Small business computer networks in the state of New Hampshire now have quick and economical online help from Progent's qualified network security engineers to fix complex security problems. Rates are reasonable, billing is by the minute, sign-up is immediate, and support is unbeatable. Progent also provides help for long-term projects that demand the expertise of seasoned security engineers with high-level industry credentials.

If your New Hampshire business is located outside of more populated metropolitan areas including Manchester, Nashua, or Concord, the availability of nearby certified network security consultants may be limited during a crisis. This can result in lost income for your business, upset customers, idle workers, and distracted management. By contacting Progent's online services, you have access to a certified security engineer ready to offer assistance whenever you need it to get your system running and salvage your information.

Progent can help you in your initiatives to protect your network with services that can range from network security assessments to creating a company-wide security strategy. Progent provides economical service to help companies of any size to design and manage secure networks powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to deliver centralized management and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified professionals are accessible remotely or on site to provide a range of urgent or longer-term IT security services including:

If your network has an immediate requirement for computer security support, go to Progent's Emergency Online Technical Support.

Progent's security experts can deliver advanced support in vital facets of system security that include security assessment, firewalls and VPN, and advanced security consulting.

System Assessment
Progent's expert security consultants can assess the effectiveness of your current computer protection systems through exhaustive remote automated analysis based on sophisticated software tools and proven procedures. Progent's skill in this testing saves your company money and assures an accurate portrayal of system vulnerability. The knowledge your company is provided can form the foundation of a security strategy that can allow your information system to run safely and react rapidly to new risks.

Automated Security Assessment
Progent provides expertise in the use of security analysis packages including MBSA and LANguard from GFI for affordably performing a variety of automatic system testing checks to uncover potential security gaps. Progent has broad knowledge of additional network auditing utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to build protection into your company processes, configure scanning applications, define and implement a secure system environment, and recommend procedures to optimize the safety of your network. Progent's security professionals are available to help you set up a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's automated security analysis.

Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles intended to allow small businesses to get an impartial network security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from beyond your firewall to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a network scan from a secure computer inside your company firewall to assess your exposure to inside threats. Both security inventory packages are set up and executed from a protected external site. The project is overseen by an engineer who has earned top security accreditations and who produces a report that summarizes and interprets the data collected by the security scan and proposes practical improvements where appropriate.

Network Security Penetration Testing Support Services
Stealth intrusion testing is an important part of any comprehensive network security plan. Progent’s security professionals can run extensive penetration tests without the awareness of your company's internal network support resources. Stealth penetration checking shows whether current security defense systems such as intrusion incident alerts and event log monitoring are correctly set up and consistently monitored. Learn additional information concerning Progent's stealth security penetration analysis support services.

Firewall and Virtual Private Network Solutions
Progent's background in security technology encompasses extensive field work with leading firewalls and Virtual Private Network products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with important networking certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your legacy PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and remote connection technology represent a complete line of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco CCIE and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Read additional information concerning Progent's Support Expertise for Cisco Security and VPN Appliances.

Support Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and medium size companies expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security plan and select appropriate products from multiple suppliers to achieve your security goals while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily get by legacy signature-based anti-virus tools. ProSight ASM safeguards local and cloud resources and offers a unified platform to automate the complete threat progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies packaged within one agent managed from a unified control. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent action. Progent's consultants can also assist you to set up and verify a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup processes and allows rapid recovery of critical files, applications and VMs that have become lost or damaged as a result of hardware failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security companies to deliver centralized control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most threats from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email that stays within your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be moved immediately to a different hardware environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT documentation, you can save up to 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether you’re planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Network Security Consulting
Any company should develop a carefully thought out security program that includes both proactive processes and reaction planning. The proactive plan is a collection of procedures intended to reduce vulnerabilities. The reactive strategy helps your network security engineers to assess the damage resulting from an attack, repair the network, document the experience, and get the IT network restored as quickly as feasible.

Progent's expert information security consultants are available to help you to perform a complete vulnerability assessment and create a company-wide security strategy to establish security processes and mechanisms to reduce future attacks and dangers.

CISM Qualified System Security Engineering Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of skill that IT security professionals are required to master. It gives business management the confidence that consultants who have earned their CISM certification have the experience and knowledge to deliver efficient security management and consulting services. Progent can provide the expertise of CISM qualified security consultants to help businesses with:

  • Information Security Strategies
  • Vulnerability Management
  • IS Security Program Management
  • IS Security Management
  • Response Management
Find out additional details concerning Progent's CISM Qualified IS Security Consulting Services.

CISSP Qualified Security Consulting Assistance
The CISSP credential denotes mastery of a global standard for data security. The American National Standards Institute has awarded certification recognition in the area of information protection stipulated by ISO 17024. Progent offers the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Find out additional details about Progent's CISSP-certified Information Security Consulting Professionals.

CISSP-ISSAP Qualified Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP qualified information system architecture engineers are consultants who have earned ISSAP Certification through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the most challenging demands of IS security architecture within the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your business with all phases of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Learn additional details about Progent's ISSAP Certified Secure Network Architecture Consulting Professionals.

CISA Qualified IS Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is an important achievement that represents mastery in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified information security audit consultants are available to help your business with:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Planning
Read more details about Progent's CISA Accredited Network Security Auditing Consulting Assistance.

CRISC Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a business continuity strategy based on leading practices promoted by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation consultants offer a range of risk assessment services including:

  • Gather information and study documentation to evaluate major vulnerabilities
  • Inventory statutory, regulatory, and business requirements and company standards associated with your network to determine their possible impact on your strategic objectives
  • Identify potential threats for your operational workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness program and conduct training to ensure your stakeholders understand IS risk so they can contribute to your risk control process
  • Match key risk scenarios to related business processes to help determine risk responsibility
  • Validate risk tolerance with executive management and key stakeholders to make sure they are in agreement
Read more information concerning Progent's CRISC Risk Management Experts.

GIAC Qualified Security Engineering Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to ensure that an accredited professional has the knowledge needed to deliver services in key areas of network, information, and program security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-certified network security audit consultants can assist your company with:

  • Assessing IT Infrastructure
  • Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read more details about Progent's GIAC Information Assurance Services.

Talk to a Security Expert
To see how you can contact a security engineer for online or onsite support in New Hampshire, phone 1-800-993-9400 or visit Online Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.