Company networks in the state of Ohio can depend on fast and economical online access to Progent's accredited network security experts to resolve critical security issues. Rates are competitive, charges are by the minute, sign-up is quick, and support is world class. Progent also provides assistance for long-term engagements that demand the services of seasoned security engineers with top industry certifications.

In case your Ohio network is away from more populated urban areas such as Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, the availability of nearby accredited security consultants could be limited when you have a security disaster. This can cause lost productivity for your business, angry customers, idle employees, and distracted management. By utilizing Progent, you have access to a certified security professional who can offer help when you require it to get your system on line and recover your data.

Progent can help you in a variety of ways in your initiatives to guard your IT environment with services ranging from network security checks to creating a comprehensive security strategy. Progent offers economical support to assist small and midsize companies to configure and manage protected IT environments powered by Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to provide web-based control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of inspection for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's security experts are accessible online or on site to offer a variety of emergency or project-based IT security services such as:

  • Run thorough network security evaluations
  • Clean up rapidly after attacks
  • Set up firewalls from multiple vendors
  • Implement secure techniques for remote and mobile access
  • Deploy advanced solutions for defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security plan with round-the-clock security monitoring
  • Offer comprehensive Help Desk Call Center Support
  • Develop a practical network backup and business continuity solution built around Microsoft DPM technology
If your business has an urgent need for IT security support, go to Progent's Emergency Remote Technical Help.

Progent's consultants can deliver world-class support in vital areas of computer security that include security evaluation, firewall and VPN solutions, and advanced security planning.

System Audits
Progent's expert security engineers can evaluate the vulnerability of your current network protection implementation by performing comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's skill in administering this testing saves you time and money and assures an accurate picture of gaps. The knowledge your IT organization gains can be used as the foundation of a network protection strategy that will allow your information system to run safely and react quickly to future threats.

Automated Network Vulnerability Assessment
Progent provides consulting in the use of security testing packages such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a set of automatic system testing scans to identify potential security weaknesses. Progent has extensive experience with additional security analysis utilities including NMAP, AMAP Application Scanner, eEye, plus tools such as SolarWinds, Netcat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can show you how to design security into your business operations, configure scanning applications, plan and implement a protected system environment, and recommend procedures to optimize the safety of your IT system. Progent's security professionals are ready to help you configure a firewall, implement safe remote access to email and data, and install VPN. Find out more about Progent's network security analysis.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages intended to allow small businesses to receive a professional network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive examination of your network from beyond your company firewall to uncover potential risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from an authorized computer within your firewall to evaluate vulnerabilities to internal assaults. The two security inventory services are configured and executed from a protected remote location. The process is directed by a consultant who has earned top security credentials and who generates a report that summarizes and interprets the data captured by the security scan and suggests cost-effective remediation where called for.

Stealth Penetration Analysis Support Services
Stealth penetration checking is an important component of any comprehensive network security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your organization's internal network support staff. Unannounced penetration testing uncovers whether existing security defense tools such as intrusion detection warnings and event log analysis are correctly configured and actively monitored. Learn more about Progent's stealth penetration analysis consulting.

Firewall/VPN Support
Progent's expertise in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with important networking certifications such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to manage your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Security and VPN Consulting Services
Cisco's security and offsite connection products provide a comprehensive line of easy-to-administer security products to help protect your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Find out more details about Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.

Support Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and medium size organizations expert support for Intrusion Protection products and IPSec VPN products from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security strategy and choose appropriate technologies from multiple vendors to support your security objectives while sticking within your spending limits.

Certified Network Security Design
Every business should have a carefully considered security program that includes both proactive procedures and reaction plans. The proactive plan is a set of mechanisms intended to reduce security weaknesses. The reactive plan helps your IT security personnel to assess the damage resulting from a security penetration, fix the system, record the event, and get the IT network running as rapidly as possible.

Progent's expert IT security consultants can to help your company to perform a full risk assessment and create a network security plan to implement security policies and mechanisms to reduce ongoing assaults and dangers.

CISM Accredited Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and global standards of skill that information security managers are expected to learn. It provides business management the confidence that consultants who have qualified for their CISM certification possess the background and capability to provide efficient security management and consulting services. Progent can provide the support of CISM qualified security professionals to help businesses with:

  • IS Security Governance
  • Vulnerability Analysis
  • IS Security Program Management
  • IS Security Management
  • Response Management
Learn more information about Progent's CISM Accredited Network Security Engineering Services.

CISSP Qualified Security Consulting Assistance
The CISSP credential recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the area of information protection stipulated by ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Find out more information concerning Progent's CISSP-certified IS Security Engineering Professionals.

ISSAP Certified Secure System Architecture Engineering Assistance
Progent's ISSAP qualified IT architecture engineers are consultants who have been awarded ISSAP Certification as a result of rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the more complex requirements of information system security architecture bounded by the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all phases of architecture security including.

  • Access Control Systems and Methodologies
  • Phone System and Network Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Find out more details about Progent's ISSAP Certified Secure System Architecture Engineering Services.

CISA Accredited Information System Security Auditing Consulting Expertise
The CISA accreditation is an important qualification that indicates expertise in network security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo a comprehensive test given by the ISACA professional association. Progent's CISA network security audit consultants can help your company in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Planning
Learn the details about Progent's CISA Qualified Network Security Auditing Engineering Support.

CRISC Experts
The CRISC certification program was established by ISACA in 2010 to validate a consultant's skills to design, implement, and support IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC network risk mitigation specialists can provide a range of risk assessment services including:

  • Gather data and review documentation to help identify significant risk scenarios
  • Identify statutory, industry, and business requirements and company standards related to your information system to determine their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your operational processes to help in evaluating your enterprise risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk control process
  • Match identified risk scenarios to your associated operational processes to help determine risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to make sure they match
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Consulting Support
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to make sure that an accredited security consultant has the skills appropriate to provide support in important areas of system, information, and software security. GIAC certifications are recognized by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified information security audit specialists can assist your company in the areas of:

  • Assessing Perimeters
  • Security Incident Response
  • Intrusion Detection
  • Web-based Services Security
Learn more information about Progent's GIAC IS Security Consulting Services.

Get in Touch with a Certified Security Specialist
To see how you can contact a certified Progent security engineer for online or on-premises help in Ohio, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.