Company information networks in Virginia can depend on quick and affordable online technical support from Progent's certified security experts to resolve the toughest security problems. The cost is reasonable, billing is per minute, sign-up is fast, and support is unbeatable. Progent also offers assistance for complex engagements that requires the knowledge of seasoned security engineers with high-level security credentials.

If your Virginia organization is some distance from major metropolitan neighborhoods including Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, help from nearby accredited security engineers could be limited when you have an urgent situation. This can result in a loss of productivity for your business, upset clients, idle workers, and defocused executives. By utilizing Progent, you have access to a certified security professional ready to offer expertise whenever you need it to keep your information system operating and restore your information.

Progent can assist you at any level in your initiatives to guard your network with support services that ranges from network security checks to creating a comprehensive security strategy. Progent provides economical support to assist companies of any size to configure and maintain safe IT environments based on Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security vendors to deliver web-based management and world-class protection for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified engineers are available remotely or on site to offer a variety of emergency or project-based network security services including:

  • Run extensive security evaluations
  • Clean up promptly after virus and worm attacks
  • Configure effective firewalls
  • Configure secure techniques for offsite and mobile access
  • Install effective applications for defense against viruses, spam and DHAs
  • Develop a company-wide security plan with 24x7 monitoring
  • Provide comprehensive Help Desk Support
  • Create a practical backup and restore plan built around Data Protection Manager (DPM) technology
If your company has an emergency need for computer security support, go to Progent's Urgent Online Technical Help.

Progent's engineers provide world-class services in vital fields of system security including security assessment, firewall and VPN expertise, and advanced security planning.

System Audits
Progent's certified security engineers can assess the effectiveness of your existing computer protection implementation through exhaustive remote automated testing via advanced utilities and proven procedures. Progent's skill in administering this testing saves your company time and money and offers a detailed picture of weaknesses. The knowledge your company is provided can be used as the foundation of a security strategy that will allow your information system to operate dependably and react quickly to future threats.

Automated Network Security Audits
Progent provides consulting in the use of security analysis packages including Microsoft's MBSA and LANguard from GFI for economically running a set of programmed network auditing scans to uncover possible security holes. Progent has extensive experience with other security auditing products such as NMAP, AMAP application mapper, eEye, plus utilities like Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to build security into your company processes, configure auditing applications, define and implement a protected system environment, and suggest policies to maximize the security of your IT system. Progent's security professionals are able to show you how to set up a firewall, design secure remote connectivity to email and business applications, and install VPN. Learn additional information concerning Progent's network security assessment.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small businesses to get an impartial network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from beyond your company firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a system scan from a secure computer inside your firewall to evaluate your exposure to inside assaults. The two security inventory services are set up and executed from a protected external site. The project is directed by a consultant who has earned high-level security credentials and who produces a document that summarizes and interprets the data collected by the scan and proposes practical improvements if called for.

Stealth Security Penetration Testing Consulting
Stealth penetration testing is a key part of any serious network security strategy. Progentís security professionals can perform extensive intrusion tests without the awareness of your company's in-house IT staff. Unannounced penetration testing shows whether existing security defense systems such as intrusion incident alerts and event history monitoring are properly configured and consistently monitored. Learn additional information concerning Progent's stealth penetration analysis consulting.

Firewalls and VPN Expertise
Progent's expertise in security technology includes extensive field work with leading firewalls and VPN products from a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the services of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your current PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's security and remote access technology represent a comprehensive range of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco CCIE and CCNP certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business goals. Learn more information concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.

Support Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security plan and choose appropriate products from multiple vendors to support your security goals while staying within your spending limits.

Certified Network Security Consulting
Every business ought to have a thoroughly thought out security program that includes both proactive procedures and response planning. The pre-attack plan is a collection of mechanisms intended to minimize vulnerabilities. The post-attack plan assists your network security personnel to evaluate the damage caused by a security penetration, repair the damage, document the experience, and get the IT network operational as quickly as feasible.

Progent's certified IS security consultants can to help you to run a complete vulnerability assessment and create a network security plan to establish security processes and mechanisms to minimize ongoing attacks and threats.

CISM Accredited Information Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the core capabilities and global standards of performance that information security professionals are expected to learn. It gives executive management the confidence that those who have earned their CISM credential possess the experience and knowledge to deliver effective security management and support services. Progent offers the expertise of CISM certified security professionals to assist businesses with:

  • Network Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Administration
  • Response Planning
Find out additional details about Progent's CISM Certified Information Security Support Expertise.

CISSP Qualified Security Engineering Support
The CISSP credential denotes mastery of a global standard for data security. The American National Standards Institute has granted certification accreditation in the area of data security under ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Learn additional details concerning Progent's CISSP Accredited Security Support Professionals.

ISSAP Qualified Secure Information System Architecture Consulting Assistance
Progent's ISSAP certified network architecture engineers are experts who have earned ISSAP Certification as a result of thorough examination and extensive experience with information security architecture. The ISSAP credential represents proven mastery in the most in-depth requirements of IS security architecture bounded by the wider scope of IS security knowledge required for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all phases of architecture security such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Hardware Security
Read more information about Progent's ISSAP Qualified Secure Network Architecture Support Expertise.

CISA Qualified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a globally recognized achievement that signifies expertise in information system security auditing. Accredited by ANSI, the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA international professional group. Progent's CISA-certified information security audit consultants are available to help your company with:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • Information Technology Support
  • Protecting Data Resources
  • Business Continuity Planning
Read more information about Progent's CISA Qualified Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and maintain IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and execute a business continuity plan based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk management consultants offer a variety of risk assessment services including:

  • Collect information and review documentation to help identify major vulnerabilities
  • Identify legal, regulatory, and contractual requirements and organizational policies associated with your network to determine their potential influence on your business objectives
  • Identify potential vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Create a risk awareness program and provide seminars to ensure your organization appreciate IS risk so they can contribute to your risk control process
  • Match identified risk vectors to related business procedures to help assign risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they align
Read the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security experts. GIAC's goal is to assure that a certified security consultant possesses the knowledge needed to deliver support in important categories of system, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-certified security audit consultants can help your business in the areas of:

Read more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Engineer
To see how to contact a Progent security consultant for remote or onsite assistance in Virginia, call 1-800-993-9400 or visit Online Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.