Business information networks in the state of North Carolina can have prompt and affordable remote technical support from Progent's certified network security engineers to resolve critical security problems. The cost is reasonable, billing is per minute, sign-up is fast, and support is unbeatable. Progent also provides assistance for long-term projects that requires the expertise of seasoned security engineers with high-level industry certifications.

In case your North Carolina organization is located outside of major urban neighborhoods including Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, access to nearby certified network security experts could be limited during an emergency. This can cause lost income for your company, upset clients, unproductive workers, and distracted management. By contacting Progent, you can get in touch with a certified security professional who can offer assistance whenever you require it to get your information system on line and recover your data.

Progent can help you in all your efforts to protect your network with support services that can range from network security assessments to creating a company-wide security plan. Progent offers affordable service to help businesses of all sizes to configure and maintain protected IT environments based on Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to provide centralized control and world-class security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a further level of inspection for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email that stays inside your security perimeter.

Progent's security engineers are available remotely or in person to provide a variety of emergency or project-based computer security services such as:

If your company has an emergency need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's consultants can deliver advanced support in vital fields of system protection that include analysis, firewall and VPN solutions, and high-level security consulting.

System Audits
Progent's expert security engineers can assess the strength of your existing computer security environment by performing comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in administering this service saves you consulting fees and offers an objective picture of gaps. The information your company is provided can be used as the foundation of a network protection plan that can permit your network to run safely and react quickly to new threats.

Automated Network Vulnerability Evaluation
Progent offers expertise in the application of security evaluation packages including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing scans to identify possible security problems. Progent has extensive experience with additional security analysis products such as NMAP, AMAP Application Scanner, eEye, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can help you design security into your company operations, install scanning software, plan and deploy a protected system environment, and suggest policies to maximize the safety of your network. Progent's security consultants are ready to assist you to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Learn additional information on Progent's automated security evaluation.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two low-cost security inventory service packages designed to enable small businesses to get an impartial network security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from beyond your company firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from a secure machine within your company firewall to evaluate your exposure to internal assaults. The two security inventory services are set up and executed from a protected external location. The project is overseen by a consultant with top security accreditations and who generates a document that details and analyzes the information collected by the security scan and proposes practical improvements where called for.

Network Security Penetration Analysis Consulting
Stealth penetration checking is an important part of any comprehensive network security strategy. Progentís security experts can perform thorough penetration checks without the knowledge of your organization's internal network support staff. Stealth penetration testing shows whether current security monitoring tools such as intrusion detection alerts and event history monitoring are properly configured and actively checked. Learn additional information on Progent's network security penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in network security solutions includes extensive field work with major firewalls and Virtual Private Network products offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Network Security and VPN Consulting Services
Cisco's security and remote connection products represent a full range of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Read additional information concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.

Consulting Services for Additional Firewall and VPN Products
Progent provides small and medium size organizations professional support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and select appropriate technologies from a variety of suppliers to achieve your security objectives while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to automate the complete malware attack lifecycle including protection, identification, containment, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, device management, and web filtering via cutting-edge tools packaged within one agent managed from a unified control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that meets your company's unique needs and that helps you achieve and demonstrate compliance with government and industry data protection regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that call for immediate action. Progent can also assist you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup processes and enables fast recovery of vital files, applications and virtual machines that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security companies to deliver web-based control and world-class security for all your inbound and outbound email. The powerful architecture of Email Guard integrates cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hardware solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and safeguard data about your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can save up to half of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Any business ought to have a carefully thought out security program that incorporates both pre-attack processes and response planning. The proactive plan is a collection of procedures designed to reduce security weaknesses. The post-attack plan helps your security engineers to assess the impact resulting from an attack, repair the system, document the event, and get the IT network restored as quickly as possible.

Progent's certified IT security engineers are available to assist you to run a comprehensive vulnerability evaluation and create a company-wide security strategy to implement security processes and mechanisms to mitigate future attacks and threats.

CISM Qualified Information Security Support Assistance
The CISM committee describes the core competencies and global standards of performance that IT security managers are required to master. It gives business management the confidence that those who have qualified for their CISM certification have the experience and knowledge to deliver effective security administration and support services. Progent can provide the expertise of CISM certified security consultants to help businesses with:

  • IS Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Read additional details concerning Progent's CISM IS Security Consulting Expertise.

CISSP Qualified Security Consulting Assistance
CISSP denotes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the field of information protection defined by ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Find out more details concerning Progent's CISSP-certified Information Security Engineering Professionals.

ISSAP Certified Secure Network Architecture Consulting Assistance
Progent's ISSAP certified information system architecture professionals are experts who have been awarded ISSAP status as a result of rigorous testing and extensive experience with information security architecture. The ISSAP credential represents proven skill in the most challenging requirements of information security architecture bounded by the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Phone System and Network Security
  • Cryptography Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Find out more information about Progent's ISSAP Certified Secure Network Architecture Consulting Services.

CISA Qualified Security Auditing Consulting Expertise
The CISA accreditation is a globally recognized qualification that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive test administered by the ISACA professional association. Progent's CISA information security audit engineers can assist your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Systems and Infrastructure Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Learn the details about Progent's CISA Qualified Network Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and support IS controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity plan based on leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management engineers offer a variety of risk identification services including:

  • Collect data and study documentation to evaluate significant vulnerabilities
  • Inventory statutory, regulatory, and contractual mandates and company policies associated with your information system to assess their possible impact on your strategic objectives
  • Point out possible threats for your operational processes to help in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your organization appreciate IS risk so they can contribute to your risk control process
  • Connect key risk scenarios to related business procedures to help assign risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to make sure they align
Read additional details concerning Progent's CRISC Experts.

GIAC Certified Network Security Consulting Expertise
GIAC was established in 1999 to validate the skill of network security engineers. GIAC's goal is to ensure that a certified professional has the knowledge needed to deliver support in key categories of network, data, and program security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC security audit experts are available to assist your company with:

  • Assessing Networks
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out more details about Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Engineer
To see how you can access a certified security consultant for remote or on-premises expertise in North Carolina, call 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.