Company networks in Ohio now have quick and affordable remote technical support from Progent's accredited network security consultants to assist with critical security problems. The cost is reasonable, billing is per minute, sign-up is fast, and support is world class. Progent also offers assistance for complex engagements that demand the services of seasoned security engineers with high-level security credentials.

In case your Ohio organization is situated some distance from larger urban neighborhoods like Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, contact with nearby certified security experts is often limited when there's an emergency. This can result in a drop in productivity for your company, upset clients, unproductive workers, and distracted management. By calling Progent's remote support, you can get in touch with a certified security professional ready to provide assistance whenever you require it to keep your computer network on line and salvage your information.

Progent can assist you in a variety of ways in your initiatives to protect your network with support that ranges from security audits to creating a comprehensive security strategy. Progent provides economical service to assist companies of any size to set up and maintain safe IT environments based on Windows and Cisco products and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to deliver web-based control and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's security consultants are available online or on site to offer a variety of urgent or project-based IT security services including:

If your network has an urgent need for computer security support, refer to Progent's Emergency Online Technical Support.

Progent's security experts offer advanced support in key facets of computer security including auditing, firewall and VPN solutions, and advanced security planning.

System Assessment
Progent's expert security consultants can assess the strength of your existing computer protection systems by performing exhaustive remote automated analysis based on sophisticated software tools and tested techniques. Progent's experience in administering this service saves your company time and money and offers an objective picture of security holes. The information your IT organization is provided can form the foundation of a security strategy that can permit your network to operate safely and adapt quickly to new threats.

Automated Security Analysis
Progent offers expertise in the application of security evaluation software such as MBSA and GFI LANguard for affordably running a variety of automatic network auditing scans to uncover possible security weaknesses. Progent has extensive knowledge of additional network analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can help you build security into your company operations, configure scanning software, define and implement a protected system architecture, and suggest policies to optimize the security of your IT system. Progent's security consultants are able to assist you to set up a firewall, design safe remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's automated security assessment.

Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory bundles intended to enable small businesses to receive an independent network security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive examination of your network from beyond your company firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from an authorized computer inside your firewall to assess the risk to inside attacks. Both security inventory services are set up and run from a protected external site. The project is directed by an engineer with high-level security credentials and who generates a report that summarizes and analyzes the data collected by the security scan and proposes cost-effective remediation if called for.

Stealth Security Penetration Testing Support Services
Stealth penetration testing is an important component of any serious IT system security strategy. Progentís security experts can perform extensive intrusion tests without the awareness of your organization's in-house network support resources. Stealth penetration testing uncovers whether current security monitoring tools such as intrusion detection alerts and event log monitoring are properly configured and actively checked. Learn additional information on Progent's stealth security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security solutions includes extensive familiarity with major firewalls and VPN products offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important industry accreditations including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.

Cisco Security and Virtual Private Network Support Services
Cisco's security and offsite access products represent a comprehensive line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Read additional information concerning Progent's Support Expertise for Cisco Security and VPN Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors including WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security plan and select the right technologies from a variety of vendors to support your security goals while staying within your budget restraints.

Certified Security Planning
Every business ought to have a carefully considered security strategy that includes both preventive procedures and response plans. The pre-attack plan is a set of steps that help to reduce security weaknesses. The post-attack plan helps your security engineers to evaluate the damage caused by an attack, fix the network, record the event, and get business functions operational as soon as feasible.

Progent's expert IS security consultants are available to assist your business to run a full risk evaluation and define a computer security strategy to implement security processes and controls to minimize future attacks and threats.

CISM Accredited Network Security Support Expertise
The Certified Information Security Manager (CISM) organization describes the core competencies and global standards of skill that information security professionals are required to learn. CISM provides business management the assurance that consultants who have qualified for their CISM credential possess the experience and capability to deliver efficient security management and consulting consulting. Progent offers the expertise of CISM certified security consultants to help businesses with:

  • IS Security Processes
  • Risk Management
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Read more details about Progent's CISM Accredited Information Security Consulting Services.

CISSP Qualified Security Consulting Expertise
The CISSP credential recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information security under ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn more details about Progent's CISSP Qualified IS Security Consulting Professionals.

ISSAP Qualified Secure Network Architecture Consulting Services
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP status as a result of thorough examination and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more in-depth requirements of information security architecture within the wider field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Security
  • Cryptography Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Read additional details concerning Progent's ISSAP Certified Secure Network Architecture Support Services.

CISA Certified Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that indicates expertise in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA network security audit consultants can help your company with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Protecting Data Assets
  • Disaster Recovery Planning
Learn additional details about Progent's CISA Qualified Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to validate a consultant's skills to design, deploy, and support IS control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists can provide a range of risk identification services such as:

  • Collect data and study documentation to help identify significant vulnerabilities
  • Identify statutory, regulatory, and business requirements and organizational policies associated with your information system to determine their possible influence on your business objectives
  • Point out potential vulnerabilities for your operational workflows to help in evaluating your enterprise risk
  • Create a risk awareness program and conduct training to make sure your stakeholders understand IT risk so they can assist with your risk control process
  • Match key risk vectors to your associated operational procedures to help assign risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to ensure they match
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Security Consulting Expertise
GIAC was founded in 1999 to validate the knowledge of network security experts. GIAC's mission is to verify that an accredited security consultant has the knowledge appropriate to deliver support in vital areas of network, data, and program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit experts can help your business in the areas of:

Read additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Specialist
To see how you can get in touch with a Progent security engineer for remote or onsite assistance in Ohio, call 1-800-993-9400 or visit Online Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.