Company information networks in the state of Virginia now have prompt and affordable remote access to Progent's accredited network security professionals to fix the toughest security problems. Rates are reasonable, billing is per minute, engagement is quick, and support is world class. Progent also offers assistance for complex projects that demand the knowledge of senior security consultants with top industry certifications.

If your Virginia business is situated outside of larger urban neighborhoods like Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, access to nearby certified network security consultants may be limited when you have an emergency. This can cause a drop in income for your company, angry clients, idle employees, and defocused management. By calling Progent, you have access to a qualified security professional who can deliver help whenever you require it to keep your computer network operating and recover your data.

Progent can help you at any level in your efforts to protect your information system with services that can range from security checks to developing a company-wide security plan. Progent provides affordable support to help companies of any size to set up and maintain safe networks powered by Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to provide web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your security perimeter.

Progent's security professionals are available online or in person to provide a range of emergency or longer-term network security services which include:

  • Run thorough security audits
  • Clean up quickly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Implement secure solutions for remote and mobile access
  • Deploy effective applications for automatic protection against viruses, spam and directory harvest attacks
  • Help create a comprehensive security plan with 24x7 security monitoring
  • Provide outsourced Call Center Services
  • Help Create an effective backup and disaster recovery plan based on Microsoft DPM backup technology
If your business has an emergency need for computer security support, go to Progent's Emergency Remote Technical Support.

Progent's engineers can deliver world-class services in vital areas of computer protection including auditing, firewall and VPN expertise, and advanced security planning.

System Evaluation
Progent's expert security consultants can evaluate the strength of your current network protection environment by performing comprehensive remote automated analysis via advanced software tools and tested procedures. Progent's experience in administering this service saves your company time and money and offers a detailed picture of weaknesses. The knowledge your IT organization is provided can form the foundation of a security strategy that can allow your network to operate safely and respond quickly to future risks.

Automated Security Analysis
Progent provides consulting in the use of security analysis software including Microsoft's MBSA and GFI LANguard NSS for economically performing a set of automatic system testing checks to identify potential security vulnerabilities. Progent has broad experience with other security auditing utilities including NMAP Port Scanner, AMAP, eEye, as well as tools like Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build protection into your business operations, install scanning software, plan and implement a protected network environment, and recommend procedures to maximize the security of your network. Progent's security professionals are ready to assist you to set up a firewall, design secure remote access to email and business applications, and integrate VPN. Learn more on Progent's automated security evaluation.

Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory scanning packages intended to enable small businesses to get an impartial network security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from beyond your company firewall to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your company firewall to evaluate your exposure to internal assaults. The two security inventory packages are set up and run from a secured remote site. The project is directed by an engineer who has earned high-level security accreditations and who produces a report that details and analyzes the data captured by the security scan and suggests practical remediation where appropriate.

Network Intrusion Analysis Consulting
Stealth penetration checking is a key component of any serious IT system security strategy. Progentís security professionals can perform extensive intrusion checks without the knowledge of your company's in-house IT resources. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event log monitoring are correctly set up and consistently monitored. Find out more concerning Progent's network penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security solutions encompasses in-depth field work with major firewalls and VPN technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with important industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, tune, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower configuration and debugging services.

Cisco Network Security and VPN Consulting Expertise
Cisco's security and offsite access products represent a full line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Learn more information about Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Services for Additional Firewall and VPN Products
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security strategy and select appropriate products from a variety of vendors to support your security goals while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to defend endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to automate the entire malware attack progression including filtering, detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, device control, and web filtering through leading-edge technologies incorporated within one agent managed from a unified control. Progent's data protection and virtualization consultants can help you to design and implement a ProSight ESP environment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with legal and industry information security regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent's consultants can also help your company to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup processes and allows rapid recovery of vital data, applications and virtual machines that have become lost or corrupted due to hardware failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical data. Read more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top information security companies to provide web-based management and world-class security for all your inbound and outbound email. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and safeguard information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can save as much as half of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Every business ought to develop a carefully considered security strategy that includes both proactive procedures and reaction planning. The proactive plan is a set of procedures intended to minimize vulnerabilities. The reactive plan assists your company's network security engineers to assess the impact resulting from an attack, repair the network, document the experience, and get the IT network running as rapidly as possible.

Progent's expert IS security engineers can to assist you to perform a complete vulnerability evaluation and create a computer security strategy to establish security processes and mechanisms to mitigate ongoing assaults and threats.

CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the core capabilities and worldwide standards of performance that information security professionals are required to learn. CISM provides business management the assurance that consultants who have earned their CISM certification have the background and capability to deliver efficient security administration and consulting consulting. Progent offers the support of CISM qualified security professionals to help businesses with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Implementation Management
  • Information Security Management
  • Recovery Management
Learn additional details about Progent's CISM Accredited IS Security Consulting Expertise.

CISSP Qualified Security Consulting Assistance
The CISSP credential denotes expertise with a global standard for network security. ANSI has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a variety security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Find out more details about Progent's CISSP-certified IS Security Support Services.

ISSAP Accredited Secure Information System Architecture Engineering Support
Progent's ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP status through rigorous examination and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most in-depth requirements of information system security architecture within the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security including.

  • Access Management Systems and Techniques
  • Phone System and Network Protection
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Hardware Security
Find out additional details about Progent's ISSAP Qualified Secure Information System Architecture Support Professionals.

CISA Accredited IS Security Auditing Engineering Support
The Certified Information Systems Auditor credential is a globally recognized qualification that represents mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive examination given by the ISACA professional group. Progent's CISA-certified IS security audit experts are available to assist your company with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Find out the details about Progent's CISA Certified Information System Security Auditing Engineering Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and maintain information system controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a workplace continuity plan based on industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation engineers can provide a variety of risk identification services such as:

  • Gather information and study documentation to identify significant vulnerabilities
  • Inventory statutory, industry, and contractual mandates and company standards associated with your information system to assess their possible impact on your strategic objectives
  • Identify possible vulnerabilities for your operational processes to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct seminars to ensure your stakeholders understand IS risk so they can contribute to your risk control program
  • Match key risk scenarios to your associated business procedures to help assign risk responsibility
  • Validate risk tolerance with executive leadership and key stakeholders to ensure they are in agreement
Find out additional information concerning Progent's CRISC Consultants.

GIAC Certified Network Security Consulting Services
GIAC was established in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to verify that a certified professional has the knowledge needed to provide services in vital categories of network, data, and application program security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. NSA. Progent's GIAC-qualified network security audit specialists can assist your business with:

Read additional information about Progent's GIAC Information Assurance Support.

Talk to a Certified Security Specialist
To learn how to access a Progent security engineer for remote or onsite expertise in Virginia, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.