Business computer networks in the state of Utah can now get fast and affordable online technical support from Progent's certified security support specialists to help with the toughest security problems. The cost is affordable, charges are per minute, engagement is immediate, and support is unbeatable. Progent also provides assistance for long-term projects that requires the knowledge of senior security consultants with top security certifications.

If your Utah company is based far from major metropolitan neighborhoods like Salt Lake City, West Valley City, Provo, Sandy, or Orem, contact with nearby qualified security experts could be limited during an urgent situation. This could mean a drop in revenue for your company, upset clients, idle employees, and defocused management. By calling Progent's remote support, you have access to a qualified security engineer ready to deliver assistance whenever you need it to keep your computer network operating and recover your information.

Progent can help you in all your efforts to protect your network with support services that can range from network security assessments to creating a company-wide security strategy. Progent provides affordable service to help businesses of all sizes to design and manage safe IT environments based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to deliver centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's certified professionals are available remotely or on site to offer a variety of emergency or project-based computer security services including:

  • Run automated network security evaluations
  • Recuperate quickly after virus and worm attacks
  • Install effective firewalls
  • Implement safe techniques for offsite and mobile connectivity
  • Deploy effective applications for automatic defense against spam and DHAs
  • Help create a comprehensive security strategy with proactive monitoring
  • Provide comprehensive Call Center Support
  • Help Create a practical backup and business continuity solution based on Data Protection Manager automated backup technology
If your company has an emergency requirement for computer security support, go to Progent's Emergency Online Technical Help.

Progent's support professionals provide advanced support in vital facets of network security that include auditing, firewall and VPN solutions, and advanced security planning.

Security Assessment
Progent's certified security engineers can assess the strength of your current network security environment by performing exhaustive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in this testing saves your company consulting fees and assures an objective picture of security holes. The knowledge your IT organization gains can make up the basis of a network protection plan that will allow your information system to run dependably and respond rapidly to new risks.

Automated Security Analysis
Progent offers consulting in the use of security analysis software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a variety of automatic system testing scans to identify potential security weaknesses. Progent has extensive experience with additional network auditing products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can show you how to design security into your business operations, install auditing software, plan and deploy a protected system architecture, and suggest policies to optimize the safety of your network. Progent's security consultants are available to help you set up a firewall, implement safe remote connectivity to email and data, and integrate VPN. Find out additional information about Progent's network security audits.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two low-cost security inventory service bundles intended to allow small companies to receive a professional security assessment from a qualified security consultant. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized machine inside your firewall to determine vulnerabilities to internal assaults. The two security inventory services are set up and run from a secured remote location. The project is overseen by an engineer who has earned high-level security credentials and who generates a report that details and interprets the information collected by the security scan and proposes cost-effective improvements if called for.

Stealth Penetration Analysis Support Services
Stealth penetration checking is a key part of any comprehensive IT system security strategy. Progentís security professionals can run thorough intrusion tests without the knowledge of your organization's internal IT staff. Unannounced penetration testing shows whether current security defense systems such as intrusion detection warnings and event history analysis are correctly set up and consistently checked. Find out additional information about Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to manage your legacy PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower Services configuration and debugging services.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote connection technology provide a comprehensive line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and CCNP qualifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Learn more information concerning Progent's Support Expertise for Cisco Security Technology and VPN Appliances.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and select the right products from multiple suppliers to support your security objectives while staying within your spending restraints.

Expert Network Security Planning
Every business should have a carefully considered security strategy that incorporates both proactive procedures and response plans. The pre-attack strategy is a set of procedures designed to minimize vulnerabilities. The post-attack plan helps your company's IT security engineers to evaluate the impact caused by an attack, fix the damage, document the event, and get the IT network running as soon as feasible.

Progent's expert IT security engineers can to help you to run a full vulnerability evaluation and define a company-wide security strategy to implement security processes and mechanisms to mitigate ongoing attacks and dangers.

CISM Certified Information Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and global standards of skill that information security managers are required to learn. CISM gives executive management the assurance that those who have qualified for their CISM credential have the background and capability to deliver efficient security administration and support consulting. Progent can provide the services of CISM qualified security professionals to help businesses with:

  • Network Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Administration
  • Recovery Management
Find out more details about Progent's CISM Certified Information Security Support Expertise.

CISSP Qualified Security Engineering Services
The CISSP credential recognizes mastery of a global standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the area of data protection under ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Find out more details about Progent's CISSP Accredited Security Engineering Professionals.

ISSAP Certified Secure IT Architecture Engineering Services
Progent's ISSAP certified information system architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most in-depth requirements of information security architecture within the wider field of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Infrastructure Security
  • Cryptography Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning and DRP
  • Hardware Security
Find out more details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Services.

CISA Accredited Network Security Auditing Consulting Services
The CISA credential is a globally recognized qualification that indicates mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation has consultants pass a comprehensive examination administered by the ISACA professional group. Progent's CISA security audit engineers can assist your IT organization in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Get additional information about Progent's CISA Qualified Security Auditing Consulting Expertise.

CRISC Experts
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to assist your company to develop and carry out a business continuity strategy that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC network risk mitigation engineers can provide a variety of risk identification services including:

  • Collect information and study documentation to evaluate significant vulnerabilities
  • Inventory legal, industry, and contractual requirements and organizational policies related to your network to assess their possible influence on your business objectives
  • Point out potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
  • Connect key risk scenarios to related business procedures to help determine risk ownership
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they align
Learn more information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to certify the skill of information technology security experts. GIAC's goal is to verify that an accredited professional has the knowledge necessary to provide services in important categories of system, data, and software security. GIAC accreditations are recognized by companies and institutions around the world including and the United States NSA. Progent's GIAC security audit consultants are available to assist your company in the areas of:

Learn additional information about Progent's GIAC Information Assurance Support.

Talk to a Progent Security Expert
To learn how to get in touch with a Progent security engineer for remote or onsite help in Utah, call 1-800-993-9400 or go to Remote Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.