Company networks in Utah now have fast and affordable remote access to Progent's accredited network security professionals to fix urgent security issues. The cost is reasonable, charges are per minute, engagement is fast, and service is world class. Progent also provides assistance for long-term projects that requires the expertise of senior security consultants with top security credentials.

If your Utah office is based outside of larger urban neighborhoods such as Salt Lake City, West Valley City, Provo, Sandy, or Orem, help from local qualified security consultants may be problematic when there's a crisis. This can cause a loss of revenue for your company, angry clients, idle employees, and distracted management. By calling Progent's online services, you can get in touch with a certified security engineer ready to offer expertise whenever you have to have it to get your network on line and recover your information.

Progent can assist you in your efforts to guard your network with support services that can range from network security assessments to developing a company-wide security strategy. Progent provides economical support to help small and midsize companies to set up and manage protected IT environments powered by Microsoft Windows and Cisco technology and that may include computers running UNIX or Linux platforms as well as BYOD users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to deliver centralized control and world-class security for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and encryption. The on-premises security gateway can also enable Exchange Server to track and protect internal email that originates and ends inside your corporate firewall.

Progent's security experts are accessible online or on premises to provide a variety of emergency or project-based IT security services such as:

  • Run comprehensive network security audits
  • Recover promptly after serious security breaches
  • Install effective firewalls
  • Configure secure techniques for remote and mobile access
  • Deploy effective utilities for automatic protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 security monitoring
  • Offer outsourced Help Desk Support
  • Develop a practical network backup and recovery plan based on Data Protection Manager (DPM) backup/restore technology
If your network has an immediate requirement for IT security help, refer to Progent's Emergency Online Technical Support.

Progent's support professionals offer world-class support in vital areas of computer security including security assessment, firewall/VPN support, and high-level security planning.

System Audits
Progent's certified security engineers can evaluate the effectiveness of your current network protection systems by performing comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's experience in this service saves you consulting fees and assures an objective picture of system vulnerability. The knowledge your company gains can form the foundation of a security strategy that will permit your information system to run safely and respond rapidly to new risks.

Automated Network Security Evaluation
Progent provides consulting in the use of security analysis packages such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a set of programmed system testing scans to uncover possible security problems. Progent has extensive knowledge of additional security auditing utilities including NMAP Port Scanner, AMAP, eEye, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to design security into your business operations, install auditing tools, define and deploy a protected network architecture, and suggest procedures to optimize the safety of your network. Progent's security professionals are ready to help you configure a firewall, design secure remote access to email and data, and integrate VPN. Learn additional information on Progent's network security evaluation.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to allow small businesses to get an objective security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive test of your IT infrastructure from beyond your company firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional runs a system scan from an authorized machine within your firewall to determine the risk to internal attacks. Both security inventory services are set up and run from a secured remote location. The project is directed by a consultant who has earned high-level security credentials and who generates a report that details and interprets the data collected by the scan and proposes cost-effective improvements where appropriate.

Stealth Penetration Analysis Consulting
Stealth intrusion checking is an important component of any comprehensive network security strategy. Progent’s security professionals can perform thorough penetration tests without the knowledge of your organization's in-house IT resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion incident warnings and event log analysis are correctly configured and actively monitored. Learn additional information about Progent's stealth penetration analysis support services.

Firewall/VPN Solutions
Progent's background in security technology encompasses in-depth field work with major firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the support of engineers who have earned key industry certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your existing PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, configure, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and Virtual Private Network Support Services
Cisco's security and offsite connection technology offer a complete range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Read additional details concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right technologies from a variety of suppliers to support your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning technology to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily evade legacy signature-matching AV tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to manage the entire malware attack progression including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, device control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP environment that addresses your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require urgent attention. Progent's consultants can also assist you to install and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical data, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security companies to deliver centralized management and comprehensive security for all your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to a different hardware solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time wasted searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether you’re planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Learn more about ProSight IT Asset Management service.

Certified Network Security Design
Any company should have a thoroughly thought out security program that includes both pre-attack processes and reaction plans. The proactive plan is a collection of mechanisms designed to reduce vulnerabilities. The post-attack plan helps your IT security engineers to assess the impact resulting from an attack, repair the network, record the event, and get business functions restored as quickly as feasible.

Progent's certified IT security consultants can to help you to run a full risk evaluation and create a company-wide security strategy to implement security policies and controls to mitigate future attacks and threats.

CISM Certified Information Security Engineering Expertise
The CISM organization defines the core capabilities and international standards of performance that IT security managers are required to master. CISM gives business management the assurance that those who have earned their CISM credential possess the background and capability to provide efficient security management and consulting consulting. Progent offers the expertise of CISM certified security consultants to help businesses with:

  • Information Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • Network Security Administration
  • Response Management
Find out additional information concerning Progent's CISM Accredited IS Security Support Services.

CISSP Accredited Security Consulting Expertise
The CISSP credential recognizes mastery of an international standard for information security. The American National Standards Institute has granted certification accreditation in the area of data protection stipulated by ISO 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security areas including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Preparedness
Read additional details concerning Progent's CISSP-certified Information Security Consulting Expertise.

CISSP-ISSAP Qualified Secure System Architecture Engineering Services
Progent's CISSP-ISSAP certified system architecture professionals are experts who have earned ISSAP Certification as a result of thorough testing and extensive work with network security architecture. The ISSAP certification indicates demonstrated skill in the most in-depth requirements of IS security architecture within the wider scope of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Needs Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read additional details concerning Progent's ISSAP Qualified Secure Information System Architecture Consulting Services.

CISA Accredited Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that signifies expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive examination administered by the ISACA professional group. Progent's CISA-qualified IS security audit engineers are available to help your IT organization in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Preparedness
Read more information concerning Progent's CISA Accredited IS Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and support information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC IT risk management consultants can provide a range of risk identification services including:

  • Gather data and study documentation to help identify major risk scenarios
  • Identify statutory, regulatory, and business requirements and company standards associated with your information system to determine their potential impact on your business goals
  • Point out potential threats for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness program and conduct training to ensure your stakeholders understand IT risk so they can assist with your risk control process
  • Connect key risk scenarios to related operational processes to help assign risk ownership
  • Determine risk appetite with executive management and major stakeholders to ensure they are in agreement
Find out additional information concerning Progent's CRISC Risk Management Experts.

GIAC Certified IS Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security professionals. GIAC's mission is to ensure that a certified professional possesses the skills appropriate to provide services in important categories of system, data, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified security audit consultants can assist your business with:

  • Assessing IT Infrastructure
  • Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Read more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Engineer
To see how to access a certified security engineer for online or onsite support in Utah, call 1-800-993-9400 or go to Remote Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.