Business computer networks in Vermont can have prompt and affordable online access to Progent's certified security professionals to resolve urgent security problems. The cost is competitive, billing is by the minute, sign-up is immediate, and service is unbeatable. Progent also provides help for long-term projects that demand the services of senior security consultants with high-level industry certifications.

In case your Vermont organization is located outside of more populated metropolitan neighborhoods such as Burlington, Rutland, or Montpelier, the availability of local qualified security engineers could be problematic when there's an emergency. This could mean a drop in income for your company, upset customers, idle workers, and defocused executives. By utilizing Progent, you have access to a qualified security engineer who can deliver assistance whenever you need it to keep your information system operating and salvage your information.

Progent can help you in a variety of ways in your initiatives to guard your IT environment with services ranging from network security assessments to developing a comprehensive security strategy. Progent provides affordable support to assist small and midsize companies to design and maintain protected networks powered by Windows and Cisco products and that can include computers running UNIX or Linux platforms as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security companies to deliver centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's security experts are accessible remotely or on premises to offer a variety of urgent or longer-term IT security services such as:

If your company has an immediate requirement for computer security help, go to Progent's Urgent Online Technical Support.

Progent's consultants offer advanced support in key facets of computer protection that include auditing, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your current computer protection implementation by performing exhaustive remote automated testing based on sophisticated software tools and tested procedures. Progent's experience in administering this service saves you money and offers an accurate picture of security holes. The knowledge your business is provided can make up the basis of a security strategy that will allow your network to operate safely and respond rapidly to future threats.

Automated Network Vulnerability Analysis
Progent provides expertise in the use of security analysis products such as MBSA and GFI LANguard Network Security Scanner for economically running a set of automatic system auditing scans to identify potential security problems. Progent has broad knowledge of additional network analysis utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react effectively.

Progent can show you how to design protection into your business processes, configure scanning tools, define and deploy a secure network environment, and suggest procedures to optimize the security of your IT system. Progent's security engineers are available to help you set up a firewall, implement safe remote connectivity to email and business applications, and integrate VPN. Find out more on Progent's network security analysis.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory packages designed to enable small businesses to receive an impartial network security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive examination of your network from outside your firewall to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from a secure machine within your firewall to determine your exposure to inside threats. The two security inventory packages are configured and executed from a secured external site. The process is directed by an engineer who has earned high-level security credentials and who produces a report that details and interprets the data collected by the security scan and proposes practical remediation where appropriate.

Stealth Penetration Analysis Support Services
Stealth intrusion testing is an important part of any successful network security plan. Progent’s security professionals can perform thorough penetration checks without the knowledge of your organization's internal IT resources. Stealth penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event history monitoring are correctly configured and consistently checked. Find out additional information about Progent's stealth security penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's background in network security solutions includes extensive field work with major firewalls and Virtual Private Network technology from a variety of vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your current PIX or ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Engineering Services
Cisco's network security and offsite connection technology offer a complete line of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Learn additional information about Progent's Consulting Services for Cisco Security Technology and VPN Products.

Support Expertise for Other Firewall and VPN Products
Progent offers small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and choose appropriate products from a variety of suppliers to achieve your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and offers a single platform to manage the complete malware attack progression including blocking, identification, mitigation, remediation, and forensics. Key features include one-click rollback using Windows VSS and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, endpoint management, and web filtering via cutting-edge technologies packaged within a single agent managed from a unified control. Progent's security and virtualization consultants can assist your business to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that allows you prove compliance with government and industry data security regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent attention. Progent's consultants can also assist you to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup activities and allows rapid restoration of vital files, applications and virtual machines that have become unavailable or damaged as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your critical information. Read more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security vendors to provide centralized management and world-class security for your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further layer of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or domains. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you’re planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Design
Every company should develop a thoroughly considered security program that incorporates both proactive procedures and reaction plans. The pre-attack strategy is a set of procedures intended to minimize security weaknesses. The reactive plan assists your company's network security personnel to evaluate the damage resulting from a security penetration, repair the network, document the experience, and get the IT network operational as soon as feasible.

Progent's expert IS security engineers can to help your company to perform a full risk evaluation and define a computer security strategy to implement security processes and controls to reduce future assaults and threats.

CISM Accredited Information Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of performance that information security professionals are required to learn. CISM provides business management the confidence that consultants who have qualified for their CISM credential possess the background and knowledge to deliver effective security management and consulting consulting. Progent offers the support of CISM certified security consultants to help businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • Network Security Administration
  • Recovery Management
Read more information concerning Progent's CISM Information Security Consulting Services.

CISSP Accredited Security Consulting Assistance
CISSP certification recognizes mastery of a global standard for data security. The American National Standards Institute has granted certification accreditation in the area of information protection under ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Find out additional information concerning Progent's CISSP Information Security Engineering Expertise.

ISSAP Qualified Secure System Architecture Consulting Services
Progent's ISSAP certified IT architecture professionals are experts who have been awarded ISSAP status as a result of rigorous testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the most complex requirements of IS security architecture within the broader scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Phone System and System Infrastructure Security
  • Cryptography Solutions
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Find out additional details about Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Certified Security Auditing Engineering Assistance
The CISA accreditation is a recognized achievement that indicates expertise in network security auditing. Accredited by ANSI, the CISA accreditation requires that consultants pass a comprehensive test administered by the ISACA professional group. Progent's CISA-certified security audit experts can help your IT organization with:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Get the details about Progent's CISA Certified Information System Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to verify a consultant's ability to plan, deploy, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity plan that follows leading practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation experts can provide a variety of risk assessment services such as:

  • Gather information and review documentation to identify significant vulnerabilities
  • Identify statutory, industry, and business mandates and company policies related to your information system to assess their potential impact on your strategic objectives
  • Point out possible vulnerabilities for your business processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide seminars to make sure your organization understand information system risk so they can assist with your risk control program
  • Match key risk scenarios to related business procedures to help assign risk ownership
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Engineering Support
GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's mission is to ensure that an accredited security consultant possesses the skills appropriate to provide support in important categories of network, data, and application security. GIAC certifications are recognized by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit consultants can help your business with:

  • Auditing Networks
  • Security Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Security Specialist
To find out how to get in touch with a Progent security consultant for online or on-premises help in Vermont, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.