Business IT networks in the state of North Dakota can depend on prompt and economical remote help from Progent's certified security consultants to help with urgent security issues. The cost is affordable, charges are per minute, engagement is immediate, and service is world class. Progent also offers help for complex projects that requires the services of seasoned security consultants with high-level industry certifications.

If your North Dakota small business is situated outside of major urban areas like Fargo, Bismark, or Grand Forks, support from nearby certified security experts is often problematic when you have an urgent situation. This can result in a drop in revenue for your business, upset customers, unproductive employees, and distracted executives. By utilizing Progent, you can get in touch with a certified security professional ready to offer assistance when you require it to get your information system on line and restore your data.

Progent can help you at any level in your initiatives to guard your network with support services that can range from network security assessments to developing a comprehensive security strategy. Progent offers affordable support to assist small and midsize companies to design and manage safe networks based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to deliver centralized management and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of inspection for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The local gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.

Progent's security professionals are accessible online or in person to provide a range of urgent or project-based network security services such as:

  • Perform automated network security audits
  • Recover quickly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Configure safe solutions for remote and mobile access
  • Deploy advanced solutions for automatic protection against spam and DHAs
  • Develop a company-wide security strategy with 24x7 security monitoring
  • Offer comprehensive Help Desk Support
  • Help Create an effective network backup and restore strategy centered on Microsoft DPM backup/restore capability
If your network has an urgent need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's engineers can deliver advanced services in vital fields of network protection that include security assessment, firewall and VPN solutions, and high-level security consulting.

Security Evaluation
Progent's certified security engineers can evaluate the effectiveness of your current computer protection implementation by performing comprehensive remote automated testing via advanced utilities and tested techniques. Progent's experience in administering this testing saves you money and offers an objective picture of weaknesses. The knowledge your business gains can form the foundation of a network protection plan that will allow your network to operate safely and react rapidly to new risks.

Automated Network Vulnerability Analysis
Progent offers expertise in the use of security analysis software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably running a variety of programmed system testing checks to identify possible security vulnerabilities. Progent has extensive knowledge of other network auditing products including NMAP, AMAP Application Scanner, eEye, as well as tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can help you build security into your company operations, install scanning software, define and deploy a protected system architecture, and suggest policies to optimize the safety of your network. Progent's security engineers are able to show you how to set up a firewall, design secure remote access to email and data, and install virtual private network. Find out more on Progent's automated security audits.

Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages intended to enable small companies to receive an objective network security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive test of your network from beyond your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized computer inside your company firewall to evaluate the risk to internal threats. Both security inventory packages are set up and executed from a protected remote location. The process is overseen by an engineer with high-level security credentials and who produces a report that details and interprets the information captured by the scan and suggests cost-effective remediation where appropriate.

Stealth Penetration Testing Support Services
Stealth intrusion checking is an important component of any serious network security strategy. Progentís security experts can perform thorough intrusion checks without the awareness of your organization's in-house IT staff. Stealth penetration testing uncovers whether current security defense systems such as intrusion detection warnings and event history monitoring are properly configured and actively monitored. Learn additional information on Progent's stealth security penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with key networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your existing PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and offsite connection technology provide a full line of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Learn additional details concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Products.

Consulting Expertise for Other Firewall and VPN Technology
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security strategy and select the right products from multiple vendors to support your security goals while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that uses the technology of top information security vendors to provide centralized management and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily get by traditional signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a single platform to manage the entire threat progression including filtering, detection, containment, cleanup, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates your backup activities and enables rapid recovery of critical files, apps and virtual machines that have become unavailable or damaged due to component breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

Expert Network Security Consulting
Any business ought to develop a carefully considered security strategy that includes both preventive processes and response planning. The proactive strategy is a set of steps intended to minimize security weaknesses. The post-attack strategy assists your company's network security personnel to assess the damage caused by a security penetration, fix the network, document the event, and get the IT network running as quickly as possible.

Progent's certified IT security engineers are available to assist your company to perform a complete risk evaluation and define a company-wide security strategy to implement security policies and mechanisms to minimize future attacks and threats.

CISM Certified Security Consulting Expertise
The CISM organization defines the core competencies and international standards of skill that information security managers are expected to master. CISM gives business management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to deliver effective security administration and consulting consulting. Progent can provide the support of CISM certified security consultants to help companies with:

  • Network Security Processes
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Read more information about Progent's CISM Network Security Engineering Expertise.

CISSP Certified Security Consulting Support
The CISSP credential denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information security stipulated by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your organization in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Find out additional details concerning Progent's CISSP-certified IS Security Consulting Expertise.

ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's ISSAP certified network architecture professionals are consultants who have earned ISSAP status through thorough examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the more complex demands of IS security architecture bounded by the wider scope of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Find out additional details about Progent's ISSAP Qualified Secure Network Architecture Support Expertise.

CISA Certified IS Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that represents expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive examination given by the ISACA professional association. Progent's CISA network security audit experts are available to help your business in the areas of:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Architecture Lifecycle
  • IT Support
  • Protecting Information Assets
  • Disaster Recovery Planning
Find out the details about Progent's CISA Accredited IS Security Auditing Consulting Assistance.

CRISC Experts
The CRISC program was established by ISACA to verify a consultant's skills to design, deploy, and support IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to create and execute a business continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk management consultants offer a variety of risk evaluation services including:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Inventory statutory, regulatory, and business mandates and company policies associated with your information system to assess their possible impact on your business goals
  • Identify possible vulnerabilities for your operational workflows to help in analyzing your corporate risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders appreciate IT risk so they can assist with your risk control program
  • Match key risk vectors to related operational procedures to help determine risk responsibility
  • Validate risk appetite with executive leadership and major stakeholders to make sure they align
Learn additional information about Progent's CRISC Consultants.

GIAC Qualified Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security professionals. GIAC's mission is to make sure that a certified security consultant has the knowledge appropriate to deliver services in vital areas of network, information, and application software security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified IS security audit consultants are available to assist your business with:

  • Assessing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Support.

Contact a Progent Security Expert
To learn how to contact a certified security consultant for online or on-premises support in North Dakota, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.