Business networks in the state of Vermont can have prompt and affordable remote help from Progent's accredited security support specialists to help with urgent security problems. Rates are competitive, charges are per minute, sign-up is fast, and support is world class. Progent also provides help for long-term projects that demand the expertise of seasoned security consultants with top industry certifications.

If your Vermont small business is situated far from more populated urban areas such as Burlington, Rutland, or Montpelier, access to nearby certified network security professionals may be limited when you have an emergency. This can result in lost revenue for your company, upset customers, unproductive workers, and defocused executives. By calling Progent, you can get in touch with a qualified security engineer who can provide expertise whenever you have to have it to keep your computer network operating and restore your information.

Progent can assist you in all your efforts to defend your IT environment with services ranging from security assessments to developing a comprehensive security plan. Progent provides economical support to help companies of any size to configure and maintain protected networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of top information security companies to deliver web-based management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to external attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall.

Progent's security consultants are accessible online or on site to offer a variety of urgent or longer-term computer security services such as:

  • Run extensive security audits
  • Clean up promptly after attacks
  • Install and troubleshoot firewalls
  • Configure secure methods for remote and mobile connectivity
  • Install effective software for automatic defense against spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 security monitoring
  • Offer comprehensive Help Desk Services
  • Create a practical network backup and recovery strategy centered on Data Protection Manager technology
If your company has an immediate need for IT security support, refer to Progent's Emergency Online Network Support.

Progent's engineers provide advanced services in vital facets of computer security including security assessment, firewalls and VPN, and advanced security planning.

System Security Assessment
Progent's expert security consultants can assess the vulnerability of your existing computer security environment through comprehensive remote automated analysis via sophisticated software tools and proven techniques. Progent's skill in administering this testing saves you time and money and assures an objective portrayal of weaknesses. The information your company is provided can be used as the basis of a security plan that will permit your network to run safely and respond quickly to new threats.

Automated Security Assessment
Progent provides consulting in the use of security testing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a variety of automatic network testing scans to uncover potential security holes. Progent has broad experience with other security auditing products including NMAP Port Scanner, AMAP, eEye, as well as tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can show you how to build protection into your business operations, install auditing software, plan and deploy a secure network architecture, and recommend policies to optimize the security of your IT system. Progent's security engineers are ready to help you set up a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's network security evaluation.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles intended to enable small companies to get an objective security assessment from a qualified security specialist. With Progent's External Security Inventory Checkup, a security expert runs an extensive examination of your network from outside your company firewall to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from a secure machine within your company firewall to uncover the risk to internal assaults. Both security inventory services are set up and run from a secured remote location. The project is overseen by an engineer with high-level security credentials and who produces a report that summarizes and interprets the data collected by the scan and proposes cost-effective remediation if appropriate.

Network Security Penetration Analysis Support Services
Stealth intrusion checking is a key part of any successful IT system security plan. Progentís security experts can run extensive penetration checks without the knowledge of your company's in-house IT resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion detection warnings and event log monitoring are properly set up and consistently checked. Learn additional information concerning Progent's network penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security solutions includes extensive field work with leading firewalls and Virtual Private Network (VPN) products from multiple companies such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Engineering Services
Cisco's security and remote access products offer a comprehensive range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Learn more details about Progent's Support Expertise for Cisco Security and VPN Products.

Support Expertise for Additional Firewall and VPN Technology
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies such as WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security plan and select appropriate products from multiple suppliers to support your security objectives while sticking within your spending restraints.

Expert Security Consulting
Every business should have a thoroughly considered security strategy that incorporates both preventive processes and response planning. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The post-attack plan assists your company's network security personnel to assess the damage resulting from a security penetration, repair the damage, record the event, and get the IT network running as quickly as possible.

Progent's expert IS security engineers can to assist you to run a complete vulnerability assessment and define a company-wide security strategy to establish security processes and controls to minimize ongoing assaults and threats.

CISM Certified System Security Engineering Expertise
The Certified Information Security Manager (CISM) committee defines the core capabilities and worldwide standards of performance that information security professionals are required to master. It gives executive management the assurance that those who have earned their CISM credential have the experience and knowledge to provide effective security management and support consulting. Progent can provide the support of CISM qualified security consultants to assist companies with:

  • IS Security Processes
  • Vulnerability Management
  • Network Security Program Management
  • Network Security Management
  • Recovery Planning
Learn more details about Progent's CISM Certified IS Security Consulting Expertise.

CISSP Accredited Security Consulting Assistance
CISSP denotes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information security stipulated by ISO 17024. Progent offers access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a variety security fields such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Learn more information concerning Progent's CISSP-certified Information Security Support Professionals.

ISSAP Certified Secure IT Architecture Engineering Assistance
Progent's ISSAP qualified network architecture professionals are consultants who have earned ISSAP status as a result of thorough testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the most in-depth requirements of IS security architecture within the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture including.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Security
  • Cryptography Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional information about Progent's ISSAP Qualified Secure System Architecture Consulting Professionals.

CISA Certified Security Auditing Consulting Support
The CISA credential is a recognized achievement that represents expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an extensive examination given by the ISACA professional group. Progent's CISA-qualified security audit engineers are available to help your company in the areas of:

  • IS Audit Services
  • IT Administration
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Planning
Learn additional information concerning Progent's CISA Accredited Network Security Auditing Engineering Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, deploy, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to assist you to create and carry out a business continuity strategy based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk management consultants offer a range of risk evaluation services such as:

  • Gather information and study documentation to help identify major risk scenarios
  • Identify statutory, regulatory, and business mandates and organizational policies related to your network to determine their potential influence on your strategic objectives
  • Identify potential vulnerabilities for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness program and provide training to make sure your stakeholders appreciate IT risk so they can contribute to your risk management process
  • Match identified risk vectors to related business procedures to help assign risk responsibility
  • Determine risk tolerance with executive management and key stakeholders to make sure they are in agreement
Read more details concerning Progent's CRISC Experts.

GIAC Qualified Network Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to verify that a certified professional has the skills necessary to deliver services in key categories of system, information, and application software security. GIAC certifications are acknowledged by companies and institutions around the world including and the U.S. NSA. Progent's GIAC-qualified security audit experts can assist your company with:

Find out more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Engineer
To see how to access a Progent security consultant for online or on-premises expertise in Vermont, call 1-800-993-9400 or visit Online Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.