Small business computer networks in the state of North Carolina now have fast and affordable remote help from Progent's certified security engineers to resolve the toughest security problems. Rates are competitive, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also provides assistance for long-term engagements that requires the expertise of senior security engineers with high-level security credentials.

If your North Carolina small business is located far from major urban neighborhoods including Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, contact with local certified network security experts is often limited when there's an urgent situation. This can result in lost income for your business, upset customers, idle workers, and defocused executives. By calling Progent's remote support, you have access to a qualified security professional who can offer assistance when you need it to keep your network operating and recover your information.

Progent can help you at any level in your efforts to defend your information system with services that ranges from security assessments to creating a company-wide security plan. Progent offers economical service to assist businesses of all sizes to configure and maintain protected networks powered by Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide web-based control and world-class security for your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall.

Progent's security consultants are available remotely or on premises to offer a variety of urgent or project-based computer security services including:

  • Run thorough network security audits
  • Clean up rapidly after virus and worm attacks
  • Install hardware and software firewalls
  • Configure safe solutions for offsite and mobile connectivity
  • Deploy effective applications for automatic protection against viruses, spam and DHAs
  • Develop a company-wide security strategy with proactive network monitoring
  • Offer comprehensive Help Desk Support
  • Create an effective network backup and business continuity strategy centered on Data Protection Manager (DPM) automated backup technology
If your network has an immediate need for IT security help, go to Progent's Emergency Remote Network Support.

Progent's support professionals provide world-class support in vital areas of system protection that include analysis, firewall and VPN expertise, and advanced security consulting.

System Audits
Progent's expert security consultants can assess the effectiveness of your existing computer protection systems by performing exhaustive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in this testing saves you money and offers an accurate picture of system vulnerability. The information your company gains can be used as the basis of a security plan that will permit your network to operate safely and respond rapidly to future risks.

Automated Security Assessment
Progent provides consulting in the application of security evaluation utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a set of automatic network testing checks to identify possible security gaps. Progent has extensive experience with other network auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools such as Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can show you how to design security into your company operations, install auditing software, define and implement a secure network environment, and recommend procedures to optimize the safety of your IT system. Progent's security consultants are ready to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and install VPN. Learn more on Progent's network security audits.

Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages designed to enable small businesses to receive a professional network security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from outside your firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from a secure computer within your firewall to determine your exposure to inside threats. The two security inventory services are set up and run from a protected external location. The project is managed by an engineer who has earned top security credentials and who generates a report that details and analyzes the information collected by the security scan and suggests cost-effective improvements where called for.

Stealth Security Penetration Analysis Support Services
Stealth penetration checking is an important part of any comprehensive IT system security strategy. Progentís security professionals can perform extensive penetration tests without the knowledge of your company's internal network support staff. Stealth penetration checking uncovers whether current security defense systems such as intrusion detection warnings and event log analysis are properly set up and consistently monitored. Learn more concerning Progent's network penetration testing consulting.

Firewalls and VPN Solutions
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network technology from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned important industry certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access technology represent a complete range of manageable security products to help protect your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Find out additional details about Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and VPN Solutions
Progent provides small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and select the right technologies from a variety of suppliers to achieve your security goals while staying within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to provide web-based control and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further level of analysis for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to defend endpoints and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely escape traditional signature-based AV products. ProSight ASM protects local and cloud resources and provides a single platform to address the complete threat progression including protection, detection, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and enables rapid recovery of vital data, apps and virtual machines that have become lost or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can help you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect information related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By updating and managing your network documentation, you can save up to half of time spent looking for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre making enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Consulting
Every business ought to have a thoroughly thought out security strategy that includes both pre-attack processes and reaction planning. The proactive strategy is a set of steps that help to reduce vulnerabilities. The post-attack plan helps your network security engineers to assess the impact caused by an attack, fix the network, document the experience, and get the IT network operational as quickly as feasible.

Progent's expert IS security consultants are available to assist your business to perform a full risk evaluation and create a company-wide security strategy to implement security policies and controls to minimize future assaults and threats.

CISM Accredited Network Security Support Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and global standards of performance that information security managers are required to learn. It gives business management the confidence that those who have qualified for their CISM credential possess the experience and capability to deliver efficient security management and support consulting. Progent can provide the support of CISM certified security consultants to help businesses with:

  • Network Security Processes
  • Risk Management
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Find out more information about Progent's CISM Accredited Information Security Support Professionals.

CISSP Certified Security Engineering Assistance
CISSP denotes mastery of a global standard for data security. ANSI (American National Standards Institute) has granted certification accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn more details concerning Progent's CISSP Qualified Information Security Engineering Expertise.

ISSAP Accredited Secure System Architecture Consulting Expertise
Progent's ISSAP certified system architecture engineers are experts who have been awarded ISSAP Certification through rigorous testing and extensive experience with network security design. The ISSAP credential represents demonstrated skill in the most challenging demands of IS security architecture bounded by the wider field of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all aspects of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Phone System and Network Infrastructure Security
  • Cryptography Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read more information concerning Progent's ISSAP Certified Secure Network Architecture Consulting Services.

CISA Qualified Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that indicates expertise in network security audit and control. Accredited by ANSI, the CISA credential requires that candidates pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified security audit experts are available to help your IT organization with:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Preparedness
Read more information about Progent's CISA Accredited IS Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's ability to plan, implement, and maintain IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC network risk mitigation experts offer a variety of risk evaluation services including:

  • Collect data and study documentation to identify major vulnerabilities
  • Inventory statutory, industry, and business requirements and company standards related to your information system to assess their possible influence on your strategic objectives
  • Point out possible vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your organization appreciate IT risk so they can assist with your risk management process
  • Match key risk scenarios to your associated business procedures to help determine risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they align
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Support
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security experts. GIAC's goal is to ensure that an accredited professional has the knowledge appropriate to deliver services in vital categories of network, data, and application software security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. NSA. Progent's GIAC-certified security audit engineers can assist your IT organization with:

  • Assessing Networks
  • Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Learn additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Progent Security Engineer
To find out how you can get in touch with a Progent security consultant for online or on-premises help in North Carolina, call 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.