Small business networks in the state of North Dakota can depend on fast and affordable remote help from Progent's qualified security engineers to assist with urgent security problems. Rates are competitive, billing is by the minute, sign-up is fast, and service is world class. Progent also offers help for complex projects that requires the services of senior security engineers with high-level industry certifications.

In case your North Dakota business is situated outside of more populated urban neighborhoods such as Fargo, Bismark, or Grand Forks, help from local accredited network security experts could be limited during a security disaster. This can cause a drop in productivity for your company, angry clients, idle workers, and distracted executives. By calling Progent, you have access to a qualified security engineer who can offer expertise when you require it to keep your network running and recover your information.

Progent can help you in all your efforts to protect your information system with support services that ranges from network security audits to creating a comprehensive security strategy. Progent provides economical service to assist small and midsize companies to configure and maintain secure networks based on Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further level of analysis for incoming email. For outbound email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite gateway can also enable Exchange Server to track and safeguard internal email that originates and ends within your security perimeter.

Progent's security engineers are available remotely or on site to offer a range of urgent or project-based computer security services including:

If your business has an emergency requirement for IT security help, go to Progent's Emergency Online Network Help.

Progent's engineers offer world-class support in vital facets of system security that include security evaluation, firewalls and VPN, and advanced security consulting.

System Security Evaluation
Progent's expert security engineers can evaluate the effectiveness of your existing network protection environment through exhaustive remote automated testing based on sophisticated software tools and tested procedures. Progent's experience in administering this testing saves you time and money and assures an accurate picture of weaknesses. The information your IT organization is provided can make up the basis of a network protection plan that will permit your information system to run dependably and react rapidly to new risks.

Automated Security Analysis
Progent provides expertise in the application of security analysis software including Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a variety of programmed network testing scans to uncover possible security weaknesses. Progent has broad knowledge of other network analysis utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you build protection into your company processes, install auditing tools, plan and implement a protected system architecture, and recommend policies to optimize the security of your IT system. Progent's security engineers are available to help you configure a firewall, design safe remote connectivity to email and business applications, and integrate VPN. Learn additional information about Progent's network security audits.

Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory service packages intended to allow small companies to receive an objective security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from outside your company firewall to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a network scan from a secure machine inside your company firewall to determine vulnerabilities to inside attacks. The two security inventory services are set up and run from a secured external site. The process is directed by an engineer with high-level security accreditations and who generates a report that details and interprets the information captured by the security scan and suggests cost-effective remediation if appropriate.

Network Security Penetration Testing Support Services
Stealth penetration checking is a key part of any successful network security strategy. Progentís security professionals can perform thorough penetration tests without the awareness of your company's internal network support staff. Stealth penetration checking shows whether existing security defense systems such as intrusion detection alerts and event log analysis are correctly set up and actively monitored. Learn additional information concerning Progent's network security penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security solutions includes in-depth field work with major firewalls and VPN technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned key networking accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and remote access technology provide a comprehensive line of manageable security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Read more details about Progent's Consulting Services for Cisco Security Technology and VPN Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a detailed security strategy and choose appropriate products from multiple suppliers to support your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to automate the entire malware attack progression including blocking, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback using Windows VSS and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge technologies packaged within one agent accessible from a unified console. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent can also help you to install and verify a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital data, apps and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top information security vendors to provide web-based management and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a deeper level of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to 50% of time wasted searching for vital information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Network Security Planning
Any business ought to have a carefully thought out security strategy that includes both preventive procedures and response plans. The proactive plan is a set of mechanisms intended to reduce vulnerabilities. The post-attack strategy helps your company's network security personnel to evaluate the damage resulting from an attack, fix the network, document the experience, and get business functions running as rapidly as feasible.

Progent's expert information security consultants are available to help your business to run a full vulnerability evaluation and define a computer security plan to implement security policies and controls to reduce future attacks and threats.

CISM Qualified System Security Consulting Expertise
The CISM organization defines the basic capabilities and worldwide standards of performance that information security professionals are expected to learn. CISM provides business management the confidence that consultants who have qualified for their CISM credential possess the experience and capability to deliver efficient security administration and support consulting. Progent offers the services of CISM certified security consultants to assist businesses with:

  • Information Security Processes
  • Risk Management
  • Information Security Program Management
  • Network Security Management
  • Response Management
Find out additional details about Progent's CISM Information Security Engineering Expertise.

CISSP Accredited Security Engineering Services
CISSP certification denotes expertise with an international standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data protection defined by ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas such as:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Find out additional details about Progent's CISSP Qualified Cybersecurity Consulting Expertise.

CISSP-ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP qualified information system architecture engineers are experts who have earned ISSAP status as a result of thorough examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the more in-depth demands of IS security architecture within the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture such as.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Needs Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Find out more information about Progent's ISSAP Certified Secure Information System Architecture Support Professionals.

CISA Certified Security Auditing Engineering Support
The Certified Information Systems Auditor credential is a globally recognized achievement that indicates expertise in IS security auditing. Accredited by ANSI, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA professional association. Progent's CISA information security audit experts are available to help your company in the areas of:

  • IS Audit Process
  • Information Technology Administration
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISA Accredited Security Auditing Engineering Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's ability to plan, implement, and maintain information system controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and execute a workplace continuity strategy based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation experts can provide a range of risk evaluation services such as:

  • Collect information and study documentation to help identify significant risk scenarios
  • Inventory legal, industry, and contractual requirements and organizational standards associated with your network to assess their possible influence on your strategic objectives
  • Identify potential vulnerabilities for your business processes to assist in analyzing your enterprise risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders understand IT risk so they can contribute to your risk management process
  • Connect identified risk vectors to related business procedures to help determine risk responsibility
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Learn more information concerning Progent's CRISC Risk Management Consultants.

GIAC Certified Information System Security Engineering Support
GIAC was founded in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to ensure that a certified security consultant possesses the knowledge needed to provide services in critical categories of system, data, and software security. GIAC certifications are recognized by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC IS security audit consultants are available to assist your business with:

Find out more details about Progent's GIAC Information Assurance Support.

Contact a Certified Progent Security Specialist
To learn how you can contact a security engineer for remote or on-premises assistance in North Dakota, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.