Small business computer networks in New Hampshire can now get fast and affordable remote access to Progent's certified security consultants to resolve the toughest security issues. Rates are competitive, charges are per minute, sign-up is quick, and service is world class. Progent also provides help for long-term projects that demand the services of seasoned security consultants with high-level industry certifications.

In case your New Hampshire small business is situated some distance from larger metropolitan neighborhoods including Manchester, Nashua, or Concord, help from local certified network security engineers may be limited when you have an emergency. This can cause a loss of productivity for your company, upset clients, idle employees, and defocused management. By utilizing Progent's remote support, you have access to a certified security professional who can provide help when you need it to keep your system operating and recover your data.

Progent can help you in your efforts to protect your network with support ranging from network security audits to creating a company-wide security plan. Progent provides affordable service to help companies of any size to design and maintain secure networks powered by Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security vendors to provide centralized control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper level of inspection for incoming email. For outbound email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Exchange Server to monitor and protect internal email that stays inside your security perimeter.

Progent's security professionals are available online or on site to provide a variety of urgent or project-based computer security services which include:

If your network has an urgent need for computer security help, go to Progent's Urgent Online Technical Support.

Progent's consultants offer advanced support in vital facets of system security that include security evaluation, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's expert security engineers can evaluate the strength of your current computer security environment through exhaustive remote automated testing based on sophisticated utilities and tested techniques. Progent's skill in administering this testing saves you time and money and assures a detailed portrayal of security holes. The knowledge your company is provided can make up the foundation of a security plan that can permit your network to run safely and react rapidly to new risks.

Automated Network Security Evaluation
Progent offers consulting in the use of security analysis utilities such as Microsoft's MBSA and LANguard from GFI for affordably performing a set of programmed system auditing checks to identify potential security vulnerabilities. Progent has extensive experience with other security analysis tools including NMAP Port Scanner, AMAP, eEye, plus utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can show you how to build security into your company operations, configure scanning software, define and deploy a protected system architecture, and recommend policies to maximize the safety of your network. Progent's security consultants are ready to help you set up a firewall, implement safe remote connectivity to email and data, and install VPN. Find out more concerning Progent's network security analysis.

Security Inventory Scanning Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small businesses to get a professional security assessment from a certified security specialist. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to determine possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine inside your firewall to determine your exposure to inside threats. Both security inventory packages are set up and executed from a protected remote site. The project is overseen by a consultant with top security credentials and who generates a document that summarizes and analyzes the data collected by the security scan and proposes practical improvements where called for.

Network Security Penetration Testing Support Services
Stealth intrusion testing is a key component of any successful IT system security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's internal IT resources. Stealth penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log monitoring are properly configured and consistently monitored. Find out additional information concerning Progent's stealth penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite access technology provide a comprehensive line of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Read additional details concerning Progent's Support Expertise for Cisco Security Technology and VPN Appliances.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and select appropriate technologies from a variety of suppliers to support your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the technology of top information security vendors to deliver centralized control and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily evade traditional signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to manage the complete malware attack progression including blocking, detection, mitigation, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. Available at a low monthly price, ProSight DPS automates and monitors your backup activities and allows rapid restoration of critical data, apps and VMs that have become unavailable or corrupted as a result of component failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

Certified Network Security Design
Any company ought to have a carefully thought out security strategy that includes both proactive procedures and reaction planning. The pre-attack strategy is a set of procedures that help to minimize vulnerabilities. The reactive strategy helps your company's network security engineers to assess the damage caused by a security penetration, repair the damage, record the event, and get the IT network restored as rapidly as feasible.

Progent's certified IT security engineers are available to assist you to run a complete risk assessment and define a computer security plan to establish security processes and mechanisms to minimize future attacks and threats.

CISM Certified Network Security Consulting Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and global standards of skill that IT security professionals are expected to master. It gives business management the confidence that those who have earned their CISM certification possess the background and capability to deliver efficient security administration and support services. Progent can provide the expertise of CISM qualified security consultants to help companies with:

  • Network Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • IS Security Management
  • Response Planning
Read additional details concerning Progent's CISM Accredited Security Support Professionals.

CISSP Certified Security Engineering Expertise
CISSP recognizes expertise with an international standard for network security. ANSI has granted the CISSP credential recognition in the field of data security defined by ISO 17024. Progent offers the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your business in a broad range of security areas including:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and Internet Security
  • Disaster Recovery Preparedness
Learn more information about Progent's CISSP IS Security Engineering Professionals.

ISSAP Certified Secure IT Architecture Engineering Services
Progent's ISSAP certified information system architecture professionals are experts who have earned ISSAP Certification as a result of thorough testing and significant work with information security architecture. The ISSAP credential represents proven mastery in the more challenging demands of IS security architecture within the wider scope of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all aspects of architecture security such as.

  • Access Control Systems and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional details about Progent's ISSAP Certified Secure Information System Architecture Engineering Services.

CISA Qualified Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is an important achievement that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive examination administered by the ISACA professional group. Progent's CISA-qualified information security audit engineers can assist your company with:

  • Information Systems Audit Services
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Planning
Get additional details about Progent's CISA Certified Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and maintain IS control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a business continuity strategy that follows leading practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management specialists can provide a variety of risk assessment services such as:

  • Collect data and review documentation to identify major vulnerabilities
  • Identify statutory, regulatory, and business mandates and organizational policies associated with your network to determine their possible impact on your business objectives
  • Identify possible vulnerabilities for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness program and conduct seminars to make sure your stakeholders understand information system risk so they can assist with your risk management program
  • Connect identified risk vectors to your associated business procedures to help determine risk responsibility
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they are in agreement
Read additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Network Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to assure that a certified security consultant has the knowledge necessary to deliver services in critical areas of network, data, and application software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC IS security audit consultants can help your business in the areas of:

Learn more information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Expert
To see how you can contact a security consultant for remote or onsite expertise in New Hampshire, call 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.