Company IT networks in Ohio can have prompt and economical online access to Progent's qualified network security support specialists to resolve urgent security issues. The cost is affordable, charges are by the minute, sign-up is immediate, and service is world class. Progent also offers help for long-term projects that requires the expertise of senior security engineers with top industry credentials.

In case your Ohio network is based outside of major urban areas such as Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, access to nearby qualified network security engineers may be limited when there's a security disaster. This can result in a loss of revenue for your business, upset customers, idle employees, and defocused executives. By utilizing Progent, you can get in touch with a certified security professional who can provide expertise when you require it to get your network on line and recover your information.

Progent can assist you in all your efforts to guard your network with services ranging from network security assessments to creating a comprehensive security strategy. Progent provides affordable support to assist small and midsize companies to configure and maintain safe networks powered by Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide centralized management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter.

Progent's security experts are available remotely or in person to offer a variety of urgent or longer-term IT security services such as:

  • Run comprehensive security evaluations
  • Recover rapidly after serious security breaches
  • Install hardware and software firewalls
  • Configure safe solutions for remote and mobile access
  • Deploy effective software for protection against spam and directory harvest attacks
  • Develop a company-wide security strategy with 24x7 network monitoring
  • Offer comprehensive Call Center Services
  • Develop a practical data backup and restore strategy built around Data Protection Manager (DPM) automated backup technology
If your network has an urgent requirement for computer security support, refer to Progent's Urgent Remote Network Support.

Progent's security experts offer advanced services in key facets of computer protection including security evaluation, firewall/VPN support, and high-level security consulting.

Security Assessment
Progent's certified security consultants can assess the strength of your current computer security implementation through exhaustive remote automated analysis via advanced software tools and tested procedures. Progent's experience in this service saves you money and assures an accurate portrayal of security holes. The knowledge your IT organization is provided can be used as the basis of a network protection strategy that will allow your network to run dependably and adapt quickly to new threats.

Automated Network Security Evaluation
Progent provides expertise in the application of security analysis products such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a variety of programmed system testing scans to identify potential security vulnerabilities. Progent has extensive knowledge of additional network auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to design security into your company operations, configure scanning tools, define and implement a protected network architecture, and suggest procedures to maximize the safety of your network. Progent's security consultants are able to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Learn more on Progent's network security analysis.

Security Inventory Service Bundles for Small Companies
Progent offers two low-cost security inventory packages intended to enable small businesses to get an impartial network security assessment from a certified security expert. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to determine possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from a secure computer within your firewall to uncover your exposure to internal attacks. The two security inventory packages are configured and run from a secured remote location. The process is managed by a consultant who has earned high-level security accreditations and who produces a report that details and interprets the data collected by the security scan and suggests cost-effective improvements if called for.

Stealth Penetration Analysis Support Services
Stealth intrusion testing is a key component of any comprehensive network security strategy. Progentís security professionals can run thorough intrusion tests without the awareness of your organization's in-house network support resources. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion detection alerts and event log monitoring are correctly configured and actively checked. Find out additional information concerning Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's security and remote access products offer a comprehensive line of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Read additional information about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and VPN Products
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security plan and select appropriate products from multiple vendors to achieve your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to deliver web-based management and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis technology to guard endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to manage the complete threat lifecycle including blocking, detection, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and enables rapid restoration of critical data, applications and virtual machines that have become lost or corrupted as a result of component breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

Expert Security Design
Any company ought to develop a thoroughly thought out security program that incorporates both pre-attack processes and response planning. The pre-attack plan is a set of mechanisms that help to reduce vulnerabilities. The post-attack strategy assists your company's IT security engineers to evaluate the damage resulting from an attack, fix the system, document the event, and get business functions operational as quickly as possible.

Progent's certified IS security engineers can to assist your company to perform a comprehensive risk assessment and create a network security strategy to establish security policies and mechanisms to mitigate future attacks and dangers.

CISM Accredited Network Security Engineering Assistance
The CISM committee describes the basic competencies and global standards of performance that information security professionals are required to learn. It provides executive management the confidence that those who have qualified for their CISM credential possess the experience and knowledge to provide efficient security administration and support consulting. Progent can provide the services of CISM certified security professionals to help businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Find out more information about Progent's CISM Network Security Support Professionals.

CISSP Accredited Security Consulting Services
The CISSP credential denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data security stipulated by ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a variety security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Find out more details about Progent's CISSP-certified Information Security Engineering Expertise.

ISSAP Certified Secure System Architecture Consulting Services
Progent's ISSAP qualified information system architecture engineers are experts who have been awarded ISSAP Certification through rigorous examination and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the most challenging requirements of IS security architecture bounded by the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your company with all aspects of architecture security such as.

  • Access Management Systems and Techniques
  • Telecom and Network Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Expertise.

CISA Certified Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is an important achievement that signifies mastery in network security audit and control. Accredited by ANSI, the CISA accreditation has consultants undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit specialists are available to assist your company with:

  • IS Audit Services
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISA Certified Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to plan, deploy, and maintain IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and carry out a business continuity plan based on leading practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk management specialists can provide a range of risk evaluation services including:

  • Gather information and study documentation to help identify significant risk scenarios
  • Identify legal, industry, and contractual mandates and organizational standards related to your network to determine their potential impact on your business goals
  • Point out potential threats for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to ensure your stakeholders understand IT risk so they can contribute to your risk control process
  • Connect identified risk scenarios to related operational processes to help assign risk responsibility
  • Validate risk appetite with executive management and key stakeholders to ensure they match
Learn additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to assure that an accredited security consultant possesses the knowledge appropriate to provide services in important areas of network, data, and application program security. GIAC certifications are recognized by businesses and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified information security audit experts are available to help your company in the areas of:

Learn more details about Progent's GIAC Information Assurance Expertise.

Contact a Security Engineer
To find out how you can get in touch with a Progent security engineer for remote or on-premises expertise in Ohio, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.