Company networks in the state of Ohio can depend on fast and affordable remote technical support from Progent's accredited network security professionals to fix complex security issues. The cost is affordable, billing is per minute, sign-up is quick, and support is unbeatable. Progent also provides help for complex projects that requires the knowledge of senior security consultants with high-level security certifications.

In case your Ohio small business is some distance from major urban neighborhoods such as Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, access to nearby certified network security professionals may be limited when you have an urgent situation. This could mean a drop in revenue for your business, angry customers, unproductive employees, and defocused executives. By calling Progent's remote support, you have access to a certified security consultant who can offer help whenever you require it to keep your information system operating and recover your information.

Progent can assist you at any level in your initiatives to guard your network with support ranging from network security audits to developing a comprehensive security strategy. Progent offers economical support to assist small and midsize companies to configure and maintain protected IT environments powered by Microsoft Windows and Cisco technology and that may include computers running UNIX or Linux operating systems as well as mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security companies to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also enable Microsoft Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall.

Progent's certified experts are available online or in person to provide a variety of urgent or project-based network security services including:

If your network has an immediate need for computer security help, refer to Progent's Urgent Online Technical Support.

Progent's engineers provide world-class support in vital facets of computer security that include auditing, firewall and VPN expertise, and high-level security consulting.

System Audits
Progent's certified security engineers can assess the effectiveness of your current network security implementation by performing exhaustive remote automated testing based on advanced utilities and tested procedures. Progent's skill in this testing saves you money and assures an accurate portrayal of security holes. The information your business is provided can be used as the foundation of a security plan that will permit your information system to run dependably and respond rapidly to new risks.

Automated Network Vulnerability Audits
Progent offers consulting in the use of security evaluation utilities such as Microsoft's MBSA and GFI LANguard NSS for affordably performing a set of automatic network auditing scans to identify possible security problems. Progent has extensive experience with additional network auditing products such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can help you design security into your business processes, configure auditing applications, define and implement a protected system architecture, and recommend policies to optimize the security of your network. Progent's security consultants are able to show you how to configure a firewall, implement safe remote access to email and business applications, and install VPN. Learn more on Progent's network security audits.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles designed to enable small companies to get a professional security evaluation from a certified security engineer. With Progent's External Network Security Inventory Scan, an engineer administers an extensive examination of your IT infrastructure from beyond your firewall to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine within your firewall to determine the risk to internal attacks. The two security inventory services are configured and executed from a secured external site. The project is directed by an engineer with high-level security credentials and who generates a document that summarizes and analyzes the data collected by the scan and suggests practical improvements if appropriate.

Stealth Intrusion Analysis Support Services
Stealth intrusion testing is an important part of any successful IT system security plan. Progent’s security experts can run extensive intrusion tests without the knowledge of your organization's in-house network support resources. Unannounced penetration testing shows whether existing security defense systems such as intrusion detection alerts and event log monitoring are properly set up and consistently monitored. Find out additional information concerning Progent's stealth security penetration testing consulting.

Firewall/VPN Solutions
Progent's expertise in security technology encompasses in-depth field work with major firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with important industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your current PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and offsite access technology offer a comprehensive line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Find out more information about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose the right technologies from a variety of suppliers to support your security goals while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to defend endpoint devices and physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily get by traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to manage the complete threat lifecycle including protection, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge tools packaged within one agent managed from a single console. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP environment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent can also help you to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup activities and enables fast restoration of critical files, applications and VMs that have become unavailable or damaged due to hardware failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of top information security vendors to deliver web-based control and comprehensive security for your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a further level of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you’re planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Planning
Any business should have a carefully thought out security strategy that includes both pre-attack processes and reaction plans. The proactive plan is a set of procedures that help to reduce security weaknesses. The post-attack strategy assists your network security engineers to evaluate the damage caused by a security penetration, repair the network, record the experience, and get business functions operational as soon as feasible.

Progent's certified IT security engineers are available to help your company to run a complete vulnerability assessment and create a company-wide security plan to implement security processes and controls to reduce future attacks and threats.

CISM Qualified Information Security Consulting Services
The CISM organization describes the basic competencies and global standards of skill that information security managers are required to master. It provides business management the assurance that those who have earned their CISM certification possess the experience and capability to provide efficient security management and consulting consulting. Progent can provide the support of CISM qualified security professionals to help companies with:

  • Information Security Governance
  • Vulnerability Management
  • Information Security Implementation Management
  • Network Security Administration
  • Recovery Planning
Find out more information concerning Progent's CISM Certified Information Security Support Professionals.

CISSP Certified Security Engineering Expertise
CISSP denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of information security under ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security areas including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Find out more information about Progent's CISSP Cybersecurity Consulting Services.

CISSP-ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP certified system architecture engineers are experts who have been awarded ISSAP status as a result of thorough examination and extensive experience with network security architecture. The ISSAP certification indicates proven competence in the more challenging demands of information system security architecture within the broader scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your business with all phases of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Phone System and System Infrastructure Security
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Find out additional information about Progent's ISSAP Certified Secure Network Architecture Support Services.

CISA Qualified Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that signifies mastery in network security auditing. Certified by ANSI, the CISA accreditation requires that candidates pass a comprehensive examination administered by the ISACA professional group. Progent's CISA-qualified security audit engineers can help your company in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Get more details concerning Progent's CISA Certified IS Security Auditing Engineering Expertise.

CRISC Consultants
The CRISC program was established by ISACA to validate an IT professional's ability to design, deploy, and support information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a business continuity plan that follows industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists offer a variety of risk evaluation services such as:

  • Gather data and study documentation to evaluate major vulnerabilities
  • Identify legal, industry, and contractual mandates and organizational standards related to your information system to assess their potential impact on your business objectives
  • Identify possible threats for your business workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct seminars to ensure your organization appreciate IT risk so they can assist with your risk management process
  • Connect key risk vectors to your associated operational procedures to help determine risk ownership
  • Determine risk appetite with executive management and major stakeholders to make sure they align
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of network security experts. GIAC's mission is to assure that a certified professional has the skills needed to provide support in vital categories of system, information, and application program security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified IS security audit experts are available to help your IT organization with:

Read additional details about Progent's GIAC Information Assurance Support.

Contact a Certified Security Engineer
To see how you can access a security consultant for online or onsite assistance in Ohio, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.