Business computer networks in the state of Pennsylvania now have quick and affordable remote access to Progent's accredited security professionals to fix critical security problems. The cost is reasonable, charges are per minute, sign-up is fast, and service is world class. Progent also provides help for complex projects that requires the services of senior security engineers with top security certifications.

If your Pennsylvania company is situated far from larger metropolitan areas like Philadelphia, Pittsburgh, Allentown, or Erie, help from nearby accredited network security professionals may be problematic during an urgent situation. This could mean a loss of income for your business, angry clients, idle employees, and defocused management. By utilizing Progent, you can get in touch with a qualified security engineer who can offer expertise whenever you need it to get your network operating and recover your data.

Progent can assist you in a variety of ways in your efforts to defend your IT environment with support services that can range from network security assessments to creating a comprehensive security plan. Progent provides affordable support to help companies of any size to configure and manage secure networks based on Windows and Cisco products and that can include computers running UNIX or Linux operating systems as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to deliver centralized management and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, DLP, and encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified experts are accessible online or on site to provide a variety of emergency or project-based computer security services such as:

  • Perform comprehensive security audits
  • Recuperate rapidly after attacks
  • Configure hardware and software firewalls
  • Configure secure methods for remote and mobile access
  • Install advanced software for defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security plan with 24x7 security monitoring
  • Provide comprehensive Call Center Support
  • Help Create an effective network backup and disaster recovery strategy based on Data Protection Manager backup/restore technology
If your business has an emergency need for IT security support, refer to Progent's Emergency Online Technical Support.

Progent's support professionals can deliver advanced services in key areas of system security including security assessment, firewall and VPN solutions, and advanced security planning.

System Security Assessment
Progent's expert security engineers can assess the vulnerability of your current network protection environment through exhaustive remote automated testing based on sophisticated utilities and tested procedures. Progent's skill in this service saves you consulting fees and offers a detailed portrayal of security holes. The knowledge your company gains can make up the foundation of a security plan that will permit your network to operate safely and respond rapidly to new risks.

Automated Security Assessment
Progent offers consulting in the application of security auditing packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a set of automatic network auditing checks to uncover potential security weaknesses. Progent has broad experience with other network analysis utilities including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as Metasploit, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can show you how to design security into your company operations, configure scanning tools, define and implement a protected system environment, and suggest policies to optimize the security of your IT system. Progent's security engineers are able to assist you to set up a firewall, design safe remote access to email and data, and integrate VPN. Learn more on Progent's automated security audits.

Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get a professional security assessment from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from outside your firewalled perimeter to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a system scan from a secure computer within your firewall to determine your exposure to internal assaults. The two security inventory packages are set up and run from a protected external site. The project is managed by a consultant who has earned high-level security accreditations and who produces a document that summarizes and analyzes the information collected by the security scan and proposes practical improvements if appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration testing is an important component of any comprehensive network security plan. Progentís security experts can run thorough penetration checks without the awareness of your company's in-house network support resources. Unannounced penetration checking shows whether current security defense tools such as intrusion detection warnings and event history analysis are correctly configured and actively monitored. Learn more on Progent's stealth penetration analysis consulting.

Firewalls and VPN Support
Progent's background in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your existing PIX or ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Network Security and Virtual Private Network Support Services
Cisco's security and remote access technology provide a comprehensive range of manageable security products to help protect your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's CCIE and CCNP certifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Read more information about Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Products.

Engineering Services for Other Firewall and VPN Technology
Progent offers small and mid-size companies expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and choose appropriate technologies from a variety of vendors to achieve your security objectives while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top data security vendors to deliver centralized management and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to automate the entire malware attack progression including filtering, detection, containment, cleanup, and post-attack forensics. Key features include single-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of vital data, applications and VMs that have become lost or damaged as a result of hardware failures, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect data related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can save as much as half of time spent looking for vital information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.

Certified Security Consulting
Any company should develop a carefully thought out security program that incorporates both preventive processes and reaction planning. The pre-attack strategy is a collection of steps intended to minimize security weaknesses. The reactive plan helps your security engineers to evaluate the impact resulting from a security penetration, repair the system, record the experience, and get business functions operational as soon as feasible.

Progent's expert information security consultants are available to help your company to run a comprehensive vulnerability assessment and create a computer security strategy to establish security policies and controls to minimize future assaults and threats.

CISM Certified Security Engineering Expertise
The CISM committee describes the basic competencies and global standards of skill that information security managers are required to master. It provides business management the assurance that those who have qualified for their CISM credential have the background and knowledge to provide efficient security management and support services. Progent can provide the support of CISM qualified security consultants to help companies with:

  • Network Security Strategies
  • Risk Management
  • IS Security Implementation Management
  • Network Security Administration
  • Recovery Management
Find out additional details concerning Progent's CISM Qualified Network Security Engineering Professionals.

CISSP Qualified Security Consulting Expertise
The CISSP credential denotes expertise with a worldwide standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of information security defined by ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Find out additional details concerning Progent's CISSP Accredited IS Security Engineering Professionals.

ISSAP Certified Secure Information System Architecture Engineering Expertise
Progent's ISSAP qualified IT architecture professionals are consultants who have earned ISSAP status through rigorous examination and significant work with network security design. The ISSAP certification represents proven skill in the most challenging demands of information system security architecture bounded by the broader field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all aspects of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Read additional details about Progent's ISSAP Qualified Secure IT Architecture Engineering Expertise.

CISA Certified Security Auditing Engineering Expertise
The CISA credential is an important qualification that signifies mastery in IS security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants undergo a comprehensive test administered by the ISACA international professional group. Progent's CISA security audit engineers can help your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Governance
  • Systems and Architecture Lifecycle
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Read the details about Progent's CISA Accredited Network Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, deploy, and support IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity strategy based on leading practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management experts offer a variety of risk evaluation services including:

  • Collect information and study documentation to identify major vulnerabilities
  • Inventory statutory, regulatory, and contractual requirements and organizational standards related to your information system to determine their possible impact on your business goals
  • Identify possible threats for your business processes to help in evaluating your enterprise risk
  • Create a risk awareness program and conduct training to make sure your stakeholders appreciate IT risk so they can contribute to your risk management program
  • Match key risk scenarios to related business processes to help assign risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to make sure they are in agreement
Learn additional information concerning Progent's CRISC Consultants.

GIAC Certified Information System Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to ensure that an accredited professional possesses the skills necessary to provide support in key areas of system, data, and application software security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC network security audit consultants can help your IT organization in the areas of:

  • Auditing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Learn more information concerning Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Engineer
To find out how you can get in touch with a certified Progent security engineer for online or on-premises help in Pennsylvania, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.