Small and mid-size business networks in Toronto, Canada can depend on prompt online or onsite technical support from Progent's certified information security consultants to help with emergency security issues. Rates are affordable, charges are by the minute, the engagement process is quick and easy, and service is world class. Progent also provides assistance for complex projects that requires the knowledge of seasoned security engineers with top security credentials.

If your network is located some away from larger metropolitan areas, local support from qualified security professionals may be limited when you have an emergency. This could mean a loss of productivity for your company, upset customers, idle employees, and defocused executives. By contacting Progent's remote support, you can get in touch with a qualified security consultant ready to deliver help whenever you need it to keep your information system running and restore your data.

Progent can help you in your initiatives to protect your information system with support ranging from network security audits to developing and validating a company-wide security plan. Progent provides affordable support to help small and midsize businesses plan and maintain secure IT environments based on Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms. Progent can also help you design a secure BYOD environment by offering services that include iPhone and iPad integration, Android phone and tablet consulting, and RIM BlackBerry expertise..

Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security vendors to provide web-based control and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email that stays inside your security perimeter.

Progent's certified engineers are available remotely or in person to provide a range of urgent or project-based computer security services which include:

  • Perform comprehensive network security evaluations
  • Recuperate promptly after virus and worm attacks
  • Install firewalls from multiple vendors
  • Implement secure techniques for offsite and mobile connectivity
  • Install advanced applications for automatic defense against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 monitoring
  • Offer outsourced Call Center Support
  • Help Create an effective backup and disaster recovery solution based on Data Protection Manager automated backup capability
If your network has an urgent need for computer security help, refer to Progent's Emergency Remote Network Support.

Progent's security experts offer world-class services in vital fields of system security that include auditing, firewall/VPN support, and high-level security consulting.

Security Audits
Progent's certified security consultants can evaluate the vulnerability of your current network security implementation by performing exhaustive remote automated testing based on sophisticated software tools and proven techniques. Progent's skill in this service saves your company consulting fees and assures an accurate portrayal of security holes. The knowledge your company is provided can form the foundation of a security plan that will permit your information system to operate safely and react quickly to future risks.

Automated Vulnerability Analysis
Progent offers consulting in the use of security evaluation products including Microsoft Baseline Security Analyzer and GFI LANguard for affordably running a set of automatic network testing scans to uncover possible security gaps. Progent has broad knowledge of additional security auditing products including NMAP Port Scanner, AMAP, eEye, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to build security into your business processes, configure scanning software, plan and implement a secure network environment, and recommend procedures to optimize the safety of your network. Progent's security engineers are available to assist you to configure a firewall, implement safe remote connectivity to email and business applications, and integrate VPN. Learn additional information about Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory service packages designed to enable small companies to receive an independent security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from an authorized computer within your firewall to evaluate vulnerabilities to internal assaults. Both security inventory services are set up and run from a secured remote location. The project is overseen by an engineer with top security credentials and who produces a document that details and interprets the data captured by the scan and suggests cost-effective improvements if called for.

Network Security Penetration Analysis Consulting
Stealth intrusion checking is an important part of any successful IT system security strategy. Progentís security professionals can run extensive penetration tests without the awareness of your organization's internal IT resources. Unannounced penetration testing shows whether current security defense tools such as intrusion detection warnings and event log analysis are properly set up and actively monitored. Find out more on Progent's stealth penetration testing consulting.

Firewalls and VPN Support
Progent's background in security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower configuration and debugging services.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote connection technology provide a complete line of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Learn additional details about Progent's Engineering Services for Cisco Security Technology and VPN Products.

Consulting Services for Additional Firewall and VPN Technology
Progent provides small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security plan and choose appropriate technologies from multiple vendors to support your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading data security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway device adds a further level of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. For more details, visit Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior analysis tools to defend endpoints as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to address the entire malware attack progression including protection, identification, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed service for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup processes and allows rapid restoration of critical files, applications and VMs that have become unavailable or corrupted due to component failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when needed, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect information about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can save up to 50% of time spent searching for vital information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Learn more about ProSight IT Asset Management service.

Certified Security Design
Any company should develop a thoroughly considered security strategy that incorporates both preventive procedures and reaction plans. The pre-attack plan is a set of mechanisms designed to minimize security weaknesses. The reactive plan helps your company's IT security engineers to assess the damage resulting from a security penetration, fix the damage, record the event, and get the IT network restored as soon as feasible.

Progent's certified IS security consultants can to assist you to run a comprehensive vulnerability assessment and create a network security strategy to implement security policies and controls to mitigate ongoing attacks and dangers.

CISM Qualified Network Security Consulting Assistance
The Certified Information Security Manager (CISM) committee defines the core competencies and worldwide standards of skill that IT security managers are expected to master. It provides business management the assurance that those who have qualified for their CISM credential possess the experience and knowledge to provide effective security administration and support consulting. Progent offers the support of CISM qualified security professionals to assist businesses with:

  • Information Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Administration
  • Recovery Management
Find out additional information about Progent's CISM Certified Information Security Engineering Expertise.

CISSP Certified Security Engineering Assistance
The CISSP credential denotes expertise with a worldwide standard for data security. The American National Standards Institute has awarded certification accreditation in the area of information security stipulated by ISO 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Learn more details concerning Progent's CISSP Accredited Network Security Support Professionals.

ISSAP Accredited Secure Network Architecture Engineering Support
Progent's ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP status as a result of thorough testing and significant work with information security architecture. The ISSAP certification indicates demonstrated competence in the most in-depth requirements of IS security architecture within the broader scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Phone System and Network Protection
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Learn additional information concerning Progent's ISSAP Accredited Secure Information System Architecture Support Services.

CISA Qualified Network Security Auditing Consulting Assistance
The CISA accreditation is a prestigious achievement that represents mastery in network security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA security audit experts can assist your company with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Get the details concerning Progent's CISA Qualified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to validate a consultant's skills to plan, deploy, and support information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity strategy based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk management experts offer a variety of risk evaluation services such as:

  • Collect information and review documentation to evaluate significant vulnerabilities
  • Identify legal, industry, and contractual mandates and organizational policies associated with your information system to assess their potential influence on your strategic objectives
  • Point out possible threats for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders understand IT risk so they can contribute to your risk management program
  • Match key risk vectors to related operational procedures to help assign risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they are in agreement
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of computer security experts. GIAC's mission is to make sure that an accredited security consultant possesses the skills appropriate to deliver support in vital categories of system, information, and application software security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified network security audit consultants are available to help your IT organization in the areas of:

  • Auditing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Learn additional information concerning Progent's GIAC Information Assurance Services.

Contact a Progent Security Expert Now
To find out how to access a certified information security consultant for online or onsite support in Toronto Canada, phone 1-866-776-4368 or visit Worldwide Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.