Business IT networks in the state of North Carolina can depend on fast and affordable remote help from Progent's accredited security consultants to resolve critical security issues. The cost is reasonable, billing is per minute, engagement is fast, and support is unbeatable. Progent also provides help for long-term projects that demand the expertise of seasoned security consultants with high-level security certifications.

In case your North Carolina small business is situated far from larger metropolitan areas including Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, the availability of nearby accredited security consultants is often limited during an urgent situation. This can cause a loss of revenue for your business, angry clients, unproductive employees, and defocused management. By calling Progent's online services, you have access to a qualified security professional ready to provide assistance whenever you require it to keep your system operating and recover your data.

Progent can assist you in your initiatives to protect your information system with services that ranges from security audits to developing a comprehensive security plan. Progent provides affordable support to assist small and midsize companies to configure and manage safe IT environments powered by Windows and Cisco technology and that can include computers running UNIX or Linux platforms plus BYOD clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to provide centralized control and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further level of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your security perimeter.

Progent's security consultants are available remotely or on premises to provide a range of emergency or project-based computer security services such as:

  • Run thorough network security audits
  • Recover rapidly after serious security breaches
  • Install hardware and software firewalls
  • Implement secure methods for remote and mobile connectivity
  • Deploy advanced solutions for protection against viruses, spam and directory harvest attacks
  • Help create a company-wide security plan with round-the-clock security monitoring
  • Provide outsourced Help Desk Support
  • Develop an effective backup and recovery solution based on Microsoft DPM backup/restore capability
If your business has an emergency need for computer security help, refer to Progent's Emergency Remote Technical Help.

Progent's engineers can deliver advanced support in key areas of system security that include security assessment, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's certified security engineers can evaluate the vulnerability of your existing network protection systems through comprehensive remote automated testing via sophisticated utilities and proven procedures. Progent's experience in this testing saves you money and assures an accurate portrayal of security holes. The knowledge your business is provided can be used as the basis of a security strategy that can allow your network to run safely and adapt rapidly to future risks.

Automated Network Security Audits
Progent provides consulting in the use of security testing utilities such as MBSA and GFI LANguard NSS for affordably running a set of programmed network testing scans to identify possible security vulnerabilities. Progent has broad knowledge of other security auditing utilities including NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can show you how to design protection into your business processes, install scanning software, plan and implement a protected network architecture, and recommend procedures to optimize the security of your network. Progent's security professionals are ready to help you configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Find out additional information on Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to allow small companies to receive a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a security expert runs an extensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from an authorized computer within your company firewall to uncover your exposure to internal threats. Both security inventory packages are set up and run from a protected remote site. The project is directed by a consultant who has earned high-level security credentials and who produces a document that details and interprets the information captured by the scan and proposes cost-effective improvements if called for.

Network Penetration Testing Support Services
Stealth intrusion testing is an important part of any serious IT system security plan. Progent’s security professionals can run extensive penetration checks without the awareness of your company's in-house network support resources. Stealth penetration testing uncovers whether current security defense tools such as intrusion incident alerts and event log analysis are correctly set up and consistently monitored. Find out more concerning Progent's network security penetration testing consulting.

Firewall and Virtual Private Network Support
Progent's expertise in security solutions includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with key networking certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access technology offer a complete range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Find out additional details about Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Support Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and choose the right products from multiple suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis technology to defend endpoints as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which easily evade traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the complete threat lifecycle including protection, infiltration detection, containment, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, device management, and web filtering through cutting-edge technologies packaged within one agent accessible from a single console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates your backup activities and allows fast restoration of critical files, apps and VMs that have become unavailable or damaged due to component failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of top data security companies to provide centralized management and comprehensive protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a further level of analysis for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported easily to a different hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and managing your IT infrastructure documentation, you can save up to half of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you’re making enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Planning
Every business should have a thoroughly considered security strategy that incorporates both preventive processes and reaction plans. The proactive plan is a collection of mechanisms intended to reduce vulnerabilities. The reactive strategy helps your IT security engineers to evaluate the impact resulting from an attack, fix the damage, record the event, and get the IT network restored as rapidly as possible.

Progent's expert IS security engineers are available to assist your company to perform a comprehensive vulnerability evaluation and define a network security plan to establish security processes and controls to mitigate ongoing attacks and threats.

CISM Certified Security Support Assistance
The CISM organization describes the basic competencies and global standards of skill that IT security managers are expected to master. It provides executive management the assurance that those who have earned their CISM certification have the background and capability to deliver effective security management and support consulting. Progent offers the support of CISM qualified security professionals to assist businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Management
Read additional details about Progent's CISM Accredited Security Consulting Services.

CISSP Qualified Security Consulting Expertise
CISSP certification denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information security defined by ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Find out more information about Progent's CISSP Qualified Security Consulting Professionals.

CISSP-ISSAP Accredited Secure System Architecture Consulting Services
Progent's CISSP-ISSAP certified system architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous examination and significant work with information security architecture. The ISSAP credential indicates proven mastery in the most in-depth demands of information system security architecture bounded by the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all aspects of architecture security such as.

  • Access Control Systems and Techniques
  • Phone System and Network Infrastructure Protection
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Find out additional information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Expertise.

CISA Accredited Information System Security Auditing Consulting Expertise
The CISA accreditation is a globally recognized achievement that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive examination given by the ISACA professional association. Progent's CISA-certified security audit experts are available to assist your company in the areas of:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Read additional information concerning Progent's CISA Qualified IS Security Auditing Consulting Services.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's ability to plan, implement, and maintain information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC IT risk mitigation consultants offer a range of risk identification services including:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory statutory, regulatory, and business mandates and company standards related to your information system to assess their possible influence on your business goals
  • Point out possible threats for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your organization appreciate information system risk so they can contribute to your risk control process
  • Connect identified risk vectors to your associated operational processes to help assign risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they are in agreement
Get more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Engineering Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security professionals. GIAC's goal is to verify that a certified professional possesses the knowledge needed to provide support in key areas of system, data, and program security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified IS security audit experts are available to help your company in the areas of:

  • Assessing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read more details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Expert
To see how you can access a certified security engineer for online or on-premises support in North Carolina, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.