Small business computer networks in Vermont can have fast and economical online help from Progent's certified network security professionals to help with critical security problems. Rates are affordable, charges are by the minute, sign-up is immediate, and support is unbeatable. Progent also offers help for long-term projects that requires the expertise of senior security engineers with high-level industry certifications.

If your Vermont organization is situated outside of major urban neighborhoods like Burlington, Rutland, or Montpelier, access to local certified security experts could be problematic during an emergency. This can result in lost productivity for your business, upset clients, unproductive workers, and defocused executives. By utilizing Progent, you have access to a qualified security engineer who can provide help whenever you have to have it to keep your system running and salvage your information.

Progent can help you in a variety of ways in your efforts to defend your network with support services that can range from security audits to creating a company-wide security strategy. Progent offers economical service to assist small and midsize companies to set up and manage protected IT environments based on Microsoft Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to deliver web-based management and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified consultants are accessible online or on site to offer a range of emergency or longer-term computer security services including:

  • Run comprehensive network security audits
  • Recover quickly after serious security breaches
  • Install firewalls from multiple vendors
  • Implement secure techniques for remote and mobile connectivity
  • Deploy effective solutions for automatic protection against spam and DHAs
  • Develop a comprehensive security plan with proactive monitoring
  • Provide outsourced Help Desk Services
  • Create an effective network backup and business continuity solution based on System Center Data Protection Manager backup technology
If your company has an immediate need for IT security support, go to Progent's Emergency Remote Technical Help.

Progent's consultants provide world-class support in vital facets of system protection including auditing, firewalls and VPN, and advanced security planning.

System Security Assessment
Progent's certified security engineers can evaluate the strength of your current computer protection systems by performing comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's skill in administering this service saves your company money and assures an accurate portrayal of weaknesses. The information your company is provided can make up the basis of a network protection strategy that will allow your network to run dependably and react rapidly to new risks.

Automated Vulnerability Audits
Progent provides consulting in the application of security testing packages including MBSA and GFI LANguard NSS for affordably performing a set of automatic network auditing scans to identify potential security vulnerabilities. Progent has broad knowledge of other security auditing products including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to build protection into your business operations, configure auditing applications, define and deploy a protected system environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are able to help you configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's network security evaluation.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two low-cost security inventory service packages intended to allow small businesses to receive a professional network security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from beyond your company firewall to determine possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from an authorized machine within your company firewall to assess the risk to internal threats. The two security inventory services are set up and run from a secured remote location. The process is directed by an engineer who has earned high-level security credentials and who produces a document that summarizes and interprets the data collected by the security scan and suggests cost-effective remediation where appropriate.

Stealth Penetration Analysis Consulting
Stealth penetration checking is a key part of any comprehensive network security plan. Progentís security experts can run extensive penetration checks without the knowledge of your company's in-house IT staff. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion detection warnings and event history analysis are properly set up and consistently checked. Find out additional information concerning Progent's network penetration analysis consulting.

Firewall/VPN Support
Progent's expertise in network security technology includes extensive field work with leading firewalls and VPN technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and VPN Support Expertise
Cisco's security and remote connection technology offer a complete range of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Find out additional information about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Products.

Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose appropriate products from multiple vendors to support your security objectives while staying within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top information security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior analysis tools to guard endpoints and servers and VMs against new malware attacks such as ransomware and email phishing, which easily escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to manage the complete malware attack progression including protection, detection, mitigation, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates and monitors your backup processes and allows fast recovery of vital data, applications and VMs that have become unavailable or damaged as a result of hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver world-class expertise to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and protect information related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can eliminate as much as half of time thrown away trying to find critical information about your network. ProSight IT Asset Management features a common location for holding and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any business should have a thoroughly considered security program that incorporates both pre-attack procedures and reaction plans. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive plan helps your IT security engineers to assess the impact resulting from an attack, fix the network, record the event, and get the IT network running as soon as feasible.

Progent's certified information security engineers are available to assist your business to perform a complete vulnerability assessment and define a computer security plan to implement security policies and controls to minimize future assaults and threats.

CISM Accredited System Security Consulting Assistance
The CISM organization describes the core capabilities and global standards of skill that IT security managers are required to learn. It gives executive management the confidence that those who have qualified for their CISM certification possess the background and knowledge to provide efficient security management and support consulting. Progent can provide the expertise of CISM certified security consultants to help companies with:

  • Network Security Processes
  • Vulnerability Management
  • Network Security Implementation Management
  • IS Security Management
  • Response Planning
Find out additional information about Progent's CISM Certified Information Security Engineering Expertise.

CISSP Qualified Security Engineering Expertise
CISSP certification recognizes mastery of an international standard for data security. ANSI has awarded the CISSP credential recognition in the area of information protection stipulated by ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP-certified Network Security Consulting Expertise.

ISSAP Qualified Secure System Architecture Engineering Assistance
Progent's ISSAP qualified information system architecture engineers are consultants who have been awarded ISSAP Certification as a result of rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the more complex requirements of IS security architecture bounded by the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security including.

  • Access Management Mechanisms and Techniques
  • Phone System and System Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and DRP
  • Hardware Security
Find out more information about Progent's ISSAP Qualified Secure IT Architecture Consulting Professionals.

CISA Accredited Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates mastery in network security auditing. Accredited by ANSI, the CISA accreditation requires that consultants pass a comprehensive test administered by the ISACA professional association. Progent's CISA-certified network security audit specialists are available to help your IT organization with:

  • IS Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Information Assets
  • Business Continuity Planning
Find out more information concerning Progent's CISA Qualified Information System Security Auditing Consulting Support.

CRISC Consultants
The CRISC program was initiated by ISACA to verify a consultant's ability to design, deploy, and maintain information system controls to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to develop and carry out a business continuity plan based on industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a range of risk evaluation services including:

  • Gather information and study documentation to help identify significant vulnerabilities
  • Inventory legal, regulatory, and business requirements and organizational policies associated with your information system to determine their potential influence on your business goals
  • Point out potential threats for your business processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct training to make sure your organization understand IT risk so they can assist with your risk management program
  • Match key risk vectors to related business processes to help determine risk responsibility
  • Validate risk tolerance with your senior management and key stakeholders to make sure they match
Learn additional details concerning Progent's CRISC Consultants.

GIAC Qualified Network Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of IT security professionals. GIAC's mission is to assure that an accredited security consultant has the skills appropriate to provide services in vital categories of network, data, and application security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC network security audit engineers are available to help your IT organization with:

Learn more information about Progent's GIAC Information Assurance Support.

Contact a Certified Security Engineer
To learn how you can access a security consultant for remote or on-premises expertise in Vermont, call 1-800-993-9400 or go to Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.