Small business computer networks in the state of North Carolina can now get quick and economical remote help from Progent's qualified security engineers to help with critical security problems. The cost is affordable, billing is by the minute, engagement is quick, and service is unbeatable. Progent also offers assistance for long-term engagements that demand the services of senior security consultants with high-level industry credentials.

In case your North Carolina company is situated outside of larger urban areas like Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, support from local certified network security support specialists could be problematic when there's an urgent situation. This could mean lost productivity for your company, angry customers, idle workers, and distracted executives. By calling Progent, you can get in touch with a certified security engineer ready to offer help when you have to have it to keep your system running and salvage your information.

Progent can assist you in a variety of ways in your efforts to defend your information system with support services that ranges from security audits to developing a comprehensive security strategy. Progent offers economical support to help businesses of all sizes to design and maintain protected networks powered by Microsoft Windows and Cisco products and that may include computers based on UNIX or Linux platforms plus mobile users with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security vendors to provide centralized management and comprehensive security for your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's certified experts are accessible remotely or in person to offer a variety of emergency or project-based network security services such as:

  • Run thorough network security evaluations
  • Clean up quickly after serious security breaches
  • Configure firewalls from multiple vendors
  • Configure safe methods for offsite and mobile connectivity
  • Install advanced software for automatic defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with proactive network monitoring
  • Provide comprehensive Call Center Services
  • Help Develop an effective data backup and recovery plan centered on Microsoft Data Protection Manager backup/restore capability
If your company has an urgent requirement for IT security help, go to Progent's Urgent Online Technical Support.

Progent's consultants provide advanced services in key fields of network protection that include security assessment, firewall and VPN expertise, and advanced security consulting.

System Assessment
Progent's certified security consultants can assess the effectiveness of your current network protection systems by performing comprehensive remote automated analysis based on advanced utilities and proven techniques. Progent's experience in administering this testing saves you time and money and assures an accurate picture of security holes. The information your company gains can make up the foundation of a security plan that can permit your network to run dependably and adapt rapidly to future threats.

Automated Vulnerability Assessment
Progent provides consulting in the use of security evaluation products such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably performing a set of programmed system auditing scans to identify potential security problems. Progent has broad experience with additional network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools such as Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can help you design protection into your business operations, install scanning applications, plan and deploy a protected system architecture, and suggest procedures to optimize the security of your network. Progent's security consultants are available to assist you to configure a firewall, design secure remote connectivity to email and data, and install VPN. Find out more about Progent's automated security evaluation.

Security Inventory Service Packages for Small Companies
Progent has put together two low-cost security inventory scanning packages intended to allow small companies to receive an independent security assessment from a certified security engineer. With Progent's External Security Inventory Scan, a security expert administers an extensive examination of your network from beyond your firewall to uncover possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from a secure machine within your company firewall to evaluate vulnerabilities to inside assaults. Both security inventory packages are set up and run from a secured remote location. The process is managed by a consultant who has earned high-level security credentials and who generates a document that details and interprets the information captured by the security scan and suggests practical remediation where called for.

Network Penetration Analysis Consulting
Stealth penetration checking is a key part of any comprehensive IT system security plan. Progentís security experts can perform extensive penetration tests without the awareness of your organization's internal IT resources. Stealth penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event history monitoring are properly set up and consistently monitored. Learn additional information on Progent's stealth security penetration analysis support services.

Firewalls and VPN Support
Progent's background in security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with key networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite connection products represent a complete line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Read more details concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Support Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size companies professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and choose the right products from multiple suppliers to achieve your security goals while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent offers a selection of low-cost, fixed-price monthly services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security vendors to deliver centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-matching AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to manage the complete threat progression including protection, identification, mitigation, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows rapid recovery of critical files, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight DPS to be compliant with government and industry regulatory standards such as IPPA, FINRA, and PCI and, when necessary, can assist you to recover your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.

Certified Network Security Planning
Any business should have a carefully thought out security strategy that incorporates both pre-attack processes and response plans. The pre-attack plan is a set of procedures designed to minimize security weaknesses. The post-attack strategy assists your company's IT security personnel to assess the impact caused by a security penetration, fix the network, record the event, and get business functions running as quickly as feasible.

Progent's certified IS security engineers can to help you to perform a comprehensive vulnerability evaluation and define a computer security plan to implement security processes and controls to reduce ongoing assaults and threats.

CISM Accredited Network Security Engineering Services
The Certified Information Security Manager (CISM) committee describes the basic competencies and global standards of performance that IT security managers are expected to master. CISM provides executive management the confidence that consultants who have earned their CISM certification have the background and knowledge to deliver efficient security management and support services. Progent offers the expertise of CISM qualified security professionals to assist businesses with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Administration
  • Recovery Planning
Read more information concerning Progent's CISM Accredited Information Security Engineering Professionals.

CISSP Accredited Security Consulting Assistance
The CISSP credential denotes mastery of a global standard for network security. ANSI has awarded certification recognition in the field of information protection under ISO/IEC 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Read additional information about Progent's CISSP Accredited Information Security Consulting Expertise.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP status as a result of thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most challenging requirements of information system security architecture bounded by the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture including.

  • Access Control Systems and Techniques
  • Phone System and Network Security
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • BCP and DRP
  • Hardware Security
Learn additional details about Progent's ISSAP Certified Secure Network Architecture Consulting Expertise.

CISA Certified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is an important achievement that indicates expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified information security audit engineers are available to assist your business in the areas of:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Read the details concerning Progent's CISA Certified IS Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk management engineers offer a range of risk identification services including:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Inventory statutory, industry, and business mandates and organizational standards associated with your network to assess their potential influence on your business goals
  • Point out potential threats for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct training to ensure your stakeholders understand IT risk so they can assist with your risk control process
  • Match identified risk scenarios to related business processes to help assign risk responsibility
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they align
Get additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Consulting Services
GIAC was founded in 1999 to validate the knowledge of network security engineers. GIAC's goal is to ensure that a certified security consultant possesses the knowledge needed to provide support in important areas of network, data, and software security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC information security audit consultants are available to assist your company with:

  • Assessing IT Infrastructure
  • Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn additional information concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Security Engineer
To learn how to access a Progent security engineer for remote or on-premises expertise in North Carolina, call 1-800-993-9400 or visit Online Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.