Company IT networks in the state of Pennsylvania can have quick and economical remote help from Progent's accredited security support specialists to assist with complex security problems. Rates are competitive, charges are by the minute, sign-up is quick, and support is unbeatable. Progent also provides assistance for long-term engagements that requires the services of seasoned security engineers with top industry certifications.

If your Pennsylvania office is located outside of major urban neighborhoods like Philadelphia, Pittsburgh, Allentown, or Erie, support from local certified network security experts could be problematic when there's an urgent situation. This can cause a loss of productivity for your business, angry customers, idle employees, and defocused executives. By contacting Progent's online services, you can get in touch with a certified security engineer ready to provide expertise whenever you have to have it to get your computer network on line and salvage your data.

Progent can help you in your efforts to protect your information system with support services that can range from network security audits to creating a company-wide security strategy. Progent offers economical service to help businesses of all sizes to configure and manage protected networks powered by Windows and Cisco technology and that can include servers and desktops running UNIX or Linux operating systems as well as mobile users with Apple handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the technology of top information security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a first line of defense and keeps most threats from reaching your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's certified engineers are accessible remotely or on site to offer a variety of urgent or project-based network security services which include:

If your network has an urgent need for IT security help, refer to Progent's Urgent Remote Technical Help.

Progent's engineers can deliver world-class support in vital areas of computer security including security evaluation, firewall and VPN solutions, and advanced security planning.

System Security Audits
Progent's certified security consultants can evaluate the vulnerability of your existing computer protection systems by performing comprehensive remote automated analysis based on sophisticated utilities and proven techniques. Progent's experience in administering this service saves you consulting fees and assures a detailed picture of security holes. The information your company is provided can form the foundation of a network protection plan that can permit your network to operate dependably and respond quickly to new threats.

Automated Security Assessment
Progent offers consulting in the use of security evaluation utilities such as Microsoft Baseline Security Analyzer and GFI LANguard for economically performing a variety of programmed system auditing scans to uncover possible security vulnerabilities. Progent has extensive experience with additional security analysis tools such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to build protection into your business operations, install scanning applications, plan and implement a secure network architecture, and suggest policies to maximize the security of your network. Progent's security consultants are able to help you set up a firewall, implement safe remote connectivity to email and business applications, and install VPN. Learn additional information on Progent's network security analysis.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two low-cost security inventory packages designed to enable small businesses to receive a professional network security assessment from a certified security expert. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive test of your IT infrastructure from outside your firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from an authorized machine inside your company firewall to determine vulnerabilities to internal assaults. Both security inventory services are set up and run from a protected external location. The project is overseen by an engineer who has earned high-level security accreditations and who produces a document that summarizes and analyzes the information collected by the security scan and suggests practical remediation where called for.

Stealth Intrusion Analysis Consulting
Stealth intrusion checking is a key component of any serious IT system security plan. Progentís security professionals can perform thorough penetration tests without the awareness of your organization's internal IT resources. Stealth penetration testing shows whether existing security defense tools such as intrusion incident warnings and event log analysis are properly set up and actively monitored. Learn additional information on Progent's network penetration testing support services.

Firewalls and VPN Solutions
Progent's background in security solutions encompasses extensive field work with major firewalls and Virtual Private Network products from multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and VPN Consulting Services
Cisco's security and offsite access products represent a complete line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Find out more information concerning Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Other Firewall and VPN Technology
Progent offers small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and select appropriate products from multiple vendors to achieve your security goals while staying within your spending restraints.

Expert Security Design
Any company ought to develop a carefully thought out security program that includes both pre-attack processes and response plans. The pre-attack strategy is a set of mechanisms that help to reduce vulnerabilities. The reactive strategy assists your company's security personnel to assess the damage caused by an attack, repair the network, document the experience, and get the IT network restored as soon as feasible.

Progent's certified IS security consultants can to help you to perform a comprehensive risk evaluation and define a company-wide security strategy to establish security policies and mechanisms to mitigate future assaults and threats.

CISM Qualified Security Engineering Services
The CISM organization describes the basic capabilities and international standards of skill that information security managers are expected to master. It gives executive management the confidence that consultants who have earned their CISM certification possess the background and knowledge to deliver efficient security administration and support consulting. Progent offers the support of CISM certified security consultants to assist companies with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Recovery Planning
Read additional information about Progent's CISM Accredited Network Security Support Services.

CISSP Qualified Security Engineering Support
The CISSP credential recognizes mastery of an international standard for information security. ANSI has granted certification recognition in the field of data protection defined by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a variety security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Find out more details about Progent's CISSP Qualified Security Support Professionals.

ISSAP Accredited Secure System Architecture Engineering Services
Progent's ISSAP qualified information system architecture engineers are consultants who have earned ISSAP status through rigorous testing and significant experience with network security design. The ISSAP credential indicates demonstrated mastery in the more in-depth requirements of IS security architecture within the broader scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Telecommunications and Network Security
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Site Security
Read additional details about Progent's ISSAP Qualified Secure Network Architecture Consulting Expertise.

CISA Qualified IS Security Auditing Consulting Assistance
The CISA credential is a recognized qualification that indicates mastery in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA-certified network security audit specialists can help your business with:

  • IS Audit Services
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Support
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Find out the details about Progent's CISA Accredited Information System Security Auditing Consulting Services.

CRISC Experts
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's skills to design, deploy, and support information system controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist you to create and carry out a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management consultants can provide a variety of risk identification services including:

  • Collect data and study documentation to identify major vulnerabilities
  • Identify legal, industry, and contractual mandates and company standards associated with your network to assess their potential influence on your business goals
  • Point out potential vulnerabilities for your operational processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your organization understand IT risk so they can contribute to your risk control process
  • Match key risk vectors to your associated operational processes to help assign risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to make sure they match
Get more information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Engineering Services
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that a certified security consultant possesses the skills necessary to provide services in key areas of system, information, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC security audit experts can help your IT organization with:

Learn additional details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Progent Security Engineer
To learn how you can contact a certified security consultant for online or on-premises support in Pennsylvania, call 1-800-993-9400 or go to Online Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.