Company IT networks in the state of North Dakota now have prompt and economical online access to Progent's certified network security professionals to assist with complex security problems. Rates are affordable, charges are per minute, engagement is fast, and service is world class. Progent also provides assistance for complex projects that demand the services of senior security consultants with high-level security certifications.

If your North Dakota company is outside of larger metropolitan neighborhoods such as Fargo, Bismark, or Grand Forks, support from nearby qualified security consultants is often limited when there's an emergency. This could mean a drop in income for your company, angry customers, idle employees, and distracted executives. By contacting Progent's remote support, you can get in touch with a qualified security professional ready to offer assistance when you require it to keep your network running and salvage your data.

Progent can help you in a variety of ways in your initiatives to defend your IT environment with support that can range from network security checks to developing a company-wide security strategy. Progent offers affordable service to help businesses of all sizes to design and manage protected IT environments powered by Microsoft Windows and Cisco products and that may include computers running UNIX or Linux operating systems plus BYOD clients with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security companies to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a further level of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also enable Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall.

Progent's certified professionals are accessible remotely or in person to provide a variety of urgent or longer-term IT security services which include:

If your company has an urgent requirement for computer security support, go to Progent's Urgent Online Technical Support.

Progent's engineers can deliver world-class support in key areas of computer protection that include auditing, firewall/VPN support, and high-level security consulting.

System Assessment
Progent's certified security consultants can assess the strength of your existing computer security systems through exhaustive remote automated analysis via sophisticated utilities and proven techniques. Progent's skill in this testing saves you consulting fees and offers an accurate portrayal of weaknesses. The information your business is provided can make up the foundation of a security plan that will permit your information system to operate safely and adapt rapidly to new risks.

Automated Network Security Analysis
Progent provides expertise in the application of security auditing utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a variety of automatic network testing scans to identify possible security gaps. Progent has broad knowledge of additional network analysis products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can help you build security into your business processes, install scanning tools, plan and deploy a secure system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are ready to assist you to configure a firewall, implement secure remote access to email and business applications, and integrate VPN. Learn more on Progent's automated security assessment.

Security Inventory Service Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles designed to enable small businesses to receive an objective network security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, an engineer runs a comprehensive test of your IT infrastructure from outside your firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your company firewall to evaluate the risk to inside assaults. Both security inventory services are configured and executed from a secured remote site. The project is overseen by a consultant who has earned top security accreditations and who generates a document that details and analyzes the data captured by the security scan and proposes practical remediation where appropriate.

Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any successful network security plan. Progentís security professionals can perform extensive intrusion checks without the awareness of your company's in-house network support staff. Stealth penetration testing shows whether current security monitoring tools such as intrusion incident warnings and event history monitoring are properly configured and actively checked. Learn additional information on Progent's stealth penetration testing consulting.

Firewall/VPN Solutions
Progent's expertise in network security solutions includes in-depth field work with major firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Security and Virtual Private Network Consulting Services
Cisco's security and offsite access technology offer a full range of manageable security solutions to help protect your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco CCIE and CCNP certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business goals. Read more information about Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and medium size companies expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies such as WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security plan and select the right products from multiple vendors to achieve your security objectives while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a portfolio of affordable, set-price monthly managed services designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway device adds a further layer of inspection for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes next generation behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to manage the complete threat progression including blocking, identification, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of vital data, applications and VMs that have become lost or damaged due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight DPS to be compliant with regulatory requirements such as IPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Backup.

Expert Security Design
Every business ought to develop a carefully considered security program that includes both preventive processes and reaction planning. The pre-attack strategy is a set of procedures designed to minimize vulnerabilities. The reactive plan helps your company's network security engineers to evaluate the impact caused by a security penetration, fix the system, document the event, and get the IT network restored as soon as feasible.

Progent's certified IT security engineers are available to assist you to perform a full risk evaluation and define a company-wide security plan to establish security processes and mechanisms to reduce ongoing assaults and threats.

CISM Accredited Security Engineering Assistance
The CISM organization describes the core competencies and international standards of skill that IT security managers are required to master. It provides business management the assurance that consultants who have earned their CISM certification have the experience and knowledge to provide efficient security management and consulting services. Progent offers the services of CISM qualified security professionals to assist companies with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Find out more details about Progent's CISM Network Security Consulting Services.

CISSP Certified Security Engineering Support
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI has granted certification recognition in the area of data protection stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your business in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Read more information concerning Progent's CISSP Accredited IS Security Support Expertise.

ISSAP Qualified Secure Network Architecture Engineering Support
Progent's ISSAP qualified system architecture engineers are experts who have been awarded ISSAP status as a result of thorough testing and extensive work with information security design. The ISSAP credential represents proven mastery in the more challenging requirements of IS security architecture bounded by the wider field of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security including.

  • Access Management Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Data Encryption Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out additional details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Expertise.

CISA Certified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates mastery in network security audit and control. Accredited by ANSI, the CISA accreditation has consultants undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified information security audit engineers are available to help your company with:

  • IS Audit Process
  • Information Technology Administration
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get the details concerning Progent's CISA Certified Network Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to design, implement, and maintain IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk management engineers offer a range of risk assessment services including:

  • Gather data and study documentation to identify major risk scenarios
  • Identify statutory, regulatory, and contractual mandates and organizational standards associated with your network to assess their possible impact on your business objectives
  • Point out possible threats for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct training to make sure your organization appreciate information system risk so they can assist with your risk management program
  • Match key risk scenarios to your associated business processes to help determine risk ownership
  • Determine risk tolerance with executive leadership and key stakeholders to ensure they are in agreement
Read additional information concerning Progent's CRISC Experts.

GIAC Qualified Network Security Engineering Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security engineers. GIAC's mission is to assure that an accredited security consultant possesses the knowledge needed to deliver services in key categories of network, information, and application security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC information security audit experts can assist your business with:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn additional information about Progent's GIAC Information Assurance Support.

Talk to a Certified Progent Security Expert
To see how to access a certified security consultant for online or onsite assistance in North Dakota, call 1-800-993-9400 or visit Online Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.