabilities
  • Inventory statutory, regulatory, and contractual mandates and organizational standards associated with your information system to determine their potential impact on your business goals
  • Identify potential vulnerabilities for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness program and conduct training to ensure your organization understand information system risk so they can assist with your risk control program
  • Match identified risk scenarios to your associated business procedures to help determine risk ownership
  • Determine risk tolerance with executive management and key stakeholders to make sure they align
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security experts. GIAC's goal is to verify that a certified security consultant possesses the skills necessary to deliver support in vital areas of network, information, and application security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. NSA. Progent's GIAC information security audit engineers are available to assist your business with:

Read more details about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Engineer
To see how you can contact a Progent security consultant for online or on-premises support in New Hampshire, phone 1-800-993-9400 or visit Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.