Business computer networks in the state of North Dakota can now get quick and affordable remote help from Progent's accredited security support specialists to help with urgent security issues. The cost is affordable, billing is by the minute, sign-up is immediate, and service is unbeatable. Progent also provides help for long-term engagements that requires the knowledge of seasoned security engineers with top security certifications.

In case your North Dakota company is located some distance from larger metropolitan areas including Fargo, Bismark, or Grand Forks, help from nearby qualified network security consultants could be limited when there's a crisis. This could mean a drop in income for your company, upset customers, unproductive workers, and defocused management. By calling Progent's online services, you have access to a certified security consultant ready to offer assistance when you have to have it to get your system on line and restore your data.

Progent can help you in all your initiatives to defend your information system with services that ranges from security audits to developing a company-wide security plan. Progent offers economical support to help companies of any size to configure and maintain safe networks based on Microsoft Windows and Cisco products and that may include computers running UNIX or Linux operating systems as well as BYOD users with Apple handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to provide centralized management and world-class security for your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.

Progent's certified experts are accessible remotely or on site to offer a range of urgent or longer-term network security services such as:

  • Run extensive security audits
  • Recover promptly after attacks
  • Configure firewalls from multiple vendors
  • Configure safe solutions for remote and mobile access
  • Install effective applications for automatic defense against viruses, spam and DHAs
  • Develop a comprehensive security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Support
  • Develop a practical backup and recovery plan centered on Microsoft DPM backup/restore technology
If your company has an urgent need for IT security help, go to Progent's Emergency Online Network Support.

Progent's consultants can deliver world-class support in vital fields of computer protection including auditing, firewall/VPN support, and high-level security planning.

Security Evaluation
Progent's certified security engineers can evaluate the strength of your existing network security systems by performing exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's skill in this service saves your company time and money and offers an objective portrayal of weaknesses. The information your business gains can be used as the basis of a network protection plan that will permit your information system to operate safely and respond rapidly to new risks.

Automated Network Security Assessment
Progent provides expertise in the use of security evaluation utilities such as MBSA and GFI LANguard Network Security Scanner for economically running a set of programmed system auditing checks to uncover possible security holes. Progent has broad experience with additional security auditing tools such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as SolarWinds, Netcat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design protection into your business operations, install auditing applications, plan and deploy a protected system environment, and suggest policies to maximize the security of your IT system. Progent's security consultants are available to show you how to configure a firewall, design secure remote access to email and business applications, and install virtual private network. Learn more on Progent's automated security evaluation.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small businesses to receive an objective network security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your network from outside your firewalled perimeter to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized machine within your firewall to determine your exposure to internal assaults. Both security inventory services are configured and executed from a protected external location. The process is managed by a consultant who has earned high-level security credentials and who produces a report that summarizes and analyzes the information collected by the security scan and proposes practical remediation if appropriate.

Stealth Intrusion Testing Consulting
Stealth intrusion testing is a key part of any successful network security plan. Progentís security professionals can run thorough intrusion tests without the awareness of your organization's in-house network support staff. Unannounced penetration checking uncovers whether current security defense systems such as intrusion incident alerts and event history analysis are properly set up and consistently checked. Find out additional information about Progent's network security penetration analysis consulting.

Firewalls and VPN Expertise
Progent's background in security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important networking accreditations including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote connection technology provide a complete range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Learn additional information about Progent's Engineering Services for Cisco Security Technology and VPN Products.

Consulting Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies including Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and select appropriate technologies from a variety of suppliers to achieve your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis technology to guard endpoint devices and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a single platform to address the complete malware attack lifecycle including blocking, detection, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer affordable in-depth security for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified control. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you achieve and demonstrate compliance with legal and industry information security standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent's consultants can also help your company to install and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of vital data, applications and VMs that have become lost or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security companies to provide web-based control and comprehensive protection for your email traffic. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper level of inspection for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to have a carefully considered security strategy that includes both proactive processes and response plans. The pre-attack strategy is a set of mechanisms intended to reduce security weaknesses. The post-attack strategy assists your network security engineers to evaluate the damage caused by an attack, fix the system, record the event, and get the IT network operational as soon as feasible.

Progent's certified IS security consultants are available to help your business to run a complete risk evaluation and define a network security strategy to establish security policies and controls to mitigate future attacks and threats.

CISM Accredited Information Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and worldwide standards of performance that information security managers are expected to master. It gives executive management the confidence that those who have qualified for their CISM certification have the experience and knowledge to deliver effective security administration and support services. Progent can provide the expertise of CISM qualified security consultants to help businesses with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Implementation Management
  • Network Security Administration
  • Recovery Management
Find out additional information about Progent's CISM Certified Network Security Support Expertise.

CISSP Accredited Security Engineering Support
The CISSP credential recognizes expertise with a global standard for network security. ANSI has granted the CISSP credential recognition in the field of information security under ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional information about Progent's CISSP IS Security Support Professionals.

ISSAP Certified Secure System Architecture Engineering Services
Progent's ISSAP qualified information system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and significant work with information security design. The ISSAP credential represents proven mastery in the most in-depth requirements of information security architecture bounded by the wider field of IS security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your business with all phases of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Read additional information concerning Progent's ISSAP Accredited Secure IT Architecture Support Services.

CISA Certified Information System Security Auditing Engineering Services
The CISA accreditation is a prestigious qualification that signifies mastery in network security auditing. Accredited by ANSI, the CISA credential has consultants undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA-certified security audit experts can assist your business with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Preparedness
Find out more information about Progent's CISA Qualified Information System Security Auditing Engineering Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's ability to design, deploy, and maintain information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation experts offer a variety of risk evaluation services such as:

  • Collect information and study documentation to evaluate significant vulnerabilities
  • Identify statutory, regulatory, and contractual requirements and organizational standards related to your information system to determine their possible influence on your strategic goals
  • Point out potential threats for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your organization understand IT risk so they can contribute to your risk control program
  • Connect key risk scenarios to related operational processes to help determine risk responsibility
  • Validate risk appetite with executive management and major stakeholders to make sure they are in agreement
Learn more information about Progent's CRISC Consultants.

GIAC Qualified Network Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to verify that an accredited professional has the knowledge needed to deliver services in vital categories of network, information, and application security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC security audit specialists are available to assist your IT organization with:

Find out additional details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Specialist
To find out how to get in touch with a certified Progent security engineer for remote or on-premises support in North Dakota, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.