Business networks in the state of South Carolina can now get prompt and economical online help from Progent's accredited network security consultants to resolve the toughest security problems. The cost is affordable, charges are by the minute, sign-up is fast, and service is world class. Progent also offers assistance for complex projects that demand the knowledge of seasoned security consultants with top industry credentials.

In case your South Carolina organization is some distance from more populated metropolitan neighborhoods such as Columbia, Charleston, Rock Hill, or Greenville, support from local accredited security experts may be limited when there's a security disaster. This can cause lost revenue for your company, upset customers, idle employees, and distracted executives. By calling Progent, you can get in touch with a certified security engineer ready to offer help when you have to have it to keep your computer network on line and restore your information.

Progent can assist you in a variety of ways in your efforts to defend your information system with support ranging from security assessments to creating a company-wide security strategy. Progent offers affordable support to help small and midsize companies to set up and manage secure IT environments based on Windows and Cisco products and that may include servers and desktops based on UNIX or Linux operating systems plus mobile users with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security vendors to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of inspection for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter.

Progent's certified professionals are accessible online or on premises to provide a range of urgent or project-based computer security services such as:

  • Run thorough network security evaluations
  • Recover quickly after attacks
  • Install firewalls from multiple vendors
  • Implement secure methods for remote and mobile connectivity
  • Deploy advanced software for automatic protection against viruses, spam and directory harvest attacks
  • Help create a comprehensive security plan with proactive network monitoring
  • Offer outsourced Call Center Services
  • Help Develop a practical data backup and recovery plan based on Microsoft DPM automated backup capability
If your business has an emergency requirement for IT security help, refer to Progent's Emergency Online Network Support.

Progent's engineers provide world-class support in vital areas of network protection including security assessment, firewall and VPN solutions, and high-level security planning.

Security Evaluation
Progent's expert security consultants can evaluate the vulnerability of your existing computer protection systems by performing exhaustive remote automated testing via sophisticated utilities and tested procedures. Progent's skill in administering this service saves your company consulting fees and offers an objective picture of gaps. The knowledge your business is provided can form the foundation of a network protection plan that will permit your network to run safely and respond quickly to future risks.

Automated Network Vulnerability Evaluation
Progent offers expertise in the use of security testing packages including MBSA and GFI LANguard for affordably performing a set of automatic system testing scans to uncover possible security holes. Progent has broad experience with additional network auditing utilities including NMAP, AMAP application mapper, eEye, plus tools such as SolarWinds, Netcat, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build protection into your company operations, configure scanning software, plan and implement a secure system architecture, and suggest procedures to maximize the security of your network. Progent's security engineers are ready to assist you to configure a firewall, design secure remote connectivity to email and data, and install virtual private network. Find out additional information on Progent's network security evaluation.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small companies to get an impartial security assessment from a qualified security consultant. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a network scan from an authorized machine inside your company firewall to assess vulnerabilities to internal attacks. Both security inventory packages are configured and run from a protected external site. The project is directed by an engineer who has earned high-level security accreditations and who produces a report that summarizes and analyzes the information collected by the security scan and suggests cost-effective remediation if appropriate.

Stealth Intrusion Testing Consulting
Stealth intrusion checking is an important part of any successful network security plan. Progentís security professionals can run extensive intrusion checks without the awareness of your company's in-house IT resources. Unannounced penetration testing shows whether existing security defense systems such as intrusion incident alerts and event log monitoring are properly configured and actively monitored. Find out additional information on Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Solutions
Progent's expertise in security solutions encompasses extensive field work with major firewalls and VPN products from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned key industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to manage your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Security and Virtual Private Network Consulting Services
Cisco's security and remote access products represent a complete range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Learn additional details concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right technologies from multiple suppliers to achieve your security goals while staying within your budget limits.

Expert Network Security Consulting
Every business should develop a thoroughly considered security program that incorporates both preventive processes and response plans. The pre-attack plan is a collection of procedures intended to minimize security weaknesses. The reactive plan assists your security engineers to assess the impact caused by an attack, repair the system, document the experience, and get the IT network operational as quickly as feasible.

Progent's expert information security consultants can to help your business to run a comprehensive risk assessment and define a computer security strategy to establish security processes and mechanisms to mitigate ongoing attacks and dangers.

CISM Qualified System Security Support Expertise
The Certified Information Security Manager (CISM) organization describes the basic capabilities and global standards of skill that information security managers are expected to master. CISM provides business management the confidence that those who have earned their CISM credential possess the background and capability to deliver efficient security administration and consulting services. Progent can provide the services of CISM certified security consultants to help businesses with:

  • Network Security Processes
  • Risk Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Planning
Find out more information concerning Progent's CISM Qualified Information Security Engineering Services.

CISSP Certified Security Consulting Services
CISSP recognizes mastery of an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security defined by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your organization in a broad range of security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Find out more details about Progent's CISSP Accredited IS Security Consulting Professionals.

ISSAP Certified Secure Information System Architecture Engineering Assistance
Progent's ISSAP certified system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the most in-depth demands of information security architecture within the wider scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Read additional details about Progent's ISSAP Qualified Secure Network Architecture Engineering Expertise.

CISA Certified Network Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA credential requires that consultants pass an extensive test given by the ISACA international professional association. Progent's CISA-qualified information security audit consultants are available to assist your business in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Preparedness
Find out more details concerning Progent's CISA Qualified Information System Security Auditing Engineering Services.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's ability to design, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity strategy that follows leading practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation consultants offer a range of risk assessment services including:

  • Gather data and review documentation to help identify significant risk scenarios
  • Identify legal, regulatory, and contractual mandates and company standards related to your network to assess their possible influence on your business goals
  • Point out possible threats for your operational processes to help in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to ensure your organization understand information system risk so they can assist with your risk management process
  • Match key risk scenarios to related business procedures to help determine risk ownership
  • Validate risk appetite with executive management and major stakeholders to make sure they match
Get the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to verify that a certified professional has the skills needed to provide services in important categories of system, information, and application software security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit experts are available to assist your company in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Security Expert
To see how to access a Progent security consultant for remote or on-premises support in South Carolina, call 1-800-993-9400 or go to Online Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.