Business computer networks in Ohio can now get quick and economical remote technical support from Progent's accredited network security support specialists to assist with urgent security issues. Rates are affordable, billing is per minute, engagement is immediate, and service is world class. Progent also provides assistance for complex engagements that demand the services of senior security consultants with high-level security credentials.

If your Ohio company is outside of larger urban neighborhoods including Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, access to local certified network security engineers could be problematic during an urgent situation. This can result in a loss of revenue for your business, upset clients, idle employees, and distracted executives. By utilizing Progent's online services, you have access to a qualified security consultant who can provide expertise when you need it to get your system operating and restore your information.

Progent can help you in your efforts to defend your IT environment with support that can range from network security audits to creating a company-wide security strategy. Progent provides economical service to assist companies of any size to configure and maintain protected IT environments based on Windows and Cisco technology and that may include servers and desktops running UNIX or Linux operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security companies to provide web-based management and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway device adds a further level of analysis for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall.

Progent's certified consultants are accessible remotely or on site to provide a range of urgent or longer-term IT security services which include:

  • Run thorough network security audits
  • Recuperate rapidly after attacks
  • Configure hardware and software firewalls
  • Configure safe methods for offsite and mobile access
  • Deploy advanced utilities for protection against viruses, spam and directory harvest attacks
  • Help create a company-wide security strategy with 24x7 security monitoring
  • Provide comprehensive Call Center Support
  • Develop an effective backup and restore plan centered on Data Protection Manager backup/restore capability
If your business has an immediate need for IT security help, go to Progent's Urgent Online Network Support.

Progent's support professionals offer world-class support in vital facets of network security that include analysis, firewall and VPN solutions, and advanced security consulting.

System Assessment
Progent's expert security engineers can evaluate the strength of your existing computer protection environment by performing exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's skill in this testing saves your company money and assures an accurate portrayal of weaknesses. The information your company is provided can make up the basis of a network protection plan that will permit your network to operate safely and adapt rapidly to future risks.

Automated Security Assessment
Progent offers expertise in the use of security testing software including MBSA and GFI LANguard for affordably performing a set of programmed system testing checks to uncover possible security holes. Progent has extensive experience with additional network auditing utilities such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can help you build protection into your company operations, configure scanning tools, plan and implement a secure system environment, and recommend procedures to optimize the safety of your network. Progent's security consultants are ready to help you configure a firewall, implement secure remote connectivity to email and data, and install virtual private network. Find out more about Progent's network security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles intended to enable small businesses to get an objective network security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from outside your firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a network scan from an authorized machine within your company firewall to evaluate vulnerabilities to internal attacks. The two security inventory packages are set up and executed from a secured external location. The process is managed by an engineer who has earned top security credentials and who produces a document that details and interprets the information collected by the scan and suggests practical improvements if called for.

Stealth Security Penetration Testing Consulting
Stealth penetration testing is an important part of any successful network security plan. Progentís security professionals can perform thorough intrusion tests without the awareness of your organization's internal network support resources. Stealth penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event history monitoring are properly configured and consistently checked. Find out additional information on Progent's stealth penetration analysis support services.

Firewalls and VPN Expertise
Progent's background in security technology includes in-depth familiarity with leading firewalls and VPN products offered by multiple companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and remote access products provide a full range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Read additional details concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Products.

Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security plan and select the right technologies from a variety of vendors to achieve your security objectives while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a collection of low-cost, fixed-price monthly managed services designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a further level of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior machine learning technology to guard endpoint devices as well as servers and VMs against new malware assaults like ransomware and email phishing, which easily escape traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to address the entire threat progression including protection, identification, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid recovery of critical files, apps and virtual machines that have become lost or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as IPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.

Expert Network Security Consulting
Every company should have a thoroughly thought out security strategy that incorporates both preventive processes and reaction planning. The proactive strategy is a collection of steps designed to minimize security weaknesses. The reactive plan helps your company's network security personnel to assess the impact caused by a security penetration, repair the damage, document the experience, and get the IT network running as rapidly as possible.

Progent's expert information security consultants are available to help you to run a comprehensive risk evaluation and create a company-wide security strategy to implement security processes and mechanisms to mitigate ongoing attacks and dangers.

CISM Certified Information Security Support Expertise
The CISM organization describes the core capabilities and international standards of performance that IT security managers are expected to learn. CISM gives executive management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to provide effective security administration and consulting consulting. Progent offers the services of CISM qualified security professionals to assist companies with:

  • IS Security Processes
  • Risk Management
  • Network Security Program Management
  • IS Security Administration
  • Recovery Management
Learn additional details about Progent's CISM Certified Security Consulting Expertise.

CISSP Certified Security Engineering Services
The CISSP credential denotes expertise with an international standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of information security under ISO 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISSP-certified Information Security Support Services.

ISSAP Certified Secure IT Architecture Consulting Services
Progent's ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the most challenging demands of information security architecture within the broader field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all aspects of architecture security including.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Learn additional information about Progent's ISSAP Certified Secure IT Architecture Consulting Services.

CISA Accredited Security Auditing Engineering Assistance
The CISA credential is an important qualification that signifies mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA IS security audit experts can help your business with:

  • IS Audit Services
  • IT Governance
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Resources
  • Business Continuity Planning
Read more details about Progent's CISA Certified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's ability to design, implement, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC network risk management consultants can provide a range of risk assessment services such as:

  • Collect information and study documentation to evaluate major vulnerabilities
  • Inventory statutory, industry, and business mandates and company policies associated with your network to determine their potential influence on your strategic objectives
  • Identify possible vulnerabilities for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct training to ensure your stakeholders understand information system risk so they can assist with your risk control program
  • Match identified risk vectors to your associated business processes to help determine risk ownership
  • Validate risk appetite with executive management and key stakeholders to make sure they align
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Support
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security experts. GIAC's goal is to make sure that an accredited professional possesses the knowledge necessary to provide services in vital categories of network, information, and program security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC-qualified network security audit engineers can help your IT organization in the areas of:

Find out additional details about Progent's GIAC Information Assurance Support.

Talk to a Certified Progent Security Expert
To find out how to get in touch with a certified security engineer for remote or on-premises support in Ohio, phone 1-800-993-9400 or visit Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.