Small business information networks in North Carolina can depend on prompt and affordable online access to Progent's qualified security professionals to assist with the toughest security problems. The cost is reasonable, billing is per minute, engagement is quick, and service is world class. Progent also provides help for long-term engagements that demand the services of seasoned security engineers with top industry credentials.

If your North Carolina small business is some distance from larger urban areas including Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, contact with local certified security consultants may be limited when you have an urgent situation. This can result in a drop in productivity for your business, angry clients, unproductive employees, and distracted executives. By utilizing Progent, you can get in touch with a certified security consultant ready to provide expertise whenever you need it to get your information system running and restore your data.

Progent can help you in your efforts to guard your network with support that ranges from security assessments to developing a company-wide security plan. Progent offers economical service to assist companies of any size to configure and maintain protected IT environments based on Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security solution that uses the technology of top data security vendors to provide web-based control and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also enable Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.

Progent's certified experts are accessible remotely or on site to offer a range of urgent or project-based network security services such as:

If your network has an urgent need for computer security help, go to Progent's Emergency Online Technical Help.

Progent's support professionals can deliver advanced services in key areas of network security that include analysis, firewalls and VPN, and advanced security planning.

System Security Evaluation
Progent's certified security engineers can assess the vulnerability of your existing network security implementation through exhaustive remote automated analysis based on sophisticated utilities and proven techniques. Progent's experience in this service saves your company time and money and assures an objective portrayal of gaps. The knowledge your company gains can make up the foundation of a security strategy that can permit your network to run safely and react quickly to future threats.

Automated Vulnerability Assessment
Progent offers expertise in the application of security auditing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard for economically performing a variety of automatic system testing scans to uncover potential security holes. Progent has extensive knowledge of other network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as Metasploit, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you design security into your business operations, configure scanning applications, plan and implement a secure network architecture, and suggest procedures to optimize the safety of your IT system. Progent's security professionals are available to show you how to configure a firewall, implement safe remote connectivity to email and data, and install virtual private network. Learn additional information concerning Progent's automated security evaluation.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages intended to enable small companies to get an objective network security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your network from beyond your company firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from a secure computer within your company firewall to evaluate your exposure to internal threats. The two security inventory services are set up and executed from a secured external site. The project is managed by a consultant with top security credentials and who produces a report that summarizes and analyzes the information collected by the scan and suggests practical remediation where appropriate.

Network Intrusion Testing Consulting
Stealth penetration checking is an important component of any serious network security plan. Progentís security professionals can run extensive intrusion tests without the awareness of your company's in-house IT resources. Stealth penetration checking uncovers whether existing security monitoring systems such as intrusion incident alerts and event history monitoring are properly set up and consistently monitored. Find out more on Progent's stealth security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes in-depth field work with leading firewalls and Virtual Private Network products from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.

Cisco Network Security and VPN Support Services
Cisco's network security and offsite connection products offer a complete line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Read additional information concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Products
Progent provides small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to provide web-based management and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also assist Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior analysis tools to defend endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which easily get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to manage the entire malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup activities and enables fast restoration of critical files, applications and VMs that have become lost or damaged as a result of component breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can provide world-class support to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

Expert Network Security Planning
Every business should develop a thoroughly thought out security program that includes both proactive processes and response plans. The proactive strategy is a collection of mechanisms intended to reduce security weaknesses. The post-attack strategy assists your IT security personnel to evaluate the damage caused by an attack, fix the network, record the experience, and get business functions operational as soon as feasible.

Progent's expert IS security consultants can to help you to run a full risk assessment and create a company-wide security strategy to implement security policies and mechanisms to mitigate future assaults and dangers.

CISM Qualified System Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the basic competencies and global standards of skill that IT security professionals are required to learn. CISM provides business management the confidence that those who have qualified for their CISM certification possess the experience and knowledge to deliver efficient security management and consulting services. Progent offers the support of CISM certified security consultants to help companies with:

  • Network Security Strategies
  • Risk Analysis
  • Information Security Program Management
  • IS Security Management
  • Response Planning
Read additional details concerning Progent's CISM IS Security Support Expertise.

CISSP Qualified Security Engineering Services
The CISSP credential recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of data security stipulated by ISO 17024. Progent can provide the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISSP Qualified Network Security Engineering Expertise.

ISSAP Accredited Secure Information System Architecture Engineering Support
Progent's ISSAP qualified network architecture professionals are experts who have earned ISSAP Certification through thorough testing and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the more in-depth requirements of information system security architecture bounded by the wider scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all phases of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Hardware Security
Read additional details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Expertise.

CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a prestigious qualification that signifies expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA IS security audit consultants are available to help your IT organization with:

  • IS Audit Services
  • Information Technology Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Read additional details concerning Progent's CISA Certified Information System Security Auditing Consulting Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity plan based on leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk management experts can provide a variety of risk assessment services including:

  • Collect data and study documentation to evaluate significant vulnerabilities
  • Identify legal, regulatory, and contractual requirements and organizational standards related to your network to assess their potential impact on your strategic goals
  • Point out potential vulnerabilities for your business workflows to assist in analyzing your corporate risk
  • Create a risk awareness initiative and provide training to ensure your organization understand information system risk so they can contribute to your risk control program
  • Connect key risk vectors to related business processes to help determine risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to make sure they are in agreement
Get more details about Progent's CRISC Consultants.

GIAC Certified Network Security Consulting Expertise
Global Information Assurance Certification was founded in 1999 to certify the skill of computer security experts. GIAC's mission is to ensure that an accredited professional possesses the skills appropriate to deliver support in critical categories of network, information, and application software security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit specialists can assist your business with:

Find out more information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Expert
To find out how you can contact a certified security consultant for remote or on-premises help in North Carolina, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.