Company computer networks in Virginia can depend on prompt and affordable online technical support from Progent's qualified network security experts to help with critical security issues. The cost is competitive, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also offers help for long-term projects that demand the knowledge of senior security engineers with high-level industry credentials.

If your Virginia organization is far from larger urban areas including Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, access to local accredited security professionals is often problematic when you have an urgent situation. This can cause a loss of income for your business, angry customers, unproductive employees, and defocused executives. By contacting Progent's online services, you have access to a qualified security consultant ready to deliver expertise whenever you have to have it to keep your system running and salvage your data.

Progent can help you at any level in your initiatives to guard your network with support ranging from security audits to developing a company-wide security strategy. Progent provides affordable service to assist small and midsize companies to set up and maintain protected IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to deliver web-based control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a deeper level of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.

Progent's security consultants are available online or on site to provide a range of emergency or project-based computer security services including:

  • Run thorough security evaluations
  • Recuperate quickly after serious security breaches
  • Configure firewalls from multiple vendors
  • Implement safe methods for remote and mobile connectivity
  • Install advanced applications for automatic protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 network monitoring
  • Offer comprehensive Call Center Support
  • Create an effective backup and disaster recovery solution based on Microsoft DPM backup/restore technology
If your network has an immediate requirement for computer security help, refer to Progent's Urgent Online Technical Support.

Progent's security experts offer advanced services in vital fields of computer security that include security evaluation, firewall/VPN support, and high-level security planning.

System Security Evaluation
Progent's certified security engineers can evaluate the vulnerability of your existing computer security systems through comprehensive remote automated analysis based on sophisticated software tools and tested procedures. Progent's experience in this testing saves you consulting fees and offers an accurate portrayal of security holes. The knowledge your business is provided can be used as the basis of a security strategy that will permit your information system to run safely and respond quickly to new risks.

Automated Vulnerability Analysis
Progent provides expertise in the use of security analysis products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically running a set of automatic network testing scans to uncover possible security problems. Progent has extensive experience with additional network auditing utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can show you how to build security into your business processes, install auditing applications, plan and implement a protected network environment, and recommend policies to maximize the security of your network. Progent's security engineers are able to help you configure a firewall, design secure remote connectivity to email and data, and install virtual private network. Learn more concerning Progent's automated security assessment.

Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles intended to allow small businesses to receive an impartial security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, a security engineer administers an extensive examination of your network from beyond your firewall to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a system scan from an authorized machine within your firewall to determine the risk to internal threats. Both security inventory packages are set up and run from a secured remote location. The project is managed by an engineer with high-level security credentials and who generates a document that details and interprets the data captured by the scan and proposes practical remediation if called for.

Stealth Intrusion Analysis Consulting
Stealth penetration checking is an important component of any successful IT system security plan. Progentís security professionals can perform thorough penetration checks without the awareness of your company's internal IT resources. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion incident alerts and event history analysis are properly set up and consistently checked. Find out more concerning Progent's stealth penetration analysis support services.

Firewalls and VPN Solutions
Progent's expertise in network security solutions encompasses in-depth field work with major firewalls and Virtual Private Network technology from multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and offsite connection technology represent a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and CCNP qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Find out additional details about Progent's Consulting Services for Cisco Security and VPN Appliances.

Consulting Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and select the right technologies from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security vendors to provide web-based control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper level of inspection for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter. For more details, see ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior analysis tools to defend endpoints as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which routinely get by legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to address the complete threat lifecycle including protection, detection, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical data, apps and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect information about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or domains. By cleaning up and managing your IT documentation, you can save up to 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Design
Any business should have a thoroughly considered security strategy that incorporates both proactive procedures and reaction planning. The proactive strategy is a set of procedures intended to reduce security weaknesses. The post-attack strategy helps your company's network security engineers to assess the damage caused by a security penetration, repair the network, record the experience, and get the IT network running as rapidly as feasible.

Progent's certified information security consultants can to help your business to perform a comprehensive vulnerability assessment and create a network security strategy to implement security policies and mechanisms to reduce future assaults and threats.

CISM Qualified System Security Engineering Expertise
The CISM organization describes the basic competencies and worldwide standards of performance that information security professionals are required to learn. It gives executive management the confidence that consultants who have qualified for their CISM certification have the background and capability to provide efficient security management and support consulting. Progent can provide the expertise of CISM qualified security consultants to help companies with:

  • Information Security Processes
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Administration
  • Recovery Management
Find out more details concerning Progent's CISM Accredited Network Security Consulting Professionals.

CISSP Qualified Security Engineering Services
CISSP certification denotes mastery of an international standard for information security. ANSI has granted certification accreditation in the area of data security stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Find out more information concerning Progent's CISSP Accredited Network Security Support Professionals.

ISSAP Certified Secure Network Architecture Engineering Support
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) credential represents proven competence in the more challenging demands of information security architecture bounded by the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of secure network architecture such as.

  • Access Control Systems and Techniques
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Criteria
  • BCP and DRP
  • Site Security
Learn additional information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.

CISA Certified IS Security Auditing Consulting Support
The CISA credential is a recognized qualification that represents expertise in network security audit and control. Certified by ANSI, the CISA accreditation has consultants pass a comprehensive examination given by the ISACA professional group. Progent's CISA-certified information security audit consultants can assist your company with:

  • IS Audit Process
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • IT Support
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Learn additional information concerning Progent's CISA Qualified IS Security Auditing Engineering Assistance.

CRISC Experts
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and maintain information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity strategy based on industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants offer a variety of risk evaluation services including:

  • Collect data and review documentation to identify significant risk scenarios
  • Identify legal, industry, and business mandates and company policies associated with your network to assess their potential impact on your strategic goals
  • Identify potential vulnerabilities for your operational processes to help in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your organization appreciate IS risk so they can assist with your risk control process
  • Connect identified risk scenarios to related operational procedures to help assign risk ownership
  • Determine risk tolerance with executive leadership and key stakeholders to make sure they match
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Security Engineering Assistance
GIAC was founded in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that a certified security consultant has the skills necessary to provide services in critical categories of network, data, and program security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. NSA. Progent's GIAC-qualified security audit engineers can assist your IT organization in the areas of:

Read additional details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Engineer
To see how you can contact a certified Progent security engineer for online or on-premises assistance in Virginia, call 1-800-993-9400 or visit Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.