Business networks in the state of North Carolina now have fast and economical remote technical support from Progent's qualified security support specialists to help with complex security issues. The cost is competitive, charges are by the minute, sign-up is immediate, and support is world class. Progent also offers help for complex engagements that requires the knowledge of seasoned security consultants with high-level security credentials.

In case your North Carolina organization is away from more populated metropolitan areas like Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, support from nearby qualified security support specialists could be limited when there's a security disaster. This could mean lost revenue for your company, upset customers, idle employees, and defocused executives. By calling Progent's remote support, you can get in touch with a certified security professional ready to deliver assistance when you require it to keep your network operating and salvage your data.

Progent can help you in your efforts to protect your IT environment with services that ranges from network security audits to developing a company-wide security plan. Progent provides economical support to assist companies of any size to configure and manage secure networks based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security vendors to provide web-based control and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from reaching your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall.

Progent's certified professionals are accessible online or on premises to provide a range of urgent or longer-term network security services which include:

  • Perform automated security evaluations
  • Recuperate rapidly after serious security breaches
  • Configure firewalls from multiple vendors
  • Implement safe solutions for offsite and mobile access
  • Deploy effective utilities for automatic protection against spam and directory harvest attacks
  • Help create a company-wide security strategy with 24x7 network monitoring
  • Provide comprehensive Call Center Support
  • Help Develop a practical data backup and disaster recovery strategy built around Data Protection Manager backup/restore capability
If your business has an urgent need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's support professionals can deliver world-class support in key areas of system security that include security evaluation, firewall and VPN solutions, and high-level security consulting.

System Security Assessment
Progent's expert security consultants can evaluate the strength of your existing computer protection implementation through comprehensive remote automated testing based on sophisticated software tools and tested techniques. Progent's skill in this service saves you time and money and offers an accurate picture of system vulnerability. The knowledge your IT organization gains can make up the basis of a security strategy that can allow your information system to run safely and react rapidly to new threats.

Automated Network Security Analysis
Progent provides expertise in the use of security auditing products including MBSA and GFI LANguard for affordably running a variety of automatic system testing checks to uncover potential security gaps. Progent has extensive knowledge of other network analysis utilities such as NMAP, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can show you how to build protection into your business processes, configure auditing applications, define and deploy a protected system architecture, and suggest policies to optimize the security of your network. Progent's security engineers are ready to assist you to set up a firewall, implement safe remote connectivity to email and data, and integrate VPN. Find out more about Progent's network security evaluation.

Security Inventory Packages for Small Companies
Progent offers two low-cost security inventory service bundles intended to allow small companies to get a professional network security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive examination of your network from beyond your firewall to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from a secure machine within your company firewall to determine your exposure to internal assaults. The two security inventory services are configured and executed from a secured remote site. The process is overseen by an engineer with top security accreditations and who produces a document that details and interprets the information collected by the security scan and suggests cost-effective remediation if called for.

Stealth Penetration Testing Consulting
Stealth intrusion testing is an important part of any comprehensive network security strategy. Progentís security professionals can perform extensive intrusion checks without the knowledge of your organization's in-house network support staff. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event history analysis are correctly configured and consistently monitored. Find out more about Progent's network penetration testing support services.

Firewall/VPN Solutions
Progent's expertise in security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned key networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection products offer a full line of manageable security products to help safeguard your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Find out more details concerning Progent's Support Services for Cisco Security and Virtual Private Network Appliances.

Engineering Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security strategy and select the right products from multiple suppliers to support your security objectives while sticking within your budget restraints.

Certified Network Security Planning
Any company ought to have a carefully considered security program that incorporates both pre-attack processes and reaction plans. The proactive strategy is a collection of mechanisms intended to minimize vulnerabilities. The post-attack strategy helps your IT security engineers to assess the impact resulting from an attack, repair the network, record the experience, and get the IT network restored as rapidly as possible.

Progent's certified IT security consultants are available to help you to run a comprehensive vulnerability assessment and create a network security strategy to establish security policies and controls to minimize future attacks and threats.

CISM Accredited System Security Support Assistance
The CISM committee describes the basic competencies and international standards of skill that IT security professionals are expected to learn. CISM provides business management the assurance that those who have qualified for their CISM credential possess the background and capability to deliver effective security management and support consulting. Progent can provide the services of CISM certified security professionals to assist companies with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Network Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Read additional information concerning Progent's CISM Qualified IS Security Engineering Professionals.

CISSP Accredited Security Consulting Assistance
The CISSP credential recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information security stipulated by ISO 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your organization in a variety security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn additional information about Progent's CISSP-certified Information Security Support Professionals.

ISSAP Certified Secure Information System Architecture Engineering Expertise
Progent's ISSAP qualified system architecture engineers are consultants who have been awarded ISSAP Certification as a result of rigorous examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the most in-depth demands of information system security architecture bounded by the broader field of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all aspects of architecture security including.

  • Access Control Systems and Methodologies
  • Telecom and Network Protection
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional details concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Professionals.

CISA Accredited Information System Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a recognized qualification that signifies expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA security audit consultants are available to help your business in the areas of:

  • IS Audit Process
  • Information Technology Administration
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Find out additional information about Progent's CISA Accredited Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to verify a consultant's skills to design, implement, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help you to develop and execute a workplace continuity strategy that follows leading practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management consultants offer a variety of risk identification services including:

  • Gather data and review documentation to identify significant risk scenarios
  • Identify legal, industry, and contractual requirements and company policies associated with your network to determine their possible influence on your strategic goals
  • Point out potential threats for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and provide training to ensure your stakeholders understand IT risk so they can contribute to your risk control process
  • Match key risk vectors to your associated operational procedures to help determine risk ownership
  • Determine risk tolerance with your senior management and key stakeholders to make sure they match
Find out additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security experts. GIAC's mission is to verify that a certified professional has the knowledge needed to provide support in important categories of system, information, and program security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-certified IS security audit specialists can assist your business in the areas of:

  • Assessing Security Systems
  • Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Engineer
To find out how you can get in touch with a security consultant for remote or on-premises support in North Carolina, phone 1-800-993-9400 or go to Online Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.