Company networks in the state of North Dakota can now get prompt and economical remote technical support from Progent's certified network security consultants to help with urgent security issues. The cost is competitive, charges are per minute, sign-up is quick, and support is world class. Progent also offers help for long-term projects that demand the services of senior security engineers with top industry credentials.

In case your North Dakota business is situated some distance from larger metropolitan areas such as Fargo, Bismark, or Grand Forks, access to local certified security engineers may be problematic during a crisis. This could mean a loss of income for your business, angry customers, idle workers, and distracted management. By utilizing Progent's online services, you can get in touch with a qualified security consultant ready to provide expertise whenever you require it to keep your information system running and restore your data.

Progent can assist you in all your efforts to protect your IT environment with support ranging from security audits to developing a comprehensive security plan. Progent provides affordable service to assist businesses of all sizes to design and manage secure IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security vendors to provide centralized management and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a further level of inspection for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email traffic that stays within your security perimeter.

Progent's security consultants are accessible online or on premises to provide a range of urgent or project-based computer security services which include:

If your business has an immediate need for IT security support, refer to Progent's Emergency Remote Network Support.

Progent's support professionals offer world-class support in key fields of computer protection that include security assessment, firewall and VPN expertise, and high-level security consulting.

Security Assessment
Progent's expert security consultants can assess the effectiveness of your existing network protection systems through exhaustive remote automated analysis via sophisticated software tools and tested procedures. Progent's experience in administering this testing saves your company consulting fees and assures a detailed portrayal of gaps. The knowledge your company gains can form the basis of a security strategy that will permit your information system to run safely and adapt quickly to new risks.

Automated Vulnerability Assessment
Progent offers consulting in the application of security analysis utilities such as MBSA and LANguard from GFI for affordably performing a variety of automatic system auditing scans to identify possible security vulnerabilities. Progent has extensive knowledge of other network auditing tools including NMAP, AMAP application mapper, eEye, as well as utilities like Metasploit, Netcat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you build protection into your business processes, install auditing applications, plan and deploy a secure system architecture, and recommend policies to maximize the safety of your IT system. Progent's security consultants are ready to assist you to configure a firewall, implement safe remote connectivity to email and data, and install VPN. Find out additional information concerning Progent's automated security evaluation.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles intended to allow small businesses to receive an impartial security assessment from a qualified security expert. With Progent's External Security Inventory Scan, a security expert administers a comprehensive examination of your network from beyond your firewall to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized machine within your firewall to determine the risk to internal threats. Both security inventory services are set up and executed from a secured external site. The project is overseen by a consultant with high-level security accreditations and who generates a report that details and interprets the information captured by the security scan and suggests practical improvements where appropriate.

Stealth Penetration Analysis Support Services
Stealth intrusion testing is a key part of any successful network security plan. Progentís security professionals can perform extensive penetration tests without the awareness of your organization's in-house IT resources. Stealth penetration testing uncovers whether existing security defense tools such as intrusion detection alerts and event log analysis are correctly configured and consistently monitored. Learn more on Progent's network security penetration testing support services.

Firewall/VPN Solutions
Progent's background in security technology encompasses extensive field work with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the services of consultants with important industry certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your current PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Security and Virtual Private Network Consulting Services
Cisco's network security and remote access products offer a comprehensive range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and CCNP qualifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Find out more details concerning Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent offers small and medium size companies professional support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security plan and select appropriate technologies from multiple suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning technology to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to automate the entire threat lifecycle including filtering, detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering via leading-edge technologies incorporated within one agent managed from a unified console. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP deployment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent's consultants can also help you to set up and verify a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed service for secure backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of critical data, applications and VMs that have become lost or damaged as a result of component failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local device, or to both. Progent's BDR consultants can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can help you to restore your business-critical information. Learn more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security companies to provide centralized management and comprehensive protection for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a first line of defense and keeps most threats from reaching your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper level of analysis for incoming email. For outgoing email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to an alternate hosting environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSLs or domains. By updating and organizing your network documentation, you can eliminate up to half of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Planning
Every business ought to develop a thoroughly thought out security strategy that includes both pre-attack processes and reaction plans. The pre-attack strategy is a collection of mechanisms designed to reduce security weaknesses. The reactive plan helps your company's security personnel to assess the impact resulting from an attack, fix the system, document the experience, and get the IT network running as soon as possible.

Progent's certified information security engineers are available to help your business to perform a complete vulnerability evaluation and create a company-wide security plan to implement security processes and controls to minimize ongoing assaults and dangers.

CISM Certified Network Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and worldwide standards of performance that information security professionals are required to learn. It provides executive management the assurance that those who have qualified for their CISM certification have the experience and knowledge to provide effective security administration and support consulting. Progent can provide the expertise of CISM qualified security consultants to help businesses with:

  • IS Security Processes
  • Risk Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Management
Read additional information concerning Progent's CISM Qualified Security Consulting Expertise.

CISSP Accredited Security Engineering Support
CISSP certification recognizes expertise with an international standard for information security. ANSI has awarded the CISSP credential recognition in the area of information security defined by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your organization in a variety security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Find out more details concerning Progent's CISSP-certified IS Security Engineering Services.

ISSAP Accredited Secure Information System Architecture Consulting Assistance
Progent's ISSAP qualified information system architecture engineers are consultants who have earned ISSAP status through rigorous testing and significant experience with information security architecture. The ISSAP certification indicates demonstrated competence in the most complex demands of information security architecture within the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your business with all phases of architecture security such as.

  • Access Control Systems and Methodologies
  • Telecom and System Infrastructure Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Find out more details about Progent's ISSAP Certified Secure System Architecture Engineering Professionals.

CISA Certified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is an important qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified IS security audit experts can help your company with:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Assets
  • Disaster Recovery Planning
Read additional details about Progent's CISA Certified IS Security Auditing Consulting Services.

CRISC Experts
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and maintain IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to create and carry out a business continuity plan that follows leading practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk management specialists offer a range of risk assessment services including:

  • Collect data and study documentation to help identify significant vulnerabilities
  • Identify legal, industry, and contractual mandates and organizational policies related to your information system to assess their potential influence on your business objectives
  • Identify potential threats for your operational workflows to help in evaluating your corporate risk
  • Develop a risk awareness program and provide seminars to ensure your organization appreciate information system risk so they can assist with your risk control program
  • Connect key risk scenarios to related operational procedures to help assign risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to make sure they align
Find out additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's mission is to verify that a certified professional possesses the skills needed to provide services in vital areas of system, information, and software security. GIAC certifications are acknowledged by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified information security audit experts can assist your business in the areas of:

  • Assessing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Specialist
To find out how you can get in touch with a certified Progent security consultant for online or onsite support in North Dakota, phone 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.