Business networks in the state of South Dakota can have fast and economical online access to Progent's accredited security support specialists to help with the toughest security problems. The cost is affordable, charges are per minute, sign-up is fast, and service is unbeatable. Progent also offers assistance for complex engagements that requires the expertise of seasoned security consultants with high-level security certifications.

In case your South Dakota small business is situated far from more populated urban neighborhoods like Sioux Falls, Rapid City, or Aberdeen, help from nearby certified network security experts is often limited during a security disaster. This can cause a drop in productivity for your company, angry clients, idle employees, and distracted management. By calling Progent's online services, you can get in touch with a certified security consultant who can offer expertise when you have to have it to keep your information system operating and restore your information.

Progent can help you in your initiatives to guard your information system with support services that ranges from network security audits to developing a company-wide security strategy. Progent provides affordable service to assist companies of any size to set up and manage protected IT environments based on Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of analysis for incoming email. For outbound email, the onsite gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays within your corporate firewall.

Progent's certified experts are accessible online or on premises to offer a variety of urgent or longer-term IT security services such as:

If your network has an emergency need for IT security support, refer to Progent's Urgent Remote Network Help.

Progent's consultants offer advanced services in vital facets of network security that include analysis, firewall/VPN support, and advanced security planning.

System Audits
Progent's certified security engineers can assess the vulnerability of your current network protection implementation through comprehensive remote automated analysis via sophisticated software tools and tested procedures. Progent's skill in this testing saves your company time and money and assures a detailed picture of security holes. The knowledge your company is provided can make up the foundation of a security strategy that will allow your information system to run safely and adapt quickly to new risks.

Automated Vulnerability Evaluation
Progent provides consulting in the application of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a set of automatic network auditing scans to identify potential security gaps. Progent has broad experience with additional security auditing tools such as NMAP, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit, Hydra, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can show you how to build security into your business operations, configure auditing tools, plan and deploy a protected network environment, and suggest procedures to maximize the security of your IT system. Progent's security consultants are available to help you configure a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Find out additional information about Progent's network security assessment.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two low-cost security inventory bundles designed to enable small companies to receive an impartial security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer runs an extensive examination of your network from outside your firewalled perimeter to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from a secure computer inside your company firewall to determine your exposure to inside assaults. Both security inventory packages are configured and run from a protected external site. The process is overseen by an engineer who has earned top security credentials and who generates a report that details and interprets the information collected by the security scan and proposes practical remediation where appropriate.

Stealth Penetration Analysis Consulting
Stealth penetration testing is an important component of any comprehensive IT system security plan. Progentís security experts can run extensive penetration checks without the knowledge of your company's internal network support staff. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event log monitoring are properly set up and consistently checked. Learn more concerning Progent's stealth penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in network security technology includes extensive field work with major firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access products offer a comprehensive line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and CCNP qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Learn more information concerning Progent's Support Expertise for Cisco Security and Virtual Private Network Appliances.

Support Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select appropriate products from multiple vendors to achieve your security objectives while staying within your budget restraints.

Certified Security Design
Any company ought to develop a carefully thought out security program that incorporates both proactive processes and response plans. The pre-attack strategy is a collection of steps that help to minimize vulnerabilities. The reactive strategy helps your company's security personnel to assess the impact caused by an attack, repair the system, record the experience, and get business functions running as quickly as feasible.

Progent's certified IT security engineers are available to assist your company to run a complete vulnerability evaluation and create a network security plan to establish security policies and controls to reduce ongoing assaults and threats.

CISM Certified System Security Support Assistance
The CISM committee describes the core competencies and worldwide standards of performance that IT security managers are expected to learn. It provides business management the confidence that consultants who have earned their CISM credential have the background and knowledge to deliver efficient security administration and consulting consulting. Progent offers the expertise of CISM qualified security consultants to help businesses with:

  • Network Security Processes
  • Risk Analysis
  • IS Security Program Management
  • Information Security Administration
  • Recovery Management
Learn more details about Progent's CISM Security Support Services.

CISSP Certified Security Consulting Expertise
CISSP denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data protection stipulated by ISO 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security areas such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Read additional information concerning Progent's CISSP Qualified Information Security Support Services.

ISSAP Accredited Secure IT Architecture Engineering Assistance
Progent's ISSAP certified system architecture professionals are consultants who have earned ISSAP status through rigorous examination and significant experience with information security design. The ISSAP credential indicates demonstrated skill in the more in-depth requirements of information security architecture bounded by the broader field of information system security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your business with all aspects of architecture security such as.

  • Access Control Systems and Methodologies
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Site Security
Learn additional details concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Professionals.

CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo an extensive examination given by the ISACA international professional association. Progent's CISA-certified security audit engineers can assist your business with:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Find out more details about Progent's CISA Accredited Information System Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's ability to design, deploy, and maintain IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation engineers offer a range of risk identification services including:

  • Collect information and review documentation to evaluate major vulnerabilities
  • Identify legal, industry, and contractual mandates and organizational policies related to your network to assess their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to ensure your stakeholders appreciate IT risk so they can assist with your risk management process
  • Connect identified risk scenarios to your associated business procedures to help assign risk ownership
  • Determine risk tolerance with executive management and key stakeholders to make sure they are in agreement
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Consulting Expertise
Global Information Assurance Certification was founded in 1999 to certify the knowledge of network security professionals. GIAC's goal is to make sure that a certified professional possesses the knowledge needed to deliver services in key areas of system, data, and program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit consultants are available to assist your company with:

  • Auditing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Expert
To see how to contact a Progent security consultant for online or onsite help in South Dakota, phone 1-800-993-9400 or go to Online Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.