Small business networks in the state of Pennsylvania can depend on fast and economical online access to Progent's qualified security engineers to fix critical security problems. The cost is reasonable, charges are by the minute, sign-up is immediate, and service is world class. Progent also offers assistance for complex projects that requires the services of seasoned security consultants with top security credentials.

If your Pennsylvania small business is situated outside of larger metropolitan areas like Philadelphia, Pittsburgh, Allentown, or Erie, support from nearby accredited network security professionals may be limited during an urgent situation. This can cause a drop in income for your company, angry customers, idle workers, and distracted executives. By calling Progent's remote support, you have access to a qualified security engineer who can deliver expertise whenever you require it to get your system operating and salvage your information.

Progent can assist you in all your efforts to protect your network with services that ranges from network security audits to creating a company-wide security plan. Progent provides affordable service to help companies of any size to set up and maintain secure networks powered by Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security vendors to provide centralized control and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's certified experts are available online or in person to provide a variety of urgent or project-based network security services such as:

If your network has an urgent need for computer security support, go to Progent's Urgent Remote Technical Help.

Progent's engineers provide world-class services in key areas of network security including analysis, firewall and VPN expertise, and advanced security planning.

System Security Assessment
Progent's certified security consultants can assess the strength of your existing network security environment by performing comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's skill in this service saves your company consulting fees and assures a detailed portrayal of gaps. The information your business is provided can make up the foundation of a security plan that will allow your information system to run dependably and react quickly to new risks.

Automated Network Vulnerability Assessment
Progent provides expertise in the application of security analysis utilities such as MBSA and LANguard from GFI for affordably running a variety of automatic network testing checks to identify possible security vulnerabilities. Progent has extensive experience with other security auditing tools including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can show you how to design security into your company operations, install auditing tools, define and deploy a protected system architecture, and recommend policies to maximize the safety of your network. Progent's security professionals are available to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn additional information concerning Progent's automated security audits.

Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages designed to allow small companies to receive an independent network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from an authorized computer within your company firewall to determine the risk to inside attacks. The two security inventory services are configured and run from a secured external location. The process is directed by a consultant who has earned high-level security accreditations and who generates a document that summarizes and interprets the information collected by the security scan and proposes cost-effective improvements if appropriate.

Stealth Security Penetration Analysis Consulting
Stealth penetration testing is a key component of any successful network security strategy. Progentís security experts can run thorough penetration tests without the knowledge of your company's internal IT resources. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion incident warnings and event log monitoring are properly set up and actively monitored. Learn additional information concerning Progent's stealth security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote access products provide a comprehensive line of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco CCIE and CCNP certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Read additional information concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose appropriate products from multiple vendors to support your security goals while sticking within your spending limits.

Certified Security Consulting
Every company ought to develop a thoroughly considered security strategy that incorporates both pre-attack processes and reaction planning. The proactive plan is a collection of procedures designed to minimize security weaknesses. The reactive plan assists your company's network security engineers to assess the impact caused by an attack, repair the damage, record the experience, and get the IT network restored as soon as possible.

Progent's expert IT security consultants are available to assist your company to perform a comprehensive vulnerability evaluation and create a network security plan to establish security policies and mechanisms to mitigate ongoing assaults and threats.

CISM Qualified Security Support Services
The Certified Information Security Manager (CISM) committee defines the basic capabilities and international standards of performance that IT security managers are required to learn. It gives executive management the assurance that those who have qualified for their CISM credential have the experience and knowledge to provide effective security management and support consulting. Progent offers the expertise of CISM certified security consultants to assist companies with:

  • Network Security Governance
  • Vulnerability Analysis
  • Information Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Find out additional details about Progent's CISM Security Support Services.

CISSP Qualified Security Consulting Expertise
CISSP denotes expertise with a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security defined by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional details concerning Progent's CISSP-certified IS Security Engineering Expertise.

ISSAP Accredited Secure Information System Architecture Consulting Expertise
Progent's ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP status through thorough examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most challenging demands of information system security architecture within the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Find out more information concerning Progent's ISSAP Accredited Secure Network Architecture Support Professionals.

CISA Accredited IS Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is an important qualification that indicates mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA professional group. Progent's CISA-qualified security audit engineers can assist your company in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Read more information concerning Progent's CISA Qualified IS Security Auditing Consulting Assistance.

CRISC Experts
The CRISC certification program was initiated by ISACA to verify a consultant's skills to plan, deploy, and support IS controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts can provide a range of risk identification services including:

  • Collect information and review documentation to evaluate significant vulnerabilities
  • Identify legal, industry, and business requirements and organizational policies associated with your network to determine their potential impact on your business objectives
  • Identify potential threats for your business workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to ensure your organization appreciate IT risk so they can contribute to your risk control process
  • Match key risk scenarios to your associated operational procedures to help determine risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they match
Learn additional details concerning Progent's CRISC Experts.

GIAC Qualified IS Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to make sure that a certified professional possesses the skills necessary to provide support in critical areas of system, data, and program security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified IS security audit engineers are available to assist your business in the areas of:

Learn more details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Progent Security Specialist
To learn how you can access a Progent security engineer for remote or on-premises support in Pennsylvania, call 1-800-993-9400 or go to Remote Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.