Small business networks in Ohio can depend on fast and economical remote access to Progent's certified security experts to help with urgent security issues. The cost is reasonable, billing is by the minute, sign-up is immediate, and service is unbeatable. Progent also offers assistance for long-term projects that requires the expertise of seasoned security consultants with high-level security credentials.

If your Ohio network is based some distance from more populated urban neighborhoods including Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, help from nearby certified security experts could be limited when there's a crisis. This can result in a drop in revenue for your business, angry clients, idle employees, and distracted executives. By calling Progent's online services, you can get in touch with a certified security consultant who can offer help whenever you require it to keep your network operating and recover your information.

Progent can assist you in all your efforts to protect your IT environment with support services that can range from security assessments to developing a comprehensive security strategy. Progent offers economical support to assist small and midsize companies to configure and manage safe IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX or Linux platforms plus mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security vendors to provide web-based control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.

Progent's security experts are accessible online or in person to provide a range of emergency or project-based computer security services including:

If your company has an emergency need for computer security help, go to Progent's Emergency Remote Network Support.

Progent's engineers can deliver advanced support in vital fields of computer protection that include security assessment, firewalls and VPN, and high-level security consulting.

System Security Audits
Progent's expert security consultants can assess the vulnerability of your existing computer protection implementation through comprehensive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in administering this testing saves your company time and money and assures a detailed portrayal of system vulnerability. The information your company gains can be used as the foundation of a network protection plan that can permit your information system to operate safely and adapt quickly to future threats.

Automated Network Vulnerability Analysis
Progent offers consulting in the application of security evaluation utilities including MBSA and GFI LANguard NSS for affordably running a variety of automatic system testing checks to uncover possible security weaknesses. Progent has extensive experience with additional network analysis products such as NMAP, AMAP, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can help you design security into your company operations, configure auditing tools, define and deploy a protected network architecture, and suggest procedures to optimize the security of your network. Progent's security consultants are available to show you how to configure a firewall, design secure remote access to email and data, and install VPN. Find out more concerning Progent's network security analysis.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small companies to receive a professional security assessment from a qualified security consultant. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your IT infrastructure from outside your company firewall to determine potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, an engineer executes a network scan from a secure computer inside your firewall to evaluate your exposure to inside threats. Both security inventory packages are configured and executed from a protected external site. The project is managed by a consultant with top security credentials and who generates a document that details and analyzes the data collected by the security scan and proposes practical improvements where appropriate.

Stealth Security Penetration Analysis Consulting
Stealth penetration checking is a key part of any comprehensive network security plan. Progentís security professionals can perform thorough penetration tests without the awareness of your company's in-house network support resources. Stealth penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log monitoring are correctly configured and actively monitored. Find out additional information on Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and VPN products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned key industry accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite access technology offer a complete range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business objectives. Learn more information about Progent's Engineering Services for Cisco Security and VPN Products.

Engineering Services for Other Firewall and VPN Solutions
Progent provides small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and choose the right products from multiple suppliers to achieve your security objectives while staying within your spending limits.

Certified Network Security Design
Every company should have a carefully considered security program that incorporates both proactive processes and response plans. The proactive plan is a set of mechanisms that help to minimize security weaknesses. The reactive plan helps your IT security engineers to assess the damage caused by an attack, repair the network, record the event, and get business functions restored as soon as possible.

Progent's expert IS security consultants can to help your company to perform a full risk assessment and define a company-wide security plan to implement security policies and mechanisms to minimize future assaults and threats.

CISM Accredited System Security Engineering Expertise
The CISM committee describes the core competencies and international standards of performance that IT security professionals are expected to learn. It gives business management the assurance that those who have earned their CISM certification have the experience and capability to provide efficient security administration and support services. Progent offers the services of CISM certified security consultants to help businesses with:

  • IS Security Processes
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Management
  • Response Management
Learn additional details concerning Progent's CISM Accredited Network Security Consulting Professionals.

CISSP Qualified Security Engineering Assistance
CISSP denotes mastery of an international standard for network security. The American National Standards Institute has awarded certification recognition in the area of information protection defined by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a variety security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Read additional details about Progent's CISSP Accredited Information Security Consulting Services.

ISSAP Accredited Secure System Architecture Consulting Services
Progent's ISSAP certified system architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most challenging demands of information system security architecture bounded by the wider field of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all phases of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecommunications and Network Protection
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Find out more information concerning Progent's ISSAP Qualified Secure System Architecture Support Services.

CISA Certified Security Auditing Consulting Expertise
The CISA accreditation is a prestigious achievement that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass a comprehensive test given by the ISACA professional association. Progent's CISA-qualified network security audit engineers can help your IT organization in the areas of:

  • Information Systems Audit Process
  • Information Technology Governance
  • Systems and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Planning
Find out more details concerning Progent's CISA Certified Information System Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC program was initiated by ISACA to verify a consultant's skills to design, deploy, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and execute a workplace continuity plan based on industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation engineers offer a range of risk assessment services including:

  • Gather data and study documentation to evaluate major risk scenarios
  • Inventory statutory, regulatory, and business requirements and company policies related to your information system to determine their possible influence on your business objectives
  • Point out potential threats for your business workflows to assist in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders understand IS risk so they can contribute to your risk management process
  • Match identified risk vectors to related operational processes to help assign risk responsibility
  • Validate risk tolerance with executive leadership and major stakeholders to ensure they match
Read more information about Progent's CRISC Experts.

GIAC Certified Security Engineering Expertise
GIAC was established in 1999 to validate the skill of computer security experts. GIAC's mission is to verify that an accredited professional has the skills appropriate to provide services in key areas of network, data, and software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC-qualified network security audit engineers are available to help your IT organization with:

  • Assessing Networks
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Security Expert
To see how you can get in touch with a Progent security engineer for online or on-premises help in Ohio, phone 1-800-993-9400 or go to Remote Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.