Business information networks in the state of Utah can depend on fast and economical online help from Progent's accredited security consultants to help with critical security issues. Rates are reasonable, billing is per minute, engagement is immediate, and service is unbeatable. Progent also offers assistance for long-term projects that demand the services of seasoned security consultants with top industry certifications.

In case your Utah small business is some distance from major urban areas such as Salt Lake City, West Valley City, Provo, Sandy, or Orem, the availability of local certified security experts could be problematic when there's an urgent situation. This could mean a drop in productivity for your business, upset clients, idle workers, and distracted executives. By utilizing Progent's online services, you have access to a certified security engineer who can offer expertise whenever you require it to keep your computer network running and salvage your data.

Progent can help you in your initiatives to protect your network with support that ranges from security checks to creating a company-wide security plan. Progent provides affordable service to help companies of any size to design and manage protected networks based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to deliver centralized management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further level of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's certified experts are accessible online or in person to provide a range of emergency or project-based network security services which include:

  • Perform comprehensive network security evaluations
  • Clean up rapidly after serious security breaches
  • Configure firewalls from multiple vendors
  • Implement secure methods for offsite and mobile access
  • Deploy advanced software for defense against spam and directory harvest attacks
  • Help create a comprehensive security strategy with 24x7 security monitoring
  • Offer comprehensive Help Desk Support
  • Create a practical data backup and recovery strategy based on Data Protection Manager automated backup capability
If your network has an emergency need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's engineers provide world-class support in vital fields of system security including security assessment, firewall and VPN solutions, and advanced security consulting.

Security Assessment
Progent's certified security consultants can assess the effectiveness of your current network security environment by performing exhaustive remote automated testing via advanced utilities and proven procedures. Progent's skill in administering this service saves you money and assures an objective picture of gaps. The information your company gains can form the foundation of a security strategy that will permit your network to operate safely and adapt rapidly to future threats.

Automated Network Security Assessment
Progent provides consulting in the application of security testing software including Microsoft's MBSA and GFI LANguard for affordably performing a variety of automatic system auditing checks to uncover possible security vulnerabilities. Progent has broad experience with other security auditing products such as NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can help you build protection into your business processes, configure scanning software, plan and implement a protected network environment, and recommend procedures to maximize the safety of your IT system. Progent's security engineers are ready to assist you to set up a firewall, implement secure remote connectivity to email and business applications, and integrate virtual private network. Find out more concerning Progent's network security analysis.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service bundles designed to allow small businesses to get an independent network security assessment from a certified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from outside your firewalled perimeter to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from a secure computer inside your company firewall to evaluate your exposure to inside attacks. Both security inventory packages are configured and executed from a protected remote location. The project is managed by a consultant with top security credentials and who produces a report that details and interprets the information collected by the scan and proposes cost-effective remediation if called for.

Stealth Penetration Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive network security strategy. Progentís security professionals can run extensive penetration tests without the awareness of your organization's in-house IT resources. Unannounced penetration testing shows whether existing security monitoring systems such as intrusion detection warnings and event log monitoring are correctly configured and consistently monitored. Learn additional information concerning Progent's stealth security penetration analysis support services.

Firewalls and VPN Expertise
Progent's background in security technology encompasses extensive field work with leading firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned important networking certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your current PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, integrate, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite connection technology provide a complete line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business goals. Find out additional details about Progent's Support Services for Cisco Security Technology and VPN Appliances.

Consulting Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security plan and select appropriate products from multiple vendors to support your security objectives while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that uses the technology of leading information security vendors to deliver web-based control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning tools to guard endpoints and servers and VMs against modern malware assaults like ransomware and file-less exploits, which routinely get by legacy signature-matching AV products. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to manage the entire threat progression including blocking, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback using Windows VSS and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates your backup activities and enables rapid restoration of critical files, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can provide advanced support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.

Certified Security Design
Any business should develop a thoroughly considered security program that incorporates both pre-attack procedures and reaction planning. The proactive plan is a collection of procedures designed to minimize vulnerabilities. The reactive strategy assists your company's IT security personnel to assess the impact caused by a security penetration, fix the system, document the event, and get the IT network running as quickly as feasible.

Progent's expert IT security engineers can to help your company to perform a full vulnerability evaluation and define a company-wide security strategy to implement security processes and controls to reduce ongoing attacks and threats.

CISM Accredited Security Engineering Services
The CISM committee describes the core capabilities and worldwide standards of skill that information security professionals are expected to learn. CISM provides business management the confidence that those who have earned their CISM certification have the background and knowledge to provide efficient security management and consulting services. Progent can provide the expertise of CISM certified security professionals to assist businesses with:

  • IS Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • Information Security Management
  • Response Planning
Learn more details about Progent's CISM Qualified IS Security Support Expertise.

CISSP Qualified Security Engineering Assistance
CISSP denotes mastery of a global standard for data security. The American National Standards Institute has granted the CISSP credential recognition in the area of data security defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Find out additional information about Progent's CISSP IS Security Support Services.

ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's ISSAP certified IT architecture engineers are experts who have been awarded ISSAP status as a result of thorough testing and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the more complex requirements of information security architecture within the broader field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Learn more details concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Services.

CISA Accredited IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a recognized achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive examination administered by the ISACA professional group. Progent's CISA network security audit engineers are available to help your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Get more details concerning Progent's CISA Qualified Information System Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to validate an IT professional's skills to design, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk mitigation experts can provide a range of risk assessment services such as:

  • Collect data and study documentation to help identify significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and company policies related to your information system to determine their possible influence on your strategic goals
  • Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your organization understand information system risk so they can assist with your risk management program
  • Connect key risk vectors to related operational processes to help determine risk responsibility
  • Determine risk tolerance with your senior leadership and major stakeholders to ensure they align
Learn more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to ensure that an accredited professional possesses the skills needed to provide support in vital categories of system, information, and software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit consultants are available to help your IT organization with:

Read more information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Engineer
To find out how to access a certified Progent security consultant for online or onsite expertise in Utah, call 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.