Small and mid-size business networks in Toronto, Canada can depend on prompt online or onsite technical support from Progent's certified information security consultants to help with emergency security issues. Rates are affordable, charges are by the minute, the engagement process is quick and easy, and service is world class. Progent also provides assistance for complex projects that requires the knowledge of seasoned security engineers with top security credentials.

If your network is located some away from larger metropolitan areas, local support from qualified security professionals may be limited when you have an emergency. This could mean a loss of productivity for your company, upset customers, idle employees, and defocused executives. By contacting Progent's remote support, you can get in touch with a qualified security consultant ready to deliver help whenever you need it to keep your information system running and restore your data.

Progent can help you in your initiatives to protect your information system with support ranging from network security audits to developing and validating a company-wide security plan. Progent provides affordable support to help small and midsize businesses plan and maintain secure IT environments based on Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms. Progent can also help you design a secure BYOD environment by offering services that include iPhone and iPad integration, Android phone and tablet consulting, and RIM BlackBerry expertise..

Progent can also assist you to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security companies to deliver web-based control and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further level of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.

Progent's security professionals are accessible remotely or on site to provide a variety of emergency or longer-term network security services such as:

  • Run comprehensive network security evaluations
  • Clean up rapidly after virus and worm attacks
  • Install effective firewalls
  • Implement safe solutions for remote and mobile connectivity
  • Install effective solutions for defense against spam and directory harvest attacks
  • Help create a company-wide security plan with 24x7 security monitoring
  • Provide comprehensive Call Center Services
  • Develop an effective data backup and disaster recovery plan based on Microsoft DPM backup/restore technology
If your company has an immediate need for computer security help, refer to Progent's Emergency Online Technical Support.

Progent's engineers provide world-class support in key fields of computer protection that include auditing, firewall and VPN solutions, and advanced security consulting.

Security Evaluation
Progent's certified security consultants can assess the strength of your existing network protection systems by performing exhaustive remote automated testing via advanced utilities and tested procedures. Progent's experience in this testing saves you time and money and offers an objective portrayal of system vulnerability. The knowledge your IT organization gains can be used as the foundation of a network protection plan that will permit your information system to run dependably and adapt quickly to future risks.

Automated Network Security Evaluation
Progent provides expertise in the application of security evaluation utilities such as Microsoft's MBSA and GFI LANguard for economically performing a variety of programmed system testing scans to identify possible security vulnerabilities. Progent has broad experience with additional security analysis products including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Hydra, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can help you design protection into your company processes, install auditing applications, define and deploy a protected network architecture, and recommend policies to optimize the safety of your network. Progent's security professionals are able to help you configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Find out more on Progent's automated security audits.

Security Inventory Service Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages designed to allow small businesses to receive an objective security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive test of your network from outside your firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from a secure machine within your company firewall to uncover the risk to inside attacks. The two security inventory services are set up and run from a secured remote site. The process is overseen by a consultant who has earned high-level security accreditations and who produces a report that summarizes and analyzes the data collected by the scan and suggests practical improvements where called for.

Stealth Intrusion Analysis Support Services
Stealth intrusion checking is an important part of any successful network security plan. Progentís security experts can perform extensive penetration tests without the awareness of your company's in-house network support resources. Unannounced penetration testing shows whether current security monitoring tools such as intrusion detection alerts and event history analysis are properly configured and consistently checked. Learn additional information about Progent's network security penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your existing PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and VPN Consulting Services
Cisco's security and remote connection technology offer a full line of manageable security products to help protect your local and remote information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Read more details concerning Progent's Support Expertise for Cisco Security Technology and VPN Products.

Engineering Services for Other Firewall and VPN Technology
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate products from multiple vendors to achieve your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based machine learning tools to guard endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to manage the complete threat progression including protection, identification, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint management, and web filtering through cutting-edge tools packaged within a single agent managed from a single control. Progent's security and virtualization consultants can assist you to plan and configure a ProSight ESP environment that meets your organization's unique needs and that allows you demonstrate compliance with government and industry data security standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent's consultants can also assist you to set up and test a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates and monitors your backup processes and allows rapid restoration of vital data, apps and VMs that have become lost or corrupted due to component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security vendors to provide centralized management and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved immediately to a different hosting solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect information about your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can eliminate as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more about ProSight IT Asset Management service.

Certified Security Planning
Every company should have a thoroughly thought out security program that incorporates both preventive procedures and reaction plans. The pre-attack plan is a collection of procedures designed to minimize vulnerabilities. The reactive plan helps your company's network security personnel to assess the impact resulting from an attack, fix the network, record the event, and get business functions operational as rapidly as feasible.

Progent's expert information security engineers can to help your business to run a comprehensive vulnerability assessment and define a computer security strategy to implement security processes and controls to mitigate future assaults and dangers.

CISM Qualified System Security Support Assistance
The Certified Information Security Manager (CISM) organization describes the basic capabilities and worldwide standards of performance that information security managers are required to learn. It provides business management the confidence that those who have qualified for their CISM certification possess the background and capability to provide effective security management and consulting services. Progent offers the expertise of CISM qualified security professionals to help businesses with:

  • Information Security Processes
  • Risk Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Planning
Read more details about Progent's CISM Certified IS Security Support Professionals.

CISSP Qualified Security Engineering Support
CISSP certification recognizes expertise with an international standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Read more information concerning Progent's CISSP Qualified Information Security Consulting Services.

CISSP-ISSAP Certified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP qualified information system architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the most challenging demands of information security architecture bounded by the broader scope of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Cryptography Options
  • Needs Evaluation and Security Standards
  • BCP and DRP
  • Physical Security
Read more details concerning Progent's ISSAP Certified Secure Information System Architecture Engineering Professionals.

CISA Qualified IS Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates mastery in information system security auditing. Accredited by ANSI, the CISA credential requires that candidates pass an extensive test given by the ISACA international professional association. Progent's CISA-certified security audit experts are available to assist your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Preparedness
Learn additional information concerning Progent's CISA Certified Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's skills to design, implement, and maintain IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan based on leading practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management consultants can provide a variety of risk assessment services including:

  • Gather information and review documentation to identify significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and organizational policies associated with your network to assess their potential impact on your strategic goals
  • Point out potential threats for your operational workflows to help in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct training to ensure your stakeholders understand information system risk so they can assist with your risk control process
  • Match key risk vectors to your associated business processes to help assign risk responsibility
  • Validate risk tolerance with executive management and major stakeholders to ensure they are in agreement
Read additional details concerning Progent's CRISC Risk Management Consultants.

GIAC Accredited Information System Security Consulting Support
GIAC was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to verify that an accredited professional has the knowledge needed to deliver support in key areas of system, information, and program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified security audit consultants are available to assist your IT organization in the areas of:

Find out additional information concerning Progent's GIAC Information Assurance Support.

Contact a Progent Security Expert Now
To find out how to access a certified information security consultant for online or onsite support in Toronto Canada, phone 1-866-776-4368 or visit Worldwide Online Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.