Business information networks in South Carolina can have quick and affordable remote help from Progent's accredited network security engineers to help with complex security problems. The cost is competitive, billing is per minute, engagement is fast, and support is world class. Progent also provides help for long-term engagements that demand the services of senior security consultants with top industry credentials.

If your South Carolina company is outside of larger metropolitan neighborhoods like Columbia, Charleston, Rock Hill, or Greenville, the availability of local accredited security experts is often problematic during a crisis. This could mean a loss of income for your business, angry customers, unproductive employees, and distracted executives. By utilizing Progent's online services, you can get in touch with a certified security professional who can deliver assistance when you require it to keep your system running and salvage your data.

Progent can help you at any level in your efforts to guard your IT environment with support that ranges from network security assessments to creating a comprehensive security strategy. Progent provides affordable support to assist companies of any size to set up and manage secure IT environments powered by Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a further level of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified engineers are available remotely or in person to provide a range of urgent or longer-term IT security services including:

If your company has an emergency need for IT security help, go to Progent's Emergency Online Network Help.

Progent's consultants provide world-class services in vital facets of computer security including auditing, firewall/VPN support, and high-level security consulting.

System Security Audits
Progent's expert security consultants can evaluate the effectiveness of your existing network protection implementation through comprehensive remote automated analysis based on sophisticated utilities and proven procedures. Progent's experience in this service saves your company time and money and assures an accurate portrayal of weaknesses. The knowledge your IT organization gains can be used as the foundation of a security plan that can permit your information system to operate safely and respond quickly to future threats.

Automated Network Security Audits
Progent offers expertise in the application of security evaluation products such as Microsoft's MBSA and GFI LANguard for economically performing a set of automatic network auditing checks to uncover potential security problems. Progent has broad knowledge of additional security auditing products such as NMAP, AMAP application mapper, eEye, plus tools such as Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can show you how to build security into your company processes, install scanning tools, plan and deploy a protected network architecture, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are able to help you configure a firewall, design safe remote access to email and data, and integrate virtual private network. Learn more about Progent's automated security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to allow small companies to receive a professional network security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your network from outside your company firewall to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from a secure machine within your company firewall to determine the risk to inside assaults. Both security inventory services are configured and run from a protected remote site. The process is overseen by a consultant who has earned high-level security credentials and who generates a document that details and analyzes the information collected by the security scan and suggests practical remediation where called for.

Stealth Intrusion Testing Consulting
Stealth penetration checking is a key part of any comprehensive network security strategy. Progentís security professionals can perform thorough intrusion checks without the knowledge of your organization's internal IT resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion incident warnings and event history analysis are properly set up and consistently checked. Find out more on Progent's network penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security solutions includes extensive field work with leading firewalls and Virtual Private Network (VPN) products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with important industry certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.

Cisco Network Security and VPN Engineering Services
Cisco's network security and offsite access products offer a comprehensive line of manageable security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Learn more details about Progent's Engineering Services for Cisco Security and Virtual Private Network Products.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and choose appropriate technologies from a variety of suppliers to achieve your security objectives while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security vendors to provide centralized control and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to defend endpoints as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to manage the entire threat lifecycle including protection, detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical data, apps and virtual machines that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when needed, can assist you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

Certified Security Consulting
Every business ought to have a carefully considered security program that includes both preventive procedures and reaction planning. The pre-attack plan is a set of mechanisms that help to reduce security weaknesses. The post-attack strategy assists your company's network security engineers to assess the damage resulting from a security penetration, fix the network, document the experience, and get the IT network operational as quickly as feasible.

Progent's expert information security engineers are available to help you to perform a comprehensive vulnerability assessment and create a computer security plan to implement security processes and mechanisms to mitigate future assaults and threats.

CISM Certified Security Support Assistance
The CISM organization defines the basic competencies and global standards of performance that information security managers are required to master. CISM gives executive management the confidence that those who have earned their CISM credential have the background and capability to deliver effective security administration and consulting services. Progent can provide the expertise of CISM certified security consultants to help companies with:

  • IS Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • Information Security Management
  • Recovery Planning
Find out more information about Progent's CISM Network Security Consulting Services.

CISSP Certified Security Engineering Services
CISSP certification denotes expertise with an international standard for network security. The American National Standards Institute has granted certification accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Find out more details about Progent's CISSP Information Security Support Professionals.

ISSAP Certified Secure Network Architecture Engineering Services
Progent's ISSAP qualified information system architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the more complex requirements of IS security architecture within the wider field of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all aspects of architecture security such as.

  • Access Control Systems and Techniques
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and DRP
  • Physical Security
Find out additional information about Progent's ISSAP Certified Secure Information System Architecture Consulting Professionals.

CISA Accredited Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that indicates mastery in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive test given by the ISACA professional group. Progent's CISA IS security audit consultants are available to help your business in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Learn more details about Progent's CISA Certified Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's skills to design, implement, and support IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a business continuity plan based on leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management experts offer a variety of risk identification services including:

  • Gather information and review documentation to identify significant risk scenarios
  • Inventory statutory, industry, and contractual mandates and company standards associated with your information system to assess their possible impact on your business goals
  • Identify possible vulnerabilities for your business processes to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your stakeholders appreciate information system risk so they can contribute to your risk management process
  • Connect key risk vectors to your associated business procedures to help determine risk ownership
  • Validate risk tolerance with your senior management and key stakeholders to ensure they align
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Engineering Support
Global Information Assurance Certification was established in 1999 to validate the knowledge of network security engineers. GIAC's mission is to make sure that an accredited security consultant has the knowledge appropriate to provide services in key categories of network, information, and application software security. GIAC certifications are recognized by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC network security audit experts can help your IT organization with:

Read additional information concerning Progent's GIAC Information Assurance Services.

Contact a Security Expert
To find out how to get in touch with a certified security engineer for online or onsite support in South Carolina, call 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.