Business IT networks in the state of New Hampshire can depend on quick and economical remote access to Progent's certified network security engineers to assist with the toughest security issues. Rates are reasonable, charges are per minute, engagement is immediate, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the expertise of seasoned security engineers with high-level industry certifications.

In case your New Hampshire office is situated far from more populated urban areas including Manchester, Nashua, or Concord, help from nearby qualified network security experts is often limited when you have an emergency. This can cause a drop in revenue for your business, upset customers, idle workers, and distracted executives. By calling Progent, you have access to a certified security professional ready to provide help when you need it to keep your network running and salvage your data.

Progent can help you in all your initiatives to protect your information system with support services that can range from security audits to developing a company-wide security strategy. Progent provides economical service to assist businesses of all sizes to configure and maintain secure IT environments based on Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security vendors to provide web-based management and world-class security for your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.

Progent's security engineers are available online or on site to provide a variety of urgent or project-based IT security services including:

If your business has an immediate requirement for IT security support, refer to Progent's Urgent Remote Network Support.

Progent's consultants offer world-class support in key facets of network security that include security evaluation, firewall and VPN solutions, and high-level security consulting.

System Assessment
Progent's certified security consultants can assess the vulnerability of your current computer protection systems through exhaustive remote automated testing via advanced utilities and proven techniques. Progent's skill in administering this testing saves you money and offers a detailed portrayal of weaknesses. The information your company gains can be used as the basis of a network protection plan that will allow your information system to operate dependably and adapt quickly to new threats.

Automated Network Security Analysis
Progent provides consulting in the application of security evaluation packages such as Microsoft's MBSA and LANguard from GFI for affordably running a variety of programmed system auditing scans to identify potential security problems. Progent has broad knowledge of additional network auditing utilities such as NMAP, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can show you how to build security into your company operations, configure auditing applications, define and implement a protected system environment, and suggest procedures to optimize the security of your IT system. Progent's security professionals are available to show you how to configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Learn more on Progent's network security assessment.

Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning packages intended to allow small companies to receive an independent security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from beyond your company firewall to uncover possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from a secure machine within your company firewall to assess vulnerabilities to inside assaults. The two security inventory packages are set up and executed from a protected external location. The process is directed by an engineer who has earned top security accreditations and who produces a report that summarizes and analyzes the data collected by the security scan and proposes practical improvements where called for.

Stealth Penetration Testing Support Services
Stealth penetration checking is a key part of any serious IT system security plan. Progentís security professionals can run thorough intrusion tests without the knowledge of your company's in-house network support staff. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion incident warnings and event history monitoring are correctly set up and consistently checked. Find out additional information about Progent's stealth security penetration analysis consulting.

Firewall/VPN Expertise
Progent's expertise in security solutions includes extensive familiarity with major firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with important networking certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your legacy PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Network Security and VPN Support Services
Cisco's network security and remote access products provide a complete range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Learn more details about Progent's Support Expertise for Cisco Security Technology and VPN Appliances.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security plan and choose appropriate technologies from multiple vendors to support your security objectives while sticking within your spending restraints.

Expert Security Consulting
Any business ought to develop a thoroughly thought out security strategy that incorporates both proactive procedures and response planning. The proactive plan is a collection of mechanisms designed to minimize vulnerabilities. The reactive plan helps your company's network security personnel to assess the damage caused by an attack, fix the network, record the experience, and get business functions restored as soon as feasible.

Progent's certified IT security consultants can to help your business to run a comprehensive risk assessment and define a company-wide security plan to establish security policies and mechanisms to reduce ongoing attacks and dangers.

CISM Qualified System Security Consulting Services
The CISM committee describes the core competencies and global standards of performance that information security professionals are expected to master. CISM provides business management the assurance that consultants who have qualified for their CISM credential possess the background and capability to provide efficient security management and consulting consulting. Progent can provide the support of CISM qualified security professionals to assist companies with:

  • IS Security Processes
  • Vulnerability Analysis
  • Information Security Implementation Management
  • Information Security Management
  • Recovery Planning
Read more information concerning Progent's CISM Certified Network Security Consulting Services.

CISSP Qualified Security Engineering Assistance
CISSP denotes mastery of a worldwide standard for data security. ANSI has granted the CISSP credential recognition in the area of data security stipulated by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Find out additional details about Progent's CISSP Qualified Information Security Engineering Professionals.

ISSAP Accredited Secure Information System Architecture Consulting Assistance
Progent's ISSAP certified information system architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous examination and extensive work with information security design. The ISSAP certification indicates proven competence in the most complex demands of information system security architecture bounded by the wider scope of information system security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Physical Security
Read additional information about Progent's ISSAP Certified Secure Information System Architecture Consulting Expertise.

CISA Accredited Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a prestigious achievement that represents expertise in information system security auditing. Accredited by ANSI, the CISA accreditation has candidates pass a comprehensive test administered by the ISACA international professional group. Progent's CISA-qualified network security audit consultants can assist your IT organization with:

  • IS Audit Process
  • Information Technology Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Data Resources
  • Business Continuity Planning
Find out more details concerning Progent's CISA Certified Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and support information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and carry out a business continuity strategy based on leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management engineers can provide a variety of risk assessment services including:

  • Gather information and review documentation to identify significant risk scenarios
  • Inventory statutory, industry, and business requirements and company standards associated with your information system to assess their possible influence on your strategic objectives
  • Point out potential vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to make sure your stakeholders understand IT risk so they can contribute to your risk control program
  • Match key risk vectors to your associated operational processes to help assign risk responsibility
  • Determine risk appetite with your senior management and major stakeholders to make sure they are in agreement
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Engineering Services
Global Information Assurance Certification was established in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to make sure that a certified security consultant has the knowledge necessary to deliver services in key areas of system, information, and software security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified network security audit consultants are available to assist your company in the areas of:

  • Auditing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Progent Security Specialist
To learn how to get in touch with a Progent security engineer for remote or on-premises help in New Hampshire, phone 1-800-993-9400 or visit Remote Network Help.














© 2002- 2017 Progent Corporation. All rights reserved.