Company networks in Ohio can have quick and affordable remote access to Progent's certified security consultants to help with complex security problems. The cost is affordable, billing is by the minute, engagement is fast, and support is unbeatable. Progent also provides assistance for complex projects that demand the expertise of senior security consultants with top security certifications.

In case your Ohio office is located some distance from more populated urban neighborhoods like Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, access to local accredited network security consultants may be limited when you have a crisis. This could mean a drop in productivity for your company, upset customers, idle employees, and distracted management. By calling Progent's online services, you have access to a certified security engineer who can offer assistance when you require it to get your information system operating and salvage your data.

Progent can help you in all your efforts to protect your IT environment with services that can range from security checks to creating a comprehensive security plan. Progent offers economical support to help businesses of all sizes to configure and maintain safe networks powered by Windows and Cisco products and that can include servers and desktops running UNIX or Linux platforms as well as mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to provide web-based management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper layer of inspection for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's security professionals are available online or on site to offer a variety of urgent or project-based computer security services including:

If your business has an emergency requirement for IT security support, go to Progent's Urgent Online Network Support.

Progent's consultants provide advanced support in vital areas of network security including auditing, firewall and VPN expertise, and high-level security planning.

Security Assessment
Progent's expert security engineers can evaluate the strength of your current computer security environment through exhaustive remote automated testing via sophisticated software tools and tested procedures. Progent's experience in administering this testing saves you consulting fees and assures an objective portrayal of system vulnerability. The information your company is provided can form the basis of a security strategy that will allow your network to operate dependably and react rapidly to future threats.

Automated Network Security Evaluation
Progent offers expertise in the use of security testing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a variety of programmed network auditing checks to identify potential security gaps. Progent has extensive experience with additional network auditing utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.

Progent can help you design protection into your business operations, install auditing software, plan and deploy a protected system environment, and recommend policies to maximize the safety of your network. Progent's security engineers are able to help you configure a firewall, implement secure remote connectivity to email and data, and integrate VPN. Find out additional information on Progent's automated security analysis.

Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory packages designed to enable small businesses to get an independent security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive examination of your IT infrastructure from beyond your firewall to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from an authorized machine within your company firewall to assess your exposure to inside threats. The two security inventory packages are set up and executed from a protected external location. The process is managed by an engineer with top security credentials and who generates a document that summarizes and analyzes the data collected by the scan and suggests cost-effective improvements if called for.

Stealth Intrusion Analysis Support Services
Stealth penetration checking is a key part of any comprehensive network security strategy. Progentís security experts can run thorough intrusion checks without the awareness of your company's internal network support resources. Stealth penetration checking shows whether current security monitoring tools such as intrusion incident alerts and event history analysis are correctly set up and consistently checked. Learn additional information concerning Progent's stealth penetration analysis support services.

Firewall and Virtual Private Network Support
Progent's expertise in network security solutions encompasses in-depth familiarity with leading firewalls and VPN technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned key networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or Cisco ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access products represent a complete line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business goals. Read more information about Progent's Support Expertise for Cisco Security Technology and VPN Appliances.

Engineering Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from a variety of suppliers to achieve your security objectives while staying within your spending restraints.

Expert Security Consulting
Every business ought to develop a carefully thought out security program that incorporates both pre-attack processes and reaction plans. The pre-attack strategy is a set of steps intended to reduce security weaknesses. The reactive plan helps your IT security engineers to evaluate the damage resulting from an attack, fix the system, record the event, and get business functions operational as quickly as possible.

Progent's expert IT security engineers are available to assist your company to perform a full vulnerability assessment and define a computer security plan to establish security processes and controls to mitigate ongoing attacks and dangers.

CISM Qualified Information Security Consulting Expertise
The CISM organization describes the core competencies and worldwide standards of skill that IT security managers are required to master. CISM provides executive management the confidence that consultants who have qualified for their CISM credential possess the experience and knowledge to provide effective security administration and support consulting. Progent offers the support of CISM certified security professionals to help companies with:

  • Information Security Strategies
  • Risk Management
  • Network Security Program Management
  • Network Security Administration
  • Response Planning
Find out more details concerning Progent's CISM Certified Network Security Support Services.

CISSP Certified Security Engineering Support
CISSP certification recognizes mastery of an international standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data security stipulated by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Read additional information about Progent's CISSP Security Support Expertise.

ISSAP Qualified Secure IT Architecture Consulting Services
Progent's ISSAP qualified system architecture engineers are experts who have earned ISSAP status as a result of thorough testing and significant work with network security design. The ISSAP credential indicates demonstrated skill in the more complex demands of IS security architecture bounded by the broader field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security such as.

  • Access Control Systems and Techniques
  • Telecom and System Infrastructure Security
  • Data Encryption Options
  • Requirements Analysis and Security Guidelines
  • BCP and DRP
  • Physical Security
Read additional details concerning Progent's ISSAP Qualified Secure System Architecture Consulting Services.

CISA Accredited IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that signifies expertise in information system security auditing. Certified by ANSI, the CISA accreditation has consultants undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA network security audit engineers are available to help your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Business Continuity Planning
Find out the details concerning Progent's CISA Qualified Security Auditing Engineering Support.

CRISC Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and support IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and carry out a business continuity strategy that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC IT risk mitigation engineers can provide a range of risk identification services such as:

  • Gather information and study documentation to identify major risk scenarios
  • Inventory legal, industry, and contractual mandates and organizational standards related to your network to determine their possible impact on your business objectives
  • Identify possible threats for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness program and conduct seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk management program
  • Match identified risk vectors to your associated operational procedures to help assign risk ownership
  • Validate risk tolerance with executive leadership and key stakeholders to make sure they match
Find out more details concerning Progent's CRISC Experts.

GIAC Accredited Security Engineering Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of IT security experts. GIAC's goal is to make sure that an accredited security consultant possesses the skills needed to provide services in important categories of network, information, and program security. GIAC certifications are recognized by companies and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit engineers are available to assist your company in the areas of:

  • Auditing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Expert
To see how you can get in touch with a security consultant for online or onsite assistance in Ohio, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.