Business computer networks in the state of Ohio can now get prompt and economical online help from Progent's qualified security engineers to fix complex security issues. The cost is reasonable, charges are by the minute, sign-up is fast, and support is world class. Progent also provides assistance for complex engagements that requires the services of senior security consultants with high-level security certifications.

In case your Ohio office is situated some distance from larger urban neighborhoods such as Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, access to local accredited security support specialists may be problematic during an urgent situation. This can result in a drop in productivity for your company, angry customers, idle employees, and distracted management. By utilizing Progent, you can get in touch with a certified security professional who can provide expertise when you require it to keep your system operating and restore your data.

Progent can assist you at any level in your efforts to guard your IT environment with services ranging from security audits to developing a comprehensive security plan. Progent offers affordable support to assist companies of any size to set up and manage protected networks powered by Windows and Cisco products and that may include servers and desktops based on UNIX or Linux platforms plus mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to deliver centralized management and world-class security for your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's certified experts are accessible remotely or on site to offer a variety of urgent or project-based IT security services including:

  • Run comprehensive network security audits
  • Clean up promptly after serious security breaches
  • Configure effective firewalls
  • Configure safe solutions for remote and mobile connectivity
  • Install effective applications for defense against viruses, spam and DHAs
  • Develop a company-wide security plan with proactive monitoring
  • Offer comprehensive Call Center Support
  • Help Create a practical network backup and disaster recovery plan centered on Data Protection Manager (DPM) backup/restore technology
If your network has an emergency need for computer security support, go to Progent's Urgent Online Technical Support.

Progent's security experts can deliver advanced support in vital areas of network protection including security evaluation, firewall/VPN support, and advanced security planning.

System Security Audits
Progent's expert security engineers can evaluate the effectiveness of your current network security implementation through exhaustive remote automated testing via advanced utilities and tested procedures. Progent's experience in this service saves you money and assures an accurate picture of system vulnerability. The knowledge your company gains can be used as the foundation of a security strategy that can permit your information system to run safely and respond rapidly to new threats.

Automated Vulnerability Evaluation
Progent offers consulting in the use of security auditing packages such as Microsoft Baseline Security Analyzer and GFI LANguard for economically running a set of automatic network testing scans to uncover potential security gaps. Progent has extensive experience with other network analysis tools such as NMAP Port Scanner, AMAP, eEye, plus tools like SolarWinds, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you design protection into your company processes, install auditing tools, plan and implement a protected network environment, and suggest procedures to optimize the security of your network. Progent's security engineers are ready to assist you to configure a firewall, implement safe remote access to email and business applications, and integrate VPN. Learn more about Progent's automated security evaluation.

Security Inventory Service Packages for Small Companies
Progent has put together two low-cost security inventory scanning packages designed to allow small companies to get an objective network security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your network from outside your firewall to determine possible weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from an authorized machine within your firewall to assess your exposure to inside attacks. The two security inventory services are set up and executed from a secured remote site. The process is managed by an engineer who has earned top security accreditations and who produces a document that details and analyzes the data captured by the scan and suggests cost-effective improvements if called for.

Stealth Security Penetration Analysis Support Services
Stealth penetration checking is an important component of any serious network security plan. Progentís security professionals can run extensive penetration checks without the awareness of your company's in-house network support staff. Unannounced penetration testing shows whether current security monitoring systems such as intrusion detection alerts and event history monitoring are correctly configured and consistently monitored. Find out additional information on Progent's network penetration testing support services.

Firewall/VPN Expertise
Progent's expertise in network security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with important networking accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite connection technology represent a complete line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Find out more details concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Products.

Consulting Services for Other Firewall and VPN Technology
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security strategy and select the right technologies from a variety of suppliers to achieve your security goals while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight line of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to guard endpoint devices and physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily get by legacy signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to address the complete malware attack progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you demonstrate compliance with legal and industry data security standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent action. Progent's consultants can also help you to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup activities and enables fast restoration of critical data, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top information security vendors to provide web-based control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any business should have a thoroughly considered security strategy that incorporates both pre-attack procedures and reaction plans. The proactive strategy is a collection of procedures intended to minimize security weaknesses. The post-attack plan helps your security engineers to evaluate the impact resulting from an attack, fix the network, document the event, and get business functions operational as quickly as possible.

Progent's certified IT security consultants can to assist you to run a full vulnerability evaluation and define a computer security plan to establish security processes and controls to reduce future assaults and dangers.

CISM Accredited System Security Support Expertise
The CISM committee describes the core competencies and international standards of performance that IT security managers are expected to learn. It provides business management the assurance that consultants who have qualified for their CISM certification have the background and knowledge to provide effective security administration and consulting services. Progent offers the support of CISM certified security professionals to assist companies with:

  • Information Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Read more details concerning Progent's CISM Certified Information Security Consulting Services.

CISSP Accredited Security Consulting Expertise
CISSP denotes expertise with an international standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Find out additional details concerning Progent's CISSP-certified IS Security Engineering Professionals.

ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and significant experience with network security design. The ISSAP certification represents proven mastery in the more in-depth demands of information security architecture bounded by the broader scope of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture including.

  • Access Management Systems and Methodologies
  • Phone System and Network Protection
  • Cryptography Options
  • Needs Analysis and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional information concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Expertise.

CISA Certified Information System Security Auditing Engineering Support
The CISA credential is a globally recognized achievement that represents expertise in IS security auditing. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive examination given by the ISACA international professional association. Progent's CISA security audit specialists are available to help your business with:

  • IS Audit Services
  • IT Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Get more details concerning Progent's CISA Certified IS Security Auditing Engineering Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's skills to plan, implement, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a business continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC IT risk management specialists offer a variety of risk assessment services including:

  • Collect information and review documentation to identify major risk scenarios
  • Inventory legal, industry, and business mandates and organizational policies associated with your network to determine their potential influence on your business objectives
  • Identify potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness program and conduct training to make sure your organization understand information system risk so they can assist with your risk control program
  • Connect identified risk scenarios to related business processes to help determine risk ownership
  • Determine risk appetite with executive management and major stakeholders to make sure they align
Get the details concerning Progent's CRISC Consultants.

GIAC Certified Network Security Engineering Support
Global Information Assurance Certification was established in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to make sure that an accredited professional has the knowledge needed to deliver support in key areas of network, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified network security audit specialists can help your business with:

  • Auditing Security Systems
  • Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Specialist
To see how to get in touch with a certified Progent security engineer for online or on-premises help in Ohio, call 1-800-993-9400 or visit Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.