Business networks in the state of North Dakota can now get quick and affordable remote technical support from Progent's accredited security engineers to fix the toughest security issues. Rates are reasonable, billing is per minute, sign-up is quick, and service is world class. Progent also provides assistance for complex engagements that requires the expertise of senior security consultants with top security credentials.

If your North Dakota organization is outside of major metropolitan areas such as Fargo, Bismark, or Grand Forks, access to nearby qualified network security professionals is often limited when there's a crisis. This can result in lost revenue for your business, upset clients, unproductive employees, and distracted management. By calling Progent's remote support, you can get in touch with a certified security engineer ready to provide help whenever you require it to keep your information system running and recover your information.

Progent can help you in your efforts to protect your information system with support services ranging from network security assessments to creating a comprehensive security strategy. Progent provides affordable service to help small and midsize companies to design and maintain safe IT environments based on Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security companies to provide centralized control and comprehensive protection for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The local gateway can also enable Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's security experts are available remotely or on site to offer a range of urgent or project-based computer security services including:

  • Perform extensive network security audits
  • Recuperate quickly after attacks
  • Install and troubleshoot firewalls
  • Implement secure techniques for remote and mobile access
  • Deploy effective applications for automatic protection against viruses, spam and DHAs
  • Help create a company-wide security plan with round-the-clock monitoring
  • Provide comprehensive Help Desk Services
  • Help Create an effective backup and business continuity solution built around Data Protection Manager (DPM) backup technology
If your network has an emergency requirement for IT security help, refer to Progent's Emergency Remote Network Help.

Progent's security experts offer advanced support in key facets of network protection that include security evaluation, firewalls and VPN, and high-level security consulting.

System Audits
Progent's certified security engineers can assess the vulnerability of your existing network security environment by performing exhaustive remote automated analysis based on sophisticated software tools and proven techniques. Progent's skill in this service saves your company time and money and offers a detailed picture of security holes. The knowledge your company is provided can make up the basis of a network protection plan that can permit your network to operate dependably and react quickly to future threats.

Automated Vulnerability Evaluation
Progent provides consulting in the use of security auditing utilities such as MBSA and LANguard from GFI for economically performing a set of programmed system auditing scans to uncover possible security holes. Progent has broad knowledge of additional network analysis utilities such as NMAP, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to build security into your company processes, configure scanning software, define and deploy a protected network architecture, and recommend procedures to maximize the security of your network. Progent's security professionals are able to assist you to configure a firewall, implement safe remote access to email and data, and install VPN. Find out more about Progent's automated security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles intended to enable small businesses to get an independent security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your network from outside your company firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, an engineer runs a network scan from an authorized machine inside your company firewall to determine your exposure to internal assaults. The two security inventory services are configured and run from a secured remote location. The project is directed by a consultant who has earned top security credentials and who produces a report that details and analyzes the data collected by the security scan and proposes practical remediation where appropriate.

Stealth Penetration Analysis Consulting
Stealth penetration testing is a key component of any comprehensive network security strategy. Progentís security experts can perform thorough penetration tests without the knowledge of your company's internal network support staff. Stealth penetration testing shows whether current security defense systems such as intrusion incident alerts and event log monitoring are correctly configured and actively checked. Find out additional information concerning Progent's network penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your legacy PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Support Services
Cisco's network security and remote access technology represent a complete range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Read more information concerning Progent's Consulting Services for Cisco Security and VPN Appliances.

Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations professional support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security strategy and choose appropriate technologies from a variety of vendors to achieve your security objectives while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security vendors to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more details, see ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to defend endpoints and physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the complete malware attack lifecycle including protection, detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup processes and enables rapid restoration of critical data, apps and VMs that have become lost or corrupted due to hardware failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect data about your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need when you need it. Learn more about ProSight IT Asset Management service.

Certified Network Security Design
Every company should have a carefully considered security program that incorporates both preventive processes and reaction plans. The pre-attack plan is a collection of procedures designed to reduce vulnerabilities. The reactive plan helps your security personnel to assess the damage caused by a security penetration, fix the damage, document the experience, and get business functions operational as quickly as feasible.

Progent's certified IS security engineers are available to help you to perform a complete vulnerability evaluation and create a network security strategy to implement security policies and controls to reduce ongoing assaults and threats.

CISM Accredited Information Security Consulting Assistance
The CISM organization defines the basic competencies and international standards of performance that IT security professionals are required to master. CISM provides business management the confidence that consultants who have qualified for their CISM certification have the experience and knowledge to provide effective security management and support services. Progent offers the expertise of CISM qualified security consultants to assist companies with:

  • IS Security Governance
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Management
Find out additional information about Progent's CISM Qualified Network Security Support Services.

CISSP Accredited Security Consulting Assistance
The CISSP credential denotes mastery of an international standard for network security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of data protection under ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security fields such as:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISSP Accredited Network Security Consulting Expertise.

ISSAP Certified Secure IT Architecture Engineering Expertise
Progent's ISSAP certified system architecture professionals are consultants who have earned ISSAP status through thorough testing and extensive work with network security architecture. The ISSAP certification represents proven competence in the most in-depth demands of information system security architecture within the wider field of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your company with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Read more details concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Professionals.

CISA Certified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a globally recognized qualification that represents mastery in IS security auditing. Accredited by ANSI, the CISA accreditation has consultants pass a comprehensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit experts are available to help your company with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Get more details about Progent's CISA Qualified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a business continuity plan based on leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management experts can provide a range of risk evaluation services including:

  • Gather information and review documentation to identify major vulnerabilities
  • Identify legal, regulatory, and business requirements and organizational standards associated with your network to determine their potential impact on your strategic objectives
  • Identify possible vulnerabilities for your business workflows to assist in analyzing your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your organization understand IT risk so they can contribute to your risk management program
  • Match identified risk vectors to your associated business procedures to help determine risk responsibility
  • Validate risk tolerance with your senior management and key stakeholders to make sure they align
Find out more information about Progent's CRISC Consultants.

GIAC Qualified Security Engineering Expertise
GIAC was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to make sure that a certified security consultant has the skills necessary to deliver services in vital categories of network, data, and program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC information security audit consultants can assist your business with:

  • Assessing Networks
  • Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Expert
To see how to contact a Progent security engineer for online or on-premises help in North Dakota, phone 1-800-993-9400 or visit Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.