Small business IT networks in South Carolina can now get prompt and affordable online help from Progent's accredited security engineers to assist with critical security issues. Rates are reasonable, billing is by the minute, engagement is immediate, and support is unbeatable. Progent also provides help for complex engagements that requires the services of seasoned security engineers with high-level industry certifications.

If your South Carolina company is some distance from larger urban areas such as Columbia, Charleston, Rock Hill, or Greenville, the availability of nearby accredited network security professionals may be limited during an urgent situation. This could mean a loss of income for your business, upset customers, unproductive workers, and distracted management. By contacting Progent's online services, you have access to a certified security professional who can deliver assistance whenever you require it to get your computer network operating and salvage your data.

Progent can assist you in your initiatives to protect your network with support services that can range from network security checks to developing a company-wide security strategy. Progent offers economical service to help companies of any size to configure and maintain safe IT environments based on Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security vendors to provide web-based management and comprehensive security for your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway device adds a further level of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also enable Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's certified engineers are available online or in person to provide a range of emergency or longer-term computer security services such as:

  • Run automated security evaluations
  • Recover rapidly after attacks
  • Install hardware and software firewalls
  • Implement secure techniques for offsite and mobile connectivity
  • Deploy effective solutions for automatic protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security strategy with 24x7 network monitoring
  • Provide outsourced Help Desk Support
  • Develop a practical data backup and business continuity plan built around System Center Data Protection Manager backup technology
If your business has an immediate need for computer security help, refer to Progent's Urgent Remote Network Support.

Progent's consultants can deliver world-class support in key facets of network protection including security evaluation, firewalls and VPN, and advanced security planning.

System Assessment
Progent's expert security engineers can evaluate the effectiveness of your current computer protection environment through comprehensive remote automated analysis based on advanced software tools and tested procedures. Progent's skill in this testing saves you consulting fees and assures a detailed portrayal of security holes. The information your IT organization is provided can make up the foundation of a network protection strategy that will permit your information system to run dependably and react quickly to new risks.

Automated Network Security Evaluation
Progent provides consulting in the use of security evaluation software such as Microsoft's MBSA and GFI LANguard for affordably running a set of automatic network auditing scans to identify possible security holes. Progent has broad experience with additional network analysis products including NMAP, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you build protection into your business operations, configure auditing applications, plan and implement a protected network environment, and suggest policies to optimize the safety of your IT system. Progent's security engineers are available to help you configure a firewall, design safe remote access to email and business applications, and integrate VPN. Learn more concerning Progent's automated security evaluation.

Security Inventory Packages for Small Businesses
Progent offers two low-cost security inventory service packages intended to enable small businesses to get an impartial network security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, a security engineer runs a comprehensive examination of your network from outside your firewall to uncover potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from an authorized computer inside your firewall to assess vulnerabilities to inside attacks. The two security inventory services are set up and run from a protected external site. The project is directed by an engineer who has earned top security credentials and who generates a report that summarizes and interprets the data collected by the scan and proposes cost-effective improvements if called for.

Network Security Penetration Testing Support Services
Stealth intrusion checking is an important part of any successful IT system security plan. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's internal IT resources. Stealth penetration testing shows whether existing security defense tools such as intrusion incident alerts and event log monitoring are properly set up and actively checked. Learn additional information concerning Progent's network penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's background in network security technology encompasses extensive familiarity with major firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important industry accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The new ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's security and offsite connection technology represent a comprehensive range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Learn additional information concerning Progent's Engineering Expertise for Cisco Security and VPN Products.

Consulting Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security strategy and choose appropriate technologies from multiple suppliers to achieve your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a collection of low-cost, set-price monthly services intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security platform that uses the technology of leading data security vendors to provide web-based control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This decreases your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's on-premises security gateway device adds a further level of inspection for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to manage the entire malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of critical data, apps and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as IPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your critical information. Learn more about ProSight DPS Managed Cloud Backup.

Certified Security Design
Any business should have a thoroughly considered security strategy that incorporates both preventive processes and reaction plans. The pre-attack strategy is a set of steps intended to minimize vulnerabilities. The reactive plan helps your security engineers to assess the impact resulting from a security penetration, fix the damage, record the event, and get the IT network running as rapidly as possible.

Progent's certified IS security engineers can to help you to perform a full risk assessment and create a network security strategy to establish security policies and controls to minimize future assaults and threats.

CISM Certified Network Security Engineering Expertise
The CISM organization describes the basic competencies and international standards of performance that IT security managers are required to master. CISM gives executive management the confidence that those who have qualified for their CISM certification have the experience and knowledge to provide efficient security administration and consulting consulting. Progent offers the services of CISM certified security professionals to assist businesses with:

  • IS Security Strategies
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Management
  • Response Management
Learn more details about Progent's CISM Accredited IS Security Consulting Professionals.

CISSP Qualified Security Engineering Services
CISSP recognizes expertise with a global standard for information security. ANSI (American National Standards Institute) has granted certification recognition in the area of data security defined by ISO 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional information about Progent's CISSP Qualified Security Consulting Professionals.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP qualified IT architecture professionals are experts who have earned ISSAP status as a result of thorough testing and extensive experience with information security design. The ISSAP credential represents proven mastery in the more complex demands of IS security architecture bounded by the broader scope of IS security knowledge required for CISSP certification. Progent's ISSAP-qualified security experts can assist your company with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecom and System Infrastructure Security
  • Cryptography Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and DRP
  • Hardware Security
Find out additional information concerning Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Accredited Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a prestigious achievement that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination administered by the ISACA international professional group. Progent's CISA information security audit experts can assist your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Administration
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Protecting Information Resources
  • Business Continuity Planning
Learn the details concerning Progent's CISA Accredited Network Security Auditing Engineering Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate an IT professional's skills to design, deploy, and maintain information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and carry out a business continuity plan based on industry best practices identified by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation specialists offer a range of risk identification services including:

  • Collect data and review documentation to help identify significant risk scenarios
  • Inventory legal, industry, and contractual requirements and organizational standards associated with your network to determine their possible impact on your strategic goals
  • Identify potential vulnerabilities for your operational processes to help in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your stakeholders understand information system risk so they can assist with your risk management program
  • Connect key risk vectors to your associated business procedures to help assign risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to ensure they match
Find out more information concerning Progent's CRISC Consultants.

GIAC Qualified Information System Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security engineers. GIAC's goal is to assure that an accredited professional possesses the knowledge necessary to deliver support in key areas of system, data, and application security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified network security audit specialists are available to assist your company in the areas of:

  • Auditing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Expertise.

Contact a Security Specialist
To see how to access a security engineer for online or on-premises support in South Carolina, phone 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.