Company information networks in the state of Utah can depend on fast and economical remote help from Progent's accredited network security professionals to help with critical security problems. The cost is affordable, billing is by the minute, sign-up is quick, and service is world class. Progent also offers help for complex engagements that requires the services of senior security consultants with high-level security credentials.

If your Utah small business is outside of more populated urban neighborhoods including Salt Lake City, West Valley City, Provo, Sandy, or Orem, access to nearby accredited network security support specialists could be limited during an emergency. This can cause a drop in revenue for your business, upset clients, idle employees, and defocused executives. By calling Progent's online services, you have access to a qualified security consultant who can provide help whenever you require it to get your network running and restore your information.

Progent can assist you in a variety of ways in your initiatives to guard your information system with support that can range from network security assessments to developing a comprehensive security plan. Progent provides affordable support to assist companies of any size to configure and maintain protected IT environments based on Microsoft Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that uses the technology of top data security vendors to provide centralized management and world-class security for your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified experts are available online or on premises to offer a variety of emergency or longer-term computer security services which include:

  • Perform thorough network security audits
  • Recover promptly after virus and worm attacks
  • Configure effective firewalls
  • Configure safe solutions for offsite and mobile connectivity
  • Install advanced applications for defense against spam and directory harvest attacks
  • Help create a comprehensive security plan with proactive monitoring
  • Provide outsourced Help Desk Services
  • Create an effective network backup and restore plan centered on Data Protection Manager backup/restore technology
If your company has an urgent need for IT security support, refer to Progent's Urgent Remote Technical Support.

Progent's support professionals can deliver advanced support in key fields of computer security including auditing, firewall/VPN support, and advanced security consulting.

System Security Evaluation
Progent's certified security engineers can assess the vulnerability of your current network security environment through comprehensive remote automated testing based on advanced utilities and tested procedures. Progent's skill in this testing saves your company consulting fees and offers an accurate portrayal of weaknesses. The information your business is provided can make up the basis of a network protection plan that will allow your network to operate safely and react rapidly to new risks.

Automated Network Security Audits
Progent provides expertise in the application of security evaluation utilities such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably running a variety of automatic system auditing scans to identify potential security holes. Progent has broad knowledge of other network auditing utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can show you how to design protection into your company operations, configure auditing tools, plan and implement a secure network environment, and recommend policies to maximize the security of your network. Progent's security consultants are ready to show you how to configure a firewall, design safe remote connectivity to email and data, and install VPN. Find out additional information about Progent's network security analysis.

Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory service bundles intended to enable small businesses to receive a professional network security assessment from a qualified security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized computer within your firewall to assess your exposure to inside assaults. Both security inventory services are configured and executed from a protected external location. The project is overseen by an engineer with top security accreditations and who produces a document that summarizes and analyzes the information captured by the security scan and suggests cost-effective remediation where appropriate.

Stealth Penetration Analysis Consulting
Stealth intrusion checking is an important part of any serious network security strategy. Progentís security professionals can perform thorough intrusion checks without the awareness of your company's in-house network support staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident alerts and event history analysis are correctly configured and actively monitored. Find out additional information about Progent's network security penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology includes extensive familiarity with leading firewalls and VPN technology offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your existing PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite connection products represent a complete range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Read more information about Progent's Support Expertise for Cisco Security Technology and VPN Products.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies including WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate products from multiple suppliers to achieve your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a portfolio of low-cost, set-price monthly services intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security vendors to deliver centralized control and comprehensive protection for all your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further level of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also help Exchange Server to track and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely escape legacy signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to automate the entire malware attack progression including filtering, infiltration detection, mitigation, cleanup, and forensics. Top features include single-click rollback using Windows VSS and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight Data Protection Services automates your backup activities and enables fast recovery of critical files, applications and VMs that have become lost or damaged as a result of hardware failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as IPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

Certified Security Planning
Any business ought to have a thoroughly thought out security program that includes both preventive processes and response planning. The proactive strategy is a set of procedures intended to reduce security weaknesses. The reactive plan assists your company's network security personnel to evaluate the damage caused by an attack, repair the network, document the event, and get the IT network running as rapidly as feasible.

Progent's expert IS security consultants can to assist your company to perform a full risk evaluation and create a company-wide security strategy to implement security policies and controls to reduce future attacks and threats.

CISM Accredited Security Consulting Assistance
The CISM organization defines the basic capabilities and worldwide standards of skill that IT security managers are expected to learn. It provides business management the assurance that consultants who have earned their CISM certification have the background and capability to deliver efficient security administration and consulting services. Progent offers the services of CISM qualified security professionals to assist businesses with:

  • IS Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Administration
  • Response Planning
Read additional information concerning Progent's CISM Qualified Network Security Consulting Professionals.

CISSP Accredited Security Consulting Expertise
CISSP denotes expertise with a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information protection stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your company in a variety security fields including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Find out additional details concerning Progent's CISSP Information Security Support Professionals.

ISSAP Qualified Secure Network Architecture Consulting Services
Progent's ISSAP qualified system architecture engineers are consultants who have been awarded ISSAP Certification as a result of rigorous examination and extensive work with network security architecture. The ISSAP credential represents proven mastery in the most complex requirements of information system security architecture bounded by the broader field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Learn additional information about Progent's ISSAP Qualified Secure System Architecture Consulting Expertise.

CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that represents mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive test administered by the ISACA international professional association. Progent's CISA-certified network security audit experts can help your IT organization with:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Read more details about Progent's CISA Qualified Network Security Auditing Engineering Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to design, implement, and support information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers offer a range of risk assessment services such as:

  • Collect data and study documentation to identify major vulnerabilities
  • Inventory legal, industry, and contractual requirements and company standards related to your information system to assess their potential impact on your strategic goals
  • Point out potential vulnerabilities for your operational workflows to assist in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk management program
  • Match key risk vectors to your associated operational procedures to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to ensure they match
Learn more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security professionals. GIAC's goal is to make sure that an accredited security consultant possesses the knowledge necessary to deliver services in key categories of system, information, and software security. GIAC accreditations are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC information security audit specialists are available to assist your IT organization with:

Find out additional information about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Expert
To see how you can access a certified security consultant for online or onsite assistance in Utah, phone 1-800-993-9400 or visit Online Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.