Small business information networks in the state of South Dakota can have fast and affordable remote technical support from Progent's certified security experts to resolve critical security problems. Rates are affordable, charges are per minute, sign-up is immediate, and service is world class. Progent also provides assistance for long-term projects that demand the expertise of seasoned security engineers with top industry certifications.

In case your South Dakota network is situated outside of larger urban neighborhoods such as Sioux Falls, Rapid City, or Aberdeen, access to local accredited security experts is often limited when there's an urgent situation. This could mean a loss of revenue for your business, angry customers, unproductive employees, and distracted executives. By calling Progent's online services, you have access to a certified security professional ready to provide help when you have to have it to keep your computer network operating and recover your information.

Progent can help you in a variety of ways in your efforts to protect your network with services that can range from network security checks to creating a comprehensive security plan. Progent provides affordable service to assist businesses of all sizes to set up and manage safe networks based on Windows and Cisco products and that can include servers and desktops running UNIX or Linux platforms plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security platform that uses the technology of leading data security vendors to provide web-based control and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The local gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified consultants are available remotely or on premises to provide a range of urgent or longer-term network security services which include:

  • Run comprehensive network security evaluations
  • Recuperate promptly after serious security breaches
  • Set up effective firewalls
  • Configure secure methods for remote and mobile connectivity
  • Deploy advanced software for protection against spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Support
  • Help Create an effective backup and recovery solution centered on Microsoft Data Protection Manager backup capability
If your business has an emergency requirement for IT security support, go to Progent's Urgent Remote Network Support.

Progent's consultants provide world-class support in vital facets of system protection including security evaluation, firewall/VPN support, and advanced security consulting.

System Assessment
Progent's expert security engineers can evaluate the strength of your existing computer security environment through comprehensive remote automated analysis based on advanced software tools and tested procedures. Progent's skill in administering this testing saves your company consulting fees and assures an objective portrayal of system vulnerability. The information your IT organization gains can form the basis of a network protection plan that can allow your network to run dependably and react rapidly to new threats.

Automated Vulnerability Audits
Progent offers consulting in the use of security auditing products such as MBSA and GFI LANguard Network Security Scanner for economically running a set of programmed system testing checks to identify potential security problems. Progent has extensive experience with other security auditing utilities such as NMAP, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can show you how to design protection into your business operations, install auditing tools, define and deploy a secure system architecture, and suggest policies to optimize the security of your IT system. Progent's security engineers are available to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out additional information about Progent's network security assessment.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles designed to allow small companies to get an impartial security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your network from outside your firewall to uncover potential weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from an authorized computer within your company firewall to uncover the risk to internal assaults. The two security inventory packages are set up and executed from a protected remote location. The process is managed by a consultant who has earned top security credentials and who generates a report that details and interprets the data collected by the security scan and proposes cost-effective improvements where appropriate.

Network Security Penetration Analysis Consulting
Stealth penetration checking is an important component of any comprehensive network security strategy. Progentís security professionals can run thorough penetration checks without the knowledge of your company's internal IT staff. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion detection warnings and event log monitoring are correctly set up and actively monitored. Find out additional information on Progent's stealth penetration testing support services.

Firewall/VPN Solutions
Progent's background in network security technology encompasses in-depth field work with major firewalls and VPN technology offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers with important industry accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and VPN Support Expertise
Cisco's network security and remote connection technology offer a comprehensive line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Read more information about Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Support Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security plan and choose appropriate technologies from multiple vendors to achieve your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security companies to deliver web-based control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis technology to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely get by legacy signature-matching AV tools. ProSight ASM safeguards local and cloud resources and provides a single platform to address the entire threat lifecycle including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates and monitors your backup activities and enables fast restoration of vital files, applications and VMs that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR specialists can provide advanced expertise to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard information related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and managing your network documentation, you can save as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Security Planning
Any company should develop a thoroughly considered security strategy that incorporates both proactive processes and response plans. The proactive strategy is a collection of procedures intended to reduce vulnerabilities. The post-attack plan helps your security engineers to assess the damage resulting from an attack, fix the damage, document the experience, and get the IT network running as rapidly as possible.

Progent's certified IS security engineers are available to help your business to perform a comprehensive vulnerability evaluation and define a company-wide security plan to establish security processes and mechanisms to mitigate ongoing assaults and dangers.

CISM Qualified System Security Engineering Services
The CISM organization defines the basic competencies and international standards of skill that IT security professionals are required to master. It gives executive management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to deliver effective security management and consulting services. Progent can provide the services of CISM certified security professionals to help businesses with:

  • IS Security Processes
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Management
  • Recovery Planning
Find out more information concerning Progent's CISM Accredited IS Security Consulting Expertise.

CISSP Accredited Security Consulting Services
The CISSP credential denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of data protection stipulated by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security fields such as:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Read more details concerning Progent's CISSP Security Support Professionals.

ISSAP Qualified Secure Information System Architecture Consulting Services
Progent's ISSAP qualified network architecture professionals are experts who have been awarded ISSAP status as a result of thorough examination and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the more in-depth demands of IS security architecture within the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all aspects of architecture security including.

  • Access Management Systems and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out more details about Progent's ISSAP Accredited Secure IT Architecture Engineering Expertise.

CISA Qualified Security Auditing Consulting Services
The CISA credential is a prestigious qualification that signifies mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive examination given by the ISACA international professional group. Progent's CISA network security audit consultants are available to help your business in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Find out the details concerning Progent's CISA Certified IS Security Auditing Engineering Support.

CRISC Consultants
The CRISC program was established by ISACA to validate a consultant's skills to design, implement, and support IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation specialists can provide a range of risk identification services including:

  • Gather data and study documentation to identify significant vulnerabilities
  • Identify legal, industry, and contractual mandates and company standards associated with your network to assess their potential influence on your strategic goals
  • Point out potential vulnerabilities for your operational processes to help in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to make sure your organization appreciate IT risk so they can contribute to your risk management program
  • Connect identified risk vectors to related business processes to help assign risk ownership
  • Determine risk tolerance with executive leadership and major stakeholders to ensure they are in agreement
Read more information about Progent's CRISC Experts.

GIAC Certified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security experts. GIAC's goal is to verify that an accredited security consultant possesses the knowledge needed to provide services in critical areas of system, data, and application software security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit engineers are available to assist your company in the areas of:

  • Assessing Security Systems
  • Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Certified Security Specialist
To learn how you can get in touch with a security engineer for remote or onsite support in South Dakota, phone 1-800-993-9400 or visit Remote Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.