Small business IT networks in Vermont now have prompt and affordable remote help from Progent's qualified network security professionals to resolve urgent security problems. Rates are affordable, charges are per minute, engagement is immediate, and service is world class. Progent also provides assistance for complex projects that demand the expertise of seasoned security engineers with top security certifications.

If your Vermont small business is based outside of larger urban neighborhoods like Burlington, Rutland, or Montpelier, access to local qualified network security experts could be limited when there's a crisis. This could mean a drop in revenue for your business, upset clients, idle workers, and distracted executives. By calling Progent's online services, you can get in touch with a qualified security professional ready to provide assistance whenever you need it to get your system running and restore your information.

Progent can help you in all your initiatives to guard your information system with services that can range from network security checks to developing a comprehensive security plan. Progent provides economical support to help small and midsize companies to set up and manage protected IT environments based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security companies to provide centralized control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.

Progent's certified consultants are accessible remotely or on premises to provide a variety of emergency or project-based computer security services which include:

  • Run thorough network security audits
  • Recuperate promptly after virus and worm attacks
  • Set up effective firewalls
  • Implement secure solutions for offsite and mobile connectivity
  • Install advanced software for automatic protection against viruses, spam and DHAs
  • Help create a company-wide security strategy with 24x7 network monitoring
  • Provide comprehensive Call Center Services
  • Help Create a practical backup and disaster recovery strategy built around Data Protection Manager automated backup capability
If your business has an immediate requirement for IT security support, go to Progent's Urgent Remote Technical Help.

Progent's support professionals provide advanced services in vital areas of network protection including security assessment, firewall/VPN support, and high-level security planning.

Security Evaluation
Progent's expert security consultants can evaluate the effectiveness of your existing computer security environment by performing exhaustive remote automated testing based on sophisticated software tools and tested procedures. Progent's skill in administering this service saves your company consulting fees and offers a detailed picture of weaknesses. The information your IT organization is provided can make up the foundation of a network protection strategy that will allow your information system to run safely and respond rapidly to new threats.

Automated Security Assessment
Progent offers consulting in the use of security analysis utilities including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a set of programmed system auditing checks to identify possible security problems. Progent has extensive experience with additional security auditing products such as NMAP, AMAP, eEye, as well as utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can show you how to build protection into your business operations, configure scanning tools, define and deploy a secure network environment, and suggest procedures to optimize the security of your network. Progent's security consultants are available to show you how to set up a firewall, design secure remote access to email and data, and integrate VPN. Learn additional information concerning Progent's network security audits.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles intended to enable small businesses to receive a professional security evaluation from an accredited security consultant. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from a secure machine within your firewall to uncover the risk to internal attacks. Both security inventory services are set up and executed from a secured external site. The process is overseen by a consultant who has earned top security accreditations and who produces a report that summarizes and analyzes the data collected by the scan and suggests practical improvements if called for.

Stealth Penetration Analysis Consulting
Stealth intrusion checking is a key component of any serious network security strategy. Progentís security professionals can perform extensive penetration checks without the awareness of your company's internal network support staff. Stealth penetration testing shows whether existing security defense tools such as intrusion incident warnings and event history monitoring are correctly configured and actively checked. Find out more concerning Progent's stealth security penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's background in network security technology includes extensive familiarity with major firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite connection technology provide a complete line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business goals. Read additional information concerning Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper, and Symantec. Progent can help you create a comprehensive security plan and choose the right products from a variety of vendors to support your security objectives while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent offers a selection of low-cost, fixed-price monthly managed services designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper level of inspection for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to automate the entire threat lifecycle including blocking, detection, containment, cleanup, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of vital data, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

Expert Security Planning
Every company should have a carefully thought out security program that incorporates both proactive processes and reaction planning. The pre-attack plan is a collection of steps intended to reduce vulnerabilities. The post-attack plan helps your company's security engineers to evaluate the impact resulting from a security penetration, fix the system, record the event, and get business functions operational as quickly as possible.

Progent's certified IT security engineers can to assist you to perform a comprehensive risk evaluation and create a computer security strategy to establish security processes and controls to mitigate ongoing assaults and dangers.

CISM Certified Information Security Engineering Services
The CISM organization describes the core capabilities and global standards of skill that IT security managers are expected to learn. It provides executive management the confidence that consultants who have earned their CISM credential possess the background and knowledge to deliver efficient security administration and consulting consulting. Progent can provide the expertise of CISM certified security consultants to assist businesses with:

  • Network Security Governance
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Recovery Planning
Find out more details about Progent's CISM Certified Network Security Support Services.

CISSP Certified Security Engineering Assistance
CISSP certification recognizes mastery of a worldwide standard for data security. The American National Standards Institute has granted certification recognition in the field of information protection under ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Read additional information concerning Progent's CISSP Network Security Consulting Expertise.

ISSAP Accredited Secure System Architecture Consulting Support
Progent's ISSAP qualified IT architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the most in-depth requirements of information system security architecture within the wider scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Learn more information about Progent's ISSAP Accredited Secure Information System Architecture Support Services.

CISA Qualified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates expertise in IS security auditing. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive test administered by the ISACA professional group. Progent's CISA security audit engineers can assist your business in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • IT Support
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISA Accredited Network Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and maintain information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management consultants offer a range of risk identification services including:

  • Gather information and review documentation to identify major vulnerabilities
  • Inventory legal, regulatory, and contractual mandates and organizational standards related to your information system to assess their possible influence on your strategic objectives
  • Point out potential threats for your business workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide training to make sure your stakeholders appreciate IT risk so they can assist with your risk control process
  • Connect identified risk scenarios to related business procedures to help assign risk responsibility
  • Determine risk appetite with executive management and major stakeholders to make sure they are in agreement
Get more details about Progent's CRISC Consultants.

GIAC Qualified IS Security Consulting Support
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to ensure that a certified security consultant has the skills necessary to provide support in vital areas of network, data, and program security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit consultants can assist your business in the areas of:

Read more information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Progent Security Expert
To find out how to access a Progent security consultant for online or on-premises help in Vermont, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.