Small business information networks in the state of Rhode Island now have prompt and economical online access to Progent's certified security engineers to help with complex security problems. The cost is reasonable, charges are by the minute, sign-up is quick, and support is world class. Progent also offers help for long-term projects that demand the services of senior security consultants with high-level security certifications.

In case your Rhode Island office is based some distance from major urban neighborhoods including Providence, Warwick, or Cranston, access to nearby accredited security consultants is often limited when you have a crisis. This could mean a loss of revenue for your company, angry clients, idle employees, and distracted executives. By calling Progent, you can get in touch with a certified security engineer who can offer help when you require it to keep your system on line and recover your data.

Progent can assist you at any level in your efforts to defend your IT environment with services that ranges from network security assessments to developing a company-wide security strategy. Progent offers economical service to help small and midsize companies to design and maintain secure networks powered by Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver web-based control and world-class security for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also enable Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's security professionals are available online or on site to offer a variety of urgent or longer-term computer security services which include:

If your business has an immediate requirement for IT security help, go to Progent's Urgent Remote Technical Help.

Progent's engineers provide world-class support in vital fields of computer protection including security assessment, firewall and VPN expertise, and high-level security planning.

System Assessment
Progent's certified security consultants can evaluate the vulnerability of your current computer security systems by performing exhaustive remote automated testing via advanced utilities and tested procedures. Progent's experience in administering this service saves your company time and money and assures an objective picture of system vulnerability. The knowledge your business is provided can be used as the foundation of a security plan that can allow your information system to operate dependably and adapt rapidly to new threats.

Automated Network Vulnerability Assessment
Progent provides consulting in the use of security testing utilities including Microsoft Baseline Security Analyzer and LANguard from GFI for economically running a variety of programmed network auditing checks to uncover possible security gaps. Progent has broad knowledge of additional network auditing products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build protection into your business processes, configure scanning tools, plan and deploy a secure network environment, and recommend policies to optimize the safety of your IT system. Progent's security engineers are able to show you how to set up a firewall, implement secure remote connectivity to email and business applications, and install VPN. Learn additional information concerning Progent's automated security analysis.

Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to allow small companies to receive an objective network security evaluation from an accredited security specialist. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from a secure machine within your company firewall to assess vulnerabilities to internal assaults. Both security inventory packages are configured and executed from a secured external location. The process is directed by an engineer with high-level security accreditations and who produces a report that summarizes and interprets the information collected by the scan and proposes cost-effective improvements if appropriate.

Stealth Security Penetration Testing Support Services
Stealth intrusion testing is a key component of any serious IT system security plan. Progent’s security experts can perform extensive penetration tests without the awareness of your company's in-house IT staff. Stealth penetration testing uncovers whether current security defense systems such as intrusion incident alerts and event history monitoring are properly set up and actively checked. Find out additional information about Progent's stealth security penetration analysis consulting.

Firewall/VPN Solutions
Progent's expertise in security solutions encompasses extensive field work with major firewalls and Virtual Private Network technology offered by multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers with key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, configure, optimize, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Engineering Services
Cisco's security and offsite connection technology offer a comprehensive line of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company objectives. Read additional details concerning Progent's Support Services for Cisco Security Solutions and VPN Products.

Support Expertise for Additional Firewall and VPN Solutions
Progent provides small and mid-size companies expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select appropriate technologies from multiple vendors to support your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior machine learning technology to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-based AV products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the entire malware attack lifecycle including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services deliver economical multi-layer security for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, device management, and web filtering through cutting-edge technologies packaged within a single agent managed from a single control. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with government and industry information protection standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate action. Progent's consultants can also assist you to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and enables rapid restoration of vital data, apps and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security vendors to deliver centralized management and world-class security for all your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to monitor and protect internal email that originates and ends within your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be moved immediately to a different hosting environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can save as much as 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether you’re making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Design
Any business should have a thoroughly thought out security strategy that includes both preventive procedures and response planning. The proactive strategy is a set of procedures intended to minimize security weaknesses. The post-attack strategy assists your company's security personnel to evaluate the damage caused by a security penetration, repair the network, document the event, and get business functions operational as rapidly as feasible.

Progent's expert information security consultants are available to help your business to perform a complete risk assessment and create a computer security strategy to implement security processes and controls to reduce ongoing attacks and dangers.

CISM Certified System Security Support Services
The CISM organization describes the core capabilities and global standards of performance that information security professionals are required to learn. CISM gives business management the confidence that consultants who have earned their CISM certification possess the experience and capability to provide efficient security management and support consulting. Progent can provide the services of CISM qualified security professionals to help businesses with:

  • IS Security Governance
  • Vulnerability Management
  • Network Security Program Management
  • Information Security Management
  • Response Planning
Read additional information concerning Progent's CISM Qualified IS Security Support Professionals.

CISSP Accredited Security Engineering Assistance
The CISSP credential denotes mastery of a global standard for network security. ANSI has awarded certification recognition in the area of data security stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a broad range of security fields including:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Preparedness
Learn additional information about Progent's CISSP Qualified Information Security Consulting Services.

CISSP-ISSAP Qualified Secure Network Architecture Consulting Expertise
Progent's CISSP-ISSAP certified network architecture engineers are experts who have earned ISSAP Certification through thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most in-depth demands of IS security architecture bounded by the wider field of IS security expertise required for CISSP certification. Progent's ISSAP-qualified security specialists can assist your company with all aspects of secure network architecture including.

  • Access Management Systems and Methodologies
  • Phone System and System Infrastructure Protection
  • Cryptography Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Learn more details about Progent's ISSAP Accredited Secure System Architecture Consulting Expertise.

CISA Accredited Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a globally recognized achievement that signifies expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination given by the ISACA professional association. Progent's CISA-certified security audit engineers are available to help your business in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Get the details about Progent's CISA Certified Information System Security Auditing Consulting Support.

CRISC Experts
The CRISC program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and maintain IS control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to create and execute a workplace continuity plan that follows leading practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists can provide a variety of risk assessment services such as:

  • Collect information and review documentation to identify significant risk scenarios
  • Identify legal, regulatory, and contractual mandates and organizational policies associated with your network to assess their possible influence on your strategic objectives
  • Identify potential threats for your operational processes to assist in analyzing your corporate risk
  • Create a risk awareness program and conduct seminars to ensure your organization understand information system risk so they can assist with your risk management process
  • Match key risk scenarios to related business procedures to help determine risk ownership
  • Validate risk appetite with your senior leadership and key stakeholders to ensure they match
Read additional details concerning Progent's CRISC Risk Management Experts.

GIAC Qualified Security Engineering Support
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security engineers. GIAC's goal is to verify that an accredited professional has the knowledge necessary to deliver support in vital categories of network, data, and program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the United States NSA. Progent's GIAC network security audit engineers are available to help your company with:

  • Auditing Networks
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Security Specialist
To learn how to contact a certified security consultant for remote or on-premises support in Rhode Island, call 1-800-993-9400 or go to Remote Network Support.














© 2002- 2019 Progent Corporation. All rights reserved.