Small business computer networks in the state of North Dakota can have quick and economical online help from Progent's certified security professionals to assist with the toughest security problems. Rates are affordable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also provides assistance for long-term projects that demand the knowledge of seasoned security engineers with high-level security credentials.

In case your North Dakota office is based away from major metropolitan areas including Fargo, Bismark, or Grand Forks, support from nearby qualified security consultants could be limited during an urgent situation. This could mean lost revenue for your business, angry clients, idle employees, and distracted management. By calling Progent's online services, you have access to a certified security consultant ready to deliver assistance when you need it to keep your network on line and restore your information.

Progent can assist you in all your efforts to guard your information system with support services that can range from network security audits to developing a comprehensive security plan. Progent offers economical service to assist companies of any size to configure and maintain secure networks powered by Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the technology of top data security vendors to deliver web-based management and comprehensive security for all your email traffic. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper level of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, DLP, and encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's security professionals are available online or in person to provide a variety of urgent or project-based computer security services which include:

  • Run thorough security evaluations
  • Recover promptly after virus and worm attacks
  • Configure hardware and software firewalls
  • Implement secure solutions for offsite and mobile access
  • Install advanced solutions for defense against viruses, spam and directory harvest attacks
  • Help create a company-wide security strategy with proactive network monitoring
  • Offer outsourced Help Desk Services
  • Develop an effective backup and disaster recovery strategy based on Microsoft DPM backup capability
If your business has an emergency need for IT security support, go to Progent's Urgent Remote Network Help.

Progent's support professionals offer advanced support in key facets of network security that include security assessment, firewall and VPN solutions, and high-level security consulting.

Security Audits
Progent's expert security consultants can evaluate the strength of your existing computer security environment through comprehensive remote automated analysis based on advanced software tools and proven techniques. Progent's experience in administering this testing saves your company money and offers an accurate picture of system vulnerability. The information your IT organization is provided can form the basis of a network protection plan that can permit your network to operate safely and adapt quickly to new risks.

Automated Vulnerability Analysis
Progent provides consulting in the use of security auditing utilities such as MBSA and LANguard from GFI for affordably performing a variety of programmed system testing checks to identify potential security gaps. Progent has extensive knowledge of additional security analysis products such as NMAP, AMAP application mapper, eEye, plus tools such as Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.

Progent can help you design protection into your company processes, install scanning software, plan and implement a protected system environment, and recommend procedures to maximize the security of your IT system. Progent's security engineers are able to help you configure a firewall, implement safe remote access to email and data, and install VPN. Learn more about Progent's automated security assessment.

Security Inventory Service Packages for Small Businesses
Progent offers two low-cost security inventory scanning bundles intended to allow small businesses to get a professional security assessment from a qualified security engineer. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from beyond your firewall to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from an authorized computer within your company firewall to evaluate the risk to internal assaults. The two security inventory services are set up and run from a secured external site. The process is directed by an engineer who has earned high-level security credentials and who produces a document that summarizes and interprets the data captured by the security scan and proposes cost-effective remediation where appropriate.

Network Security Penetration Testing Support Services
Stealth penetration testing is a key component of any comprehensive network security strategy. Progent’s security experts can run thorough penetration checks without the awareness of your organization's internal network support resources. Unannounced penetration testing shows whether current security defense systems such as intrusion incident alerts and event log analysis are correctly configured and actively checked. Find out more concerning Progent's stealth penetration analysis support services.

Firewall/VPN Solutions
Progent's background in network security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote access products represent a complete line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Learn more information about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Services for Additional Firewall and VPN Products
Progent provides small and medium size businesses expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper, and SonicWALL. Progent can help you create a detailed security strategy and select appropriate products from multiple suppliers to achieve your security objectives while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely get by traditional signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to automate the complete threat progression including filtering, identification, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies incorporated within one agent accessible from a unified control. Progent's security and virtualization experts can assist your business to plan and implement a ProSight ESP environment that meets your company's unique requirements and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also assist you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of vital files, applications and VMs that have become unavailable or damaged due to component failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top information security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of inspection for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect data related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By updating and organizing your network documentation, you can eliminate up to 50% of time spent looking for vital information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether you’re making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Security Planning
Any business ought to have a thoroughly thought out security program that includes both preventive processes and reaction planning. The pre-attack strategy is a collection of steps intended to minimize security weaknesses. The reactive plan helps your network security personnel to assess the impact resulting from a security penetration, fix the system, document the experience, and get business functions running as rapidly as feasible.

Progent's expert IT security consultants are available to assist you to perform a full risk evaluation and define a network security strategy to implement security policies and controls to mitigate ongoing attacks and threats.

CISM Certified Information Security Support Assistance
The Certified Information Security Manager (CISM) committee defines the core competencies and worldwide standards of skill that information security professionals are required to master. It gives executive management the assurance that consultants who have qualified for their CISM certification possess the background and capability to provide efficient security management and support services. Progent can provide the services of CISM qualified security professionals to help businesses with:

  • IS Security Governance
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Management
  • Recovery Management
Find out more information about Progent's CISM Certified Network Security Engineering Expertise.

CISSP Accredited Security Consulting Services
The CISSP credential denotes mastery of an international standard for network security. The American National Standards Institute has awarded certification accreditation in the field of information protection under ISO 17024. Progent offers access to of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security areas including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Find out more information about Progent's CISSP Security Engineering Professionals.

ISSAP Qualified Secure Network Architecture Consulting Expertise
Progent's ISSAP certified network architecture engineers are consultants who have earned ISSAP status through rigorous testing and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more complex requirements of information system security architecture within the broader field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Read more details concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Services.

CISA Accredited IS Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates expertise in network security audit and control. Certified by ANSI, the CISA credential has candidates pass an extensive test administered by the ISACA international professional association. Progent's CISA-certified IS security audit consultants are available to help your IT organization in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Preparedness
Read additional details concerning Progent's CISA Certified Network Security Auditing Engineering Services.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's skills to plan, implement, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a workplace continuity strategy that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers offer a variety of risk identification services such as:

  • Collect information and study documentation to identify significant risk scenarios
  • Identify statutory, industry, and business requirements and company policies related to your information system to determine their possible impact on your strategic objectives
  • Point out potential threats for your operational workflows to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate IS risk so they can assist with your risk management process
  • Match identified risk vectors to your associated operational processes to help determine risk ownership
  • Determine risk appetite with executive leadership and major stakeholders to ensure they match
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to ensure that a certified security consultant possesses the knowledge appropriate to provide support in important categories of network, information, and application security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC security audit consultants can assist your IT organization with:

Learn additional information concerning Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To learn how to contact a certified security consultant for remote or onsite help in North Dakota, call 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.