Company networks in Vermont now have quick and affordable online help from Progent's qualified security engineers to help with critical security issues. Rates are affordable, billing is by the minute, sign-up is fast, and support is unbeatable. Progent also offers help for long-term projects that requires the services of seasoned security engineers with high-level industry certifications.

If your Vermont business is outside of larger metropolitan neighborhoods such as Burlington, Rutland, or Montpelier, help from local certified network security professionals could be limited when you have a crisis. This can result in lost productivity for your company, upset clients, unproductive workers, and defocused management. By contacting Progent's online services, you can get in touch with a qualified security consultant ready to provide expertise whenever you have to have it to keep your system on line and salvage your information.

Progent can assist you in a variety of ways in your efforts to defend your IT environment with support services that can range from network security audits to creating a comprehensive security plan. Progent provides economical support to assist businesses of all sizes to set up and maintain secure IT environments powered by Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide web-based management and comprehensive security for your email traffic. The powerful structure of Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a further level of analysis for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's security professionals are available online or in person to provide a variety of urgent or project-based computer security services such as:

  • Perform automated security audits
  • Recover quickly after serious security breaches
  • Configure and troubleshoot firewalls
  • Implement secure methods for offsite and mobile access
  • Deploy advanced software for automatic protection against spam and directory harvest attacks
  • Develop a comprehensive security strategy with round-the-clock monitoring
  • Provide outsourced Help Desk Call Center Support
  • Create an effective backup and disaster recovery solution based on Microsoft DPM backup/restore capability
If your business has an urgent requirement for IT security help, refer to Progent's Emergency Online Technical Support.

Progent's support professionals provide advanced support in vital fields of system security that include auditing, firewalls and VPN, and high-level security consulting.

System Security Evaluation
Progent's certified security consultants can assess the effectiveness of your existing network protection systems through exhaustive remote automated testing via sophisticated software tools and proven procedures. Progent's experience in administering this service saves you consulting fees and assures a detailed portrayal of weaknesses. The information your business is provided can form the basis of a security plan that can permit your network to operate dependably and respond quickly to new threats.

Automated Network Vulnerability Analysis
Progent provides expertise in the application of security auditing utilities such as Microsoft's MBSA and GFI LANguard NSS for economically running a set of automatic system auditing checks to uncover potential security vulnerabilities. Progent has broad experience with additional security auditing utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit, Hydra, and Nikto. Progent can show you how to understand testing reports and respond appropriately.

Progent can help you build protection into your business processes, configure auditing software, define and implement a secure system environment, and recommend policies to optimize the safety of your IT system. Progent's security consultants are available to assist you to set up a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's automated security evaluation.

Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory service bundles designed to enable small companies to receive an impartial security assessment from a certified security expert. With Progent's External Network Security Inventory Checkup, an engineer runs an extensive examination of your network from beyond your firewalled perimeter to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a network scan from a secure machine inside your firewall to uncover your exposure to internal threats. The two security inventory packages are set up and run from a secured external location. The process is managed by an engineer with top security accreditations and who produces a document that details and analyzes the data collected by the security scan and suggests cost-effective remediation where appropriate.

Network Penetration Analysis Support Services
Stealth penetration testing is an important part of any successful IT system security strategy. Progentís security experts can perform thorough intrusion checks without the knowledge of your organization's internal network support staff. Stealth penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event history monitoring are properly configured and consistently checked. Find out additional information on Progent's network security penetration analysis support services.

Firewall and Virtual Private Network Solutions
Progent's background in security technology includes extensive field work with major firewalls and Virtual Private Network (VPN) technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with important networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your existing PIX or ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Support Services
Cisco's security and offsite access technology provide a full line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Learn additional information concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and VPN Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and select appropriate products from multiple suppliers to support your security objectives while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV tools. ProSight ASM protects local and cloud-based resources and offers a single platform to address the entire threat lifecycle including protection, detection, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer affordable in-depth security for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge tools incorporated within one agent managed from a unified console. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with government and industry data security standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent can also help you to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of critical data, apps and VMs that have become lost or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can help you to recover your critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security vendors to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further level of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported immediately to a different hardware environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By updating and organizing your IT documentation, you can save up to 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Design
Any business ought to have a carefully thought out security strategy that includes both preventive processes and reaction planning. The pre-attack plan is a collection of procedures designed to minimize security weaknesses. The post-attack strategy assists your security engineers to evaluate the damage resulting from a security penetration, fix the damage, document the experience, and get business functions operational as rapidly as feasible.

Progent's expert IT security engineers are available to help your company to run a comprehensive risk assessment and define a computer security plan to implement security policies and mechanisms to minimize ongoing assaults and threats.

CISM Certified Network Security Support Services
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of skill that information security professionals are required to learn. It provides executive management the assurance that consultants who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and consulting services. Progent can provide the services of CISM qualified security professionals to help businesses with:

  • IS Security Strategies
  • Risk Analysis
  • Information Security Program Management
  • Network Security Administration
  • Recovery Planning
Read additional details concerning Progent's CISM Certified Information Security Support Expertise.

CISSP Qualified Security Consulting Assistance
CISSP recognizes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data protection under ISO 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your company in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP Qualified Information Security Engineering Professionals.

ISSAP Qualified Secure Information System Architecture Engineering Support
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP Certification as a result of thorough examination and significant experience with information security architecture. The ISSAP credential represents proven mastery in the most challenging requirements of information security architecture bounded by the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all aspects of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Protection
  • Cryptography Options
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read more information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Services.

CISA Certified Security Auditing Engineering Services
The CISA accreditation is a globally recognized qualification that represents expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass an extensive examination given by the ISACA professional association. Progent's CISA-qualified information security audit consultants are available to assist your IT organization with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • IT Support
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Find out the details concerning Progent's CISA Qualified IS Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's ability to plan, implement, and support IS control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help you to create and execute a workplace continuity strategy based on industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk management engineers offer a range of risk identification services including:

  • Gather information and review documentation to evaluate significant vulnerabilities
  • Inventory statutory, industry, and contractual mandates and organizational standards related to your information system to determine their possible impact on your business objectives
  • Identify potential vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders appreciate IT risk so they can assist with your risk control program
  • Match identified risk scenarios to related operational procedures to help assign risk ownership
  • Validate risk tolerance with your senior leadership and key stakeholders to ensure they align
Find out the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Consulting Expertise
GIAC was established in 1999 to certify the knowledge of computer security experts. GIAC's mission is to assure that a certified professional has the knowledge needed to deliver support in vital areas of network, data, and software security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC IS security audit engineers can help your IT organization with:

Find out additional information about Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Engineer
To find out how to get in touch with a Progent security consultant for remote or onsite support in Vermont, call 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.