Small business IT networks in New Hampshire can depend on quick and affordable remote technical support from Progent's accredited security engineers to resolve complex security problems. Rates are competitive, charges are per minute, engagement is quick, and support is unbeatable. Progent also provides assistance for complex projects that requires the expertise of senior security engineers with high-level industry credentials.

In case your New Hampshire office is based outside of more populated urban neighborhoods like Manchester, Nashua, or Concord, access to local qualified network security engineers may be problematic when there's a security disaster. This could mean a drop in revenue for your business, upset clients, idle workers, and distracted executives. By utilizing Progent's remote support, you have access to a qualified security engineer who can deliver assistance when you need it to get your information system on line and recover your information.

Progent can assist you at any level in your initiatives to protect your IT environment with support that ranges from network security checks to creating a company-wide security plan. Progent offers economical service to assist companies of any size to set up and manage safe IT environments powered by Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to provide web-based management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified professionals are available online or in person to provide a range of emergency or longer-term network security services which include:

If your business has an urgent requirement for IT security help, refer to Progent's Emergency Remote Network Support.

Progent's security experts can deliver advanced services in key fields of system protection including auditing, firewall and VPN expertise, and advanced security planning.

System Security Evaluation
Progent's expert security consultants can evaluate the vulnerability of your existing network security environment by performing exhaustive remote automated analysis via sophisticated utilities and proven techniques. Progent's skill in administering this service saves you consulting fees and offers an objective portrayal of gaps. The information your business gains can make up the basis of a network protection strategy that can permit your network to operate dependably and react quickly to new risks.

Automated Vulnerability Assessment
Progent provides expertise in the use of security testing packages such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a set of automatic system testing scans to identify possible security holes. Progent has extensive knowledge of other security analysis products such as NMAP, AMAP application mapper, eEye, plus tools such as SolarWinds, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you build security into your business operations, install scanning software, plan and deploy a protected network architecture, and recommend policies to optimize the safety of your IT system. Progent's security engineers are available to assist you to configure a firewall, design secure remote connectivity to email and data, and install virtual private network. Find out more about Progent's automated security evaluation.

Security Inventory Scanning Packages for Small Businesses
Progent offers two low-cost security inventory bundles intended to allow small companies to receive an independent network security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a security expert administers a comprehensive test of your network from beyond your company firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from an authorized machine within your firewall to assess your exposure to inside attacks. Both security inventory services are configured and executed from a secured remote location. The process is overseen by an engineer with top security credentials and who generates a document that details and interprets the data collected by the security scan and proposes practical remediation where called for.

Network Penetration Testing Consulting
Stealth penetration testing is an important part of any successful network security plan. Progentís security experts can run thorough penetration tests without the knowledge of your company's internal network support staff. Unannounced penetration testing shows whether current security defense systems such as intrusion incident warnings and event history monitoring are properly set up and actively monitored. Learn more on Progent's stealth security penetration testing support services.

Firewalls and VPN Support
Progent's background in security solutions includes in-depth familiarity with leading firewalls and VPN products offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Consulting Expertise
Cisco's security and offsite connection products represent a complete line of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Learn additional details about Progent's Engineering Expertise for Cisco Security and VPN Products.

Consulting Services for Other Firewall and VPN Solutions
Progent provides small and medium size businesses professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security plan and choose the right technologies from a variety of suppliers to support your security objectives while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to defend endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to manage the entire malware attack lifecycle including filtering, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver affordable multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies incorporated within a single agent accessible from a unified control. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that meets your company's specific needs and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent's consultants can also help you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates your backup processes and enables rapid restoration of critical data, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading data security vendors to provide centralized control and world-class security for all your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual machine host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be moved easily to a different hosting solution without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time spent trying to find vital information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Certified Network Security Consulting
Every company ought to develop a carefully considered security program that incorporates both proactive processes and reaction planning. The proactive plan is a set of steps intended to minimize security weaknesses. The reactive strategy helps your security personnel to evaluate the damage resulting from an attack, repair the damage, record the event, and get business functions running as rapidly as possible.

Progent's expert information security consultants are available to help you to run a full vulnerability assessment and define a computer security strategy to establish security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Qualified Security Support Services
The CISM organization describes the core capabilities and international standards of performance that information security managers are required to learn. It provides executive management the confidence that consultants who have qualified for their CISM certification have the experience and knowledge to provide effective security management and consulting services. Progent offers the services of CISM qualified security consultants to help companies with:

  • IS Security Processes
  • Vulnerability Analysis
  • Information Security Implementation Management
  • Information Security Administration
  • Recovery Management
Read more details concerning Progent's CISM Accredited Network Security Engineering Professionals.

CISSP Accredited Security Consulting Expertise
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI has granted certification accreditation in the field of data security defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISSP IS Security Engineering Expertise.

ISSAP Accredited Secure IT Architecture Engineering Services
Progent's ISSAP qualified network architecture engineers are experts who have earned ISSAP status through thorough testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the most challenging requirements of IS security architecture within the wider scope of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security consultants can help your company with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Security
  • Data Encryption Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Read additional details about Progent's ISSAP Accredited Secure System Architecture Support Professionals.

CISA Qualified Network Security Auditing Consulting Support
The CISA credential is a globally recognized achievement that represents mastery in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive examination administered by the ISACA professional association. Progent's CISA-certified information security audit consultants can assist your company in the areas of:

  • IS Audit Services
  • IT Administration
  • Systems and Architecture Lifecycle Planning
  • Information Technology Support
  • Protecting Data Assets
  • Business Continuity Preparedness
Read additional details about Progent's CISA Certified Security Auditing Engineering Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate an IT professional's ability to design, implement, and support information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity plan that follows leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation specialists can provide a range of risk evaluation services including:

  • Gather data and study documentation to evaluate major vulnerabilities
  • Inventory statutory, industry, and business mandates and company standards related to your network to determine their possible influence on your strategic objectives
  • Point out possible vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Create a risk awareness program and conduct seminars to make sure your organization understand IS risk so they can contribute to your risk management process
  • Connect identified risk vectors to related operational procedures to help assign risk ownership
  • Validate risk tolerance with executive leadership and major stakeholders to make sure they match
Learn more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Engineering Assistance
GIAC was established in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to verify that an accredited security consultant has the skills appropriate to deliver support in key categories of system, data, and application software security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit engineers can assist your IT organization in the areas of:

  • Assessing Networks
  • Security Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Services.

Talk to a Progent Security Expert
To learn how you can contact a security engineer for remote or onsite support in New Hampshire, call 1-800-993-9400 or visit Online Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.