Small business computer networks in the state of Virginia can depend on fast and economical online technical support from Progent's qualified security experts to resolve urgent security issues. The cost is reasonable, billing is by the minute, engagement is immediate, and service is unbeatable. Progent also offers help for long-term engagements that requires the services of senior security consultants with top security credentials.

If your Virginia organization is some distance from major urban neighborhoods including Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, contact with nearby accredited security consultants could be limited during an emergency. This could mean lost productivity for your business, upset clients, idle employees, and defocused executives. By utilizing Progent's online services, you can get in touch with a qualified security consultant who can offer assistance whenever you need it to get your computer network running and recover your information.

Progent can help you in a variety of ways in your efforts to guard your information system with support that ranges from security assessments to developing a company-wide security plan. Progent provides economical service to assist businesses of all sizes to design and maintain safe networks powered by Microsoft Windows and Cisco technology and that may include servers and desktops running UNIX or Linux platforms as well as BYOD clients with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security companies to provide centralized management and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further level of analysis for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's security professionals are accessible online or on premises to provide a range of urgent or longer-term computer security services which include:

If your network has an emergency requirement for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's support professionals can deliver world-class services in key fields of network security that include auditing, firewall/VPN support, and high-level security planning.

System Security Assessment
Progent's expert security engineers can evaluate the strength of your existing network protection systems through exhaustive remote automated testing based on advanced software tools and tested procedures. Progent's skill in administering this service saves you consulting fees and offers a detailed portrayal of weaknesses. The knowledge your business gains can make up the foundation of a network protection strategy that can permit your network to operate safely and adapt quickly to new risks.

Automated Network Vulnerability Evaluation
Progent provides consulting in the use of security evaluation products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a set of automatic system auditing checks to uncover possible security problems. Progent has extensive experience with additional security analysis tools including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you build security into your company processes, configure scanning tools, define and implement a protected system environment, and recommend procedures to maximize the security of your IT system. Progent's security engineers are ready to show you how to configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Learn more about Progent's network security analysis.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to allow small businesses to receive an independent network security evaluation from an accredited security specialist. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your network from outside your firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your firewall to determine the risk to inside attacks. The two security inventory services are set up and executed from a secured external site. The process is directed by a consultant who has earned top security accreditations and who generates a report that details and analyzes the data collected by the security scan and proposes practical remediation where appropriate.

Network Intrusion Testing Consulting
Stealth penetration checking is a key part of any comprehensive network security plan. Progentís security experts can run extensive penetration checks without the awareness of your organization's in-house IT resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection alerts and event log analysis are correctly set up and actively monitored. Learn more about Progent's network penetration analysis support services.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology includes in-depth field work with major firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with key networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, configure, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and VPN Support Expertise
Cisco's security and remote connection technology provide a complete line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Find out additional information about Progent's Engineering Services for Cisco Security and VPN Products.

Consulting Services for Additional Firewall and VPN Technology
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from multiple vendors to support your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior machine learning tools to defend endpoint devices as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which easily get by legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the entire threat lifecycle including filtering, detection, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified console. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you achieve and demonstrate compliance with government and industry information security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also help your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates your backup processes and allows fast recovery of critical data, applications and VMs that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide advanced support to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading information security vendors to provide web-based control and world-class protection for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hardware solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can save as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre making improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Every business ought to have a carefully thought out security program that includes both pre-attack processes and reaction planning. The proactive plan is a collection of procedures designed to reduce vulnerabilities. The post-attack strategy helps your company's security personnel to evaluate the damage caused by an attack, fix the system, document the event, and get the IT network running as rapidly as possible.

Progent's certified IT security consultants are available to help your business to run a full risk evaluation and define a network security strategy to establish security policies and controls to minimize ongoing assaults and dangers.

CISM Certified Information Security Consulting Services
The CISM organization defines the basic competencies and international standards of skill that IT security professionals are expected to master. CISM gives executive management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to provide efficient security administration and support consulting. Progent offers the services of CISM certified security professionals to help companies with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • Network Security Management
  • Response Management
Read more information about Progent's CISM Accredited IS Security Consulting Expertise.

CISSP Certified Security Engineering Assistance
CISSP recognizes mastery of an international standard for network security. The American National Standards Institute has awarded certification accreditation in the area of information security stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security fields including:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Find out additional information about Progent's CISSP-certified Network Security Consulting Professionals.

CISSP-ISSAP Qualified Secure Network Architecture Engineering Expertise
Progent's CISSP-ISSAP certified system architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough examination and significant experience with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more in-depth demands of information security architecture within the broader field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all aspects of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Security
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Learn additional details concerning Progent's ISSAP Accredited Secure IT Architecture Support Professionals.

CISA Certified Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that indicates expertise in information system security auditing. Accredited by ANSI, the CISA accreditation has consultants undergo an extensive test given by the ISACA professional group. Progent's CISA-certified IS security audit specialists can assist your business with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Support
  • Protecting Information Assets
  • Disaster Recovery Preparedness
Get more information concerning Progent's CISA Accredited IS Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate an IT professional's skills to design, deploy, and support IS control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and carry out a business continuity strategy that follows industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers can provide a variety of risk identification services such as:

  • Collect information and review documentation to identify major vulnerabilities
  • Inventory statutory, regulatory, and contractual mandates and company standards related to your information system to assess their possible impact on your strategic goals
  • Identify possible threats for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness program and conduct training to ensure your stakeholders understand IT risk so they can contribute to your risk control process
  • Match key risk scenarios to related operational processes to help determine risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to ensure they align
Find out the details about Progent's CRISC Risk Management Consultants.

GIAC Qualified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to make sure that an accredited professional has the skills needed to provide services in important areas of system, data, and program security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. NSA. Progent's GIAC-certified information security audit engineers can assist your company in the areas of:

Read additional information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Specialist
To learn how you can access a certified security consultant for online or on-premises assistance in Virginia, phone 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2019 Progent Corporation. All rights reserved.