Small business information networks in the state of South Dakota can now get fast and economical online technical support from Progent's certified network security professionals to assist with critical security problems. The cost is competitive, charges are per minute, engagement is immediate, and support is world class. Progent also offers help for complex projects that demand the expertise of senior security engineers with high-level industry credentials.

If your South Dakota business is based away from more populated urban areas including Sioux Falls, Rapid City, or Aberdeen, help from local accredited network security engineers may be limited when there's a security disaster. This can cause lost income for your business, angry customers, idle employees, and distracted management. By calling Progent's online services, you can get in touch with a certified security engineer ready to deliver help whenever you need it to keep your system running and recover your data.

Progent can assist you in your initiatives to protect your information system with support services that can range from network security audits to developing a company-wide security strategy. Progent provides affordable support to assist companies of any size to configure and maintain protected IT environments based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security vendors to provide centralized management and comprehensive protection for your email traffic. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security engineers are accessible online or on premises to offer a variety of emergency or longer-term network security services which include:

If your company has an urgent requirement for computer security support, go to Progent's Urgent Remote Network Help.

Progent's security experts can deliver advanced support in vital areas of network protection including security assessment, firewall/VPN support, and high-level security consulting.

Security Audits
Progent's expert security engineers can evaluate the effectiveness of your existing network security environment through comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's skill in administering this service saves your company time and money and offers an objective picture of gaps. The knowledge your business is provided can make up the basis of a security strategy that can allow your network to run safely and respond rapidly to future risks.

Automated Security Audits
Progent provides consulting in the use of security evaluation utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a variety of programmed network auditing scans to uncover possible security holes. Progent has broad experience with other network auditing tools such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you build protection into your company operations, install scanning applications, plan and deploy a protected network architecture, and suggest procedures to maximize the security of your IT system. Progent's security consultants are able to help you set up a firewall, design secure remote connectivity to email and data, and install VPN. Find out additional information on Progent's automated security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation packages designed to allow small businesses to receive a professional security assessment from a qualified security engineer. With Progent's External Security Inventory Scan, an engineer runs an extensive test of your network from beyond your firewall to determine possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized computer inside your firewall to determine your exposure to inside threats. The two security inventory services are configured and executed from a protected external site. The project is overseen by a consultant who has earned high-level security credentials and who produces a document that details and interprets the information captured by the scan and proposes practical improvements if called for.

Stealth Intrusion Testing Support Services
Stealth intrusion testing is an important part of any comprehensive IT system security plan. Progentís security professionals can perform extensive intrusion tests without the awareness of your organization's in-house network support resources. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion detection warnings and event log monitoring are properly set up and consistently checked. Learn more concerning Progent's network security penetration analysis consulting.

Firewall and Virtual Private Network Support
Progent's expertise in network security technology includes extensive field work with leading firewalls and Virtual Private Network (VPN) products from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the services of engineers with key networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Support Services
Cisco's security and offsite access technology represent a full range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Read more details about Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security strategy and select the right products from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Certified Network Security Design
Every company ought to have a thoroughly thought out security program that incorporates both preventive procedures and reaction planning. The pre-attack plan is a set of mechanisms designed to minimize security weaknesses. The post-attack strategy assists your company's security personnel to assess the impact resulting from an attack, repair the damage, document the event, and get the IT network restored as rapidly as feasible.

Progent's expert IT security engineers can to help your company to run a full risk evaluation and create a network security plan to implement security policies and mechanisms to mitigate future assaults and threats.

CISM Certified Network Security Support Expertise
The CISM committee defines the basic competencies and international standards of performance that information security professionals are expected to learn. CISM provides business management the confidence that those who have earned their CISM certification have the experience and capability to deliver efficient security management and support consulting. Progent offers the services of CISM certified security consultants to assist businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Management
  • Response Planning
Read more details concerning Progent's CISM IS Security Consulting Professionals.

CISSP Accredited Security Engineering Support
The CISSP credential denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification recognition in the area of data security defined by ISO 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Learn additional details about Progent's CISSP Information Security Consulting Services.

ISSAP Accredited Secure Information System Architecture Consulting Services
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP status through thorough examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the most challenging demands of information system security architecture within the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Find out more information about Progent's ISSAP Qualified Secure Information System Architecture Support Professionals.

CISA Qualified IS Security Auditing Consulting Assistance
The CISA credential is a recognized achievement that signifies mastery in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA security audit engineers are available to assist your business with:

  • IS Audit Process
  • IT Administration
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Get more details about Progent's CISA Certified Network Security Auditing Consulting Assistance.

CRISC Consultants
The CRISC certification program was initiated by ISACA to verify a consultant's skills to plan, implement, and maintain IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and execute a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation experts offer a range of risk evaluation services including:

  • Gather information and review documentation to help identify significant risk scenarios
  • Inventory legal, industry, and business requirements and company policies associated with your information system to assess their potential impact on your business goals
  • Identify potential threats for your operational workflows to help in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate IT risk so they can assist with your risk control program
  • Connect identified risk vectors to related operational procedures to help assign risk ownership
  • Validate risk appetite with executive management and major stakeholders to ensure they are in agreement
Read additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security professionals. GIAC's mission is to verify that an accredited security consultant has the knowledge necessary to provide support in critical categories of system, information, and application security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit specialists are available to assist your IT organization in the areas of:

  • Auditing Perimeters
  • Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Engineer
To see how to contact a Progent security engineer for remote or onsite support in South Dakota, call 1-800-993-9400 or go to Online Network Help.














© 2002- 2017 Progent Corporation. All rights reserved.