Small business computer networks in Utah can now get fast and affordable remote access to Progent's accredited network security experts to assist with the toughest security problems. The cost is reasonable, billing is by the minute, engagement is immediate, and support is unbeatable. Progent also offers help for complex projects that requires the services of senior security consultants with high-level security certifications.

If your Utah organization is situated some distance from larger metropolitan areas like Salt Lake City, West Valley City, Provo, Sandy, or Orem, support from nearby certified network security experts could be limited when you have an urgent situation. This can cause a drop in income for your business, upset customers, idle workers, and distracted management. By utilizing Progent, you have access to a certified security professional who can offer assistance when you need it to keep your computer network on line and salvage your information.

Progent can assist you in your efforts to defend your network with support services that can range from security checks to developing a company-wide security strategy. Progent provides economical support to help small and midsize companies to design and manage safe networks powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a deeper level of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.

Progent's security experts are accessible remotely or on site to provide a variety of emergency or longer-term network security services including:

If your company has an emergency need for IT security help, go to Progent's Emergency Remote Technical Help.

Progent's security experts can deliver advanced services in vital areas of computer protection including security assessment, firewall/VPN support, and advanced security planning.

System Security Assessment
Progent's expert security engineers can assess the strength of your existing computer security systems by performing exhaustive remote automated testing via advanced utilities and proven techniques. Progent's experience in this service saves your company consulting fees and offers an accurate picture of system vulnerability. The knowledge your IT organization gains can be used as the basis of a network protection strategy that can permit your information system to operate dependably and react quickly to new threats.

Automated Network Vulnerability Evaluation
Progent offers consulting in the application of security auditing software such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a variety of programmed system testing scans to uncover possible security holes. Progent has broad experience with other network analysis utilities such as NMAP, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react effectively.

Progent can show you how to design protection into your business processes, install auditing tools, define and deploy a protected network architecture, and suggest policies to optimize the security of your network. Progent's security engineers are ready to help you configure a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Find out additional information on Progent's network security evaluation.

Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation packages intended to enable small businesses to get an impartial network security evaluation from an accredited security consultant. With Progent's External Security Inventory Checkup, a security expert runs an extensive examination of your network from outside your firewalled perimeter to uncover potential weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from a secure machine inside your company firewall to assess your exposure to internal assaults. Both security inventory services are set up and executed from a secured external site. The process is managed by a consultant who has earned high-level security accreditations and who generates a document that details and analyzes the information captured by the security scan and proposes cost-effective remediation where appropriate.

Network Intrusion Analysis Consulting
Stealth intrusion testing is an important component of any comprehensive IT system security strategy. Progentís security professionals can run extensive intrusion tests without the knowledge of your organization's in-house IT staff. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection alerts and event history analysis are correctly configured and actively monitored. Learn more about Progent's stealth penetration analysis support services.

Firewalls and VPN Support
Progent's expertise in network security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your existing PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote connection technology represent a complete range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Read additional details concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.

Consulting Services for Additional Firewall and VPN Solutions
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and select appropriate technologies from a variety of suppliers to support your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to guard endpoints and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by traditional signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to manage the entire malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and forensics. Key capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools packaged within a single agent managed from a single control. Progent's data protection and virtualization experts can help you to design and implement a ProSight ESP environment that meets your company's specific requirements and that helps you prove compliance with legal and industry information security regulations. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate action. Progent can also help your company to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of critical files, applications and VMs that have become unavailable or damaged as a result of hardware failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading information security companies to provide centralized management and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hardware environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT documentation, you can eliminate up to half of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre making enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more details about ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to develop a carefully thought out security strategy that includes both pre-attack procedures and reaction plans. The pre-attack plan is a set of procedures intended to minimize security weaknesses. The reactive strategy helps your company's network security engineers to evaluate the impact caused by a security penetration, fix the system, record the experience, and get business functions operational as soon as possible.

Progent's expert IT security engineers are available to assist you to perform a full vulnerability evaluation and define a company-wide security plan to establish security policies and mechanisms to mitigate ongoing attacks and dangers.

CISM Accredited Network Security Engineering Expertise
The CISM committee defines the basic competencies and global standards of skill that IT security managers are expected to master. It provides business management the assurance that consultants who have earned their CISM certification have the experience and capability to deliver efficient security administration and support consulting. Progent can provide the support of CISM certified security professionals to help companies with:

  • IS Security Governance
  • Risk Analysis
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Find out additional details about Progent's CISM Certified Security Consulting Professionals.

CISSP Accredited Security Consulting Support
CISSP denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of information security under ISO 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Learn more information about Progent's CISSP-certified IS Security Consulting Professionals.

ISSAP Certified Secure Network Architecture Consulting Expertise
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP status through thorough examination and significant experience with information security architecture. The ISSAP credential indicates proven skill in the more complex requirements of information security architecture bounded by the broader field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Find out more information about Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Certified Network Security Auditing Consulting Expertise
The CISA accreditation is a recognized qualification that signifies expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA-qualified information security audit consultants can assist your company in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Get the details about Progent's CISA Accredited Information System Security Auditing Engineering Assistance.

CRISC Consultants
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to assist your company to create and execute a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified IT risk mitigation specialists can provide a variety of risk evaluation services including:

  • Gather data and study documentation to evaluate significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and company standards related to your information system to assess their possible impact on your business objectives
  • Point out possible vulnerabilities for your business processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
  • Match key risk scenarios to your associated business processes to help assign risk ownership
  • Determine risk tolerance with your senior management and key stakeholders to ensure they match
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Information System Security Engineering Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to ensure that an accredited professional has the knowledge necessary to provide services in vital areas of system, data, and application security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified IS security audit specialists are available to assist your business in the areas of:

Read additional details about Progent's GIAC Information Assurance Support.

Talk to a Certified Security Expert
To see how to get in touch with a Progent security engineer for online or on-premises expertise in Utah, phone 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.