Business IT networks in Pennsylvania now have fast and affordable online access to Progent's accredited network security consultants to assist with critical security issues. The cost is competitive, charges are per minute, sign-up is quick, and support is world class. Progent also offers assistance for complex engagements that requires the knowledge of seasoned security consultants with top security certifications.

In case your Pennsylvania small business is situated far from larger metropolitan neighborhoods such as Philadelphia, Pittsburgh, Allentown, or Erie, contact with nearby certified security experts may be problematic when you have a crisis. This can cause lost productivity for your business, upset customers, idle workers, and defocused executives. By contacting Progent, you have access to a certified security consultant ready to deliver assistance when you have to have it to keep your information system on line and salvage your data.

Progent can help you in your efforts to defend your information system with services ranging from network security assessments to creating a comprehensive security strategy. Progent provides affordable service to help companies of any size to set up and maintain protected networks based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux platforms plus BYOD clients with Apple handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security vendors to provide web-based control and comprehensive security for all your email traffic. The hybrid architecture of Email Guard integrates cloud-based filtering with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall.

Progent's security engineers are accessible online or on site to provide a variety of urgent or project-based computer security services which include:

  • Perform automated security audits
  • Recuperate quickly after attacks
  • Configure firewalls from multiple vendors
  • Implement safe techniques for offsite and mobile access
  • Deploy advanced software for automatic defense against viruses, spam and directory harvest attacks
  • Help create a comprehensive security strategy with 24x7 monitoring
  • Provide comprehensive Help Desk Services
  • Create an effective network backup and restore plan centered on Data Protection Manager (DPM) backup capability
If your company has an emergency need for IT security help, go to Progent's Urgent Online Network Help.

Progent's consultants can deliver world-class support in vital areas of system security including auditing, firewalls and VPN, and advanced security consulting.

System Security Evaluation
Progent's certified security consultants can assess the effectiveness of your existing computer protection environment through comprehensive remote automated analysis based on advanced utilities and proven techniques. Progent's skill in this service saves you time and money and offers a detailed portrayal of gaps. The information your IT organization gains can make up the foundation of a security plan that will allow your information system to run dependably and adapt rapidly to future threats.

Automated Security Evaluation
Progent provides consulting in the application of security evaluation packages such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically running a variety of programmed network testing checks to identify potential security gaps. Progent has broad experience with additional network analysis utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can help you build security into your business processes, configure auditing software, define and implement a secure network environment, and recommend policies to optimize the safety of your IT system. Progent's security professionals are able to help you configure a firewall, design secure remote access to email and data, and install virtual private network. Learn more concerning Progent's network security analysis.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to enable small businesses to get an objective security evaluation from an accredited security expert. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your network from outside your firewalled perimeter to determine possible risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a system scan from a secure machine within your company firewall to assess the risk to internal attacks. The two security inventory packages are set up and executed from a protected remote location. The project is overseen by a consultant with top security accreditations and who produces a report that details and interprets the data collected by the security scan and proposes cost-effective remediation where called for.

Network Penetration Testing Consulting
Stealth penetration checking is a key component of any serious network security plan. Progentís security professionals can run thorough intrusion checks without the knowledge of your company's internal IT staff. Unannounced penetration testing uncovers whether existing security monitoring systems such as intrusion detection alerts and event history monitoring are correctly set up and actively checked. Learn additional information about Progent's network penetration testing support services.

Firewalls and VPN Expertise
Progent's expertise in security solutions includes extensive field work with leading firewalls and Virtual Private Network (VPN) technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key networking accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Consulting Services
Cisco's security and remote connection technology represent a comprehensive range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Learn more information concerning Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Products.

Engineering Expertise for Other Firewall and VPN Solutions
Progent provides small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and Symantec. Progent can help you create a detailed security strategy and choose the right products from a variety of vendors to achieve your security objectives while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a selection of affordable, set-price monthly managed services intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that incorporates the technology of top data security companies to provide web-based control and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based machine learning tools to guard endpoints as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which easily escape legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the complete malware attack lifecycle including filtering, detection, mitigation, remediation, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup activities and allows fast restoration of vital files, applications and VMs that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.

Certified Network Security Design
Any business should develop a carefully considered security strategy that incorporates both proactive processes and response planning. The proactive plan is a collection of steps intended to reduce vulnerabilities. The reactive strategy assists your IT security personnel to assess the impact resulting from a security penetration, repair the system, document the experience, and get the IT network restored as soon as feasible.

Progent's expert IS security engineers are available to help you to run a comprehensive risk assessment and define a computer security plan to establish security policies and controls to minimize future assaults and dangers.

CISM Qualified System Security Support Assistance
The CISM committee describes the core competencies and global standards of skill that information security professionals are required to master. CISM provides business management the assurance that those who have earned their CISM credential have the experience and capability to deliver efficient security management and support services. Progent offers the support of CISM qualified security professionals to help companies with:

  • IS Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • Network Security Management
  • Recovery Planning
Learn additional information about Progent's CISM Qualified IS Security Consulting Services.

CISSP Qualified Security Engineering Support
CISSP recognizes mastery of a worldwide standard for data security. ANSI has awarded certification recognition in the field of information protection under ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Learn additional details concerning Progent's CISSP-certified Security Engineering Professionals.

ISSAP Accredited Secure System Architecture Consulting Services
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP Certification through thorough testing and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the more in-depth requirements of IS security architecture within the broader scope of information security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all aspects of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecom and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read additional information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Expertise.

CISA Accredited Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a prestigious qualification that indicates expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates pass an extensive examination administered by the ISACA international professional association. Progent's CISA information security audit experts can help your company with:

  • IS Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Get more information concerning Progent's CISA Qualified IS Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and maintain information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and carry out a workplace continuity plan based on leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management consultants can provide a range of risk identification services including:

  • Gather information and review documentation to evaluate significant vulnerabilities
  • Inventory legal, industry, and business requirements and company policies associated with your information system to determine their potential influence on your business objectives
  • Point out possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your organization understand IS risk so they can contribute to your risk control process
  • Connect key risk vectors to your associated business processes to help determine risk ownership
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
Find out more information about Progent's CRISC Consultants.

GIAC Certified Network Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security experts. GIAC's goal is to make sure that a certified security consultant has the knowledge necessary to deliver services in key categories of system, data, and software security. GIAC certifications are recognized by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit experts are available to assist your IT organization with:

Read more details concerning Progent's GIAC Information Assurance Expertise.

Contact a Security Expert
To learn how you can get in touch with a security consultant for remote or on-premises expertise in Pennsylvania, phone 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.