Small business IT networks in Virginia now have fast and economical remote access to Progent's accredited network security consultants to assist with urgent security problems. The cost is reasonable, billing is by the minute, engagement is quick, and service is world class. Progent also provides help for long-term projects that requires the services of senior security engineers with high-level industry credentials.

In case your Virginia small business is based away from major urban areas like Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, access to nearby certified network security experts could be limited when you have an emergency. This can cause lost productivity for your company, upset customers, idle workers, and defocused executives. By contacting Progent's online services, you can get in touch with a certified security consultant ready to provide assistance whenever you require it to keep your information system operating and restore your information.

Progent can help you in your efforts to protect your network with support ranging from security assessments to creating a company-wide security strategy. Progent offers affordable support to help small and midsize companies to configure and maintain secure IT environments powered by Windows and Cisco products and that may include computers based on UNIX or Linux platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security companies to deliver centralized management and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper level of inspection for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's security professionals are accessible remotely or on site to offer a variety of urgent or project-based computer security services including:

If your network has an emergency requirement for IT security help, refer to Progent's Urgent Online Network Help.

Progent's engineers offer world-class services in key areas of computer protection that include security assessment, firewall and VPN solutions, and advanced security planning.

Security Audits
Progent's certified security consultants can assess the vulnerability of your current computer protection environment by performing comprehensive remote automated testing based on advanced software tools and proven techniques. Progent's experience in administering this testing saves your company consulting fees and offers an objective portrayal of system vulnerability. The knowledge your business is provided can make up the basis of a network protection plan that can allow your network to run safely and adapt quickly to future threats.

Automated Security Evaluation
Progent offers consulting in the application of security analysis packages such as Microsoft Baseline Security Analyzer and GFI LANguard for economically performing a variety of programmed system testing scans to identify possible security vulnerabilities. Progent has extensive knowledge of other network analysis products such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to design protection into your business operations, install auditing tools, define and deploy a secure network architecture, and recommend policies to optimize the safety of your IT system. Progent's security professionals are available to show you how to set up a firewall, implement secure remote access to email and business applications, and integrate VPN. Learn more on Progent's network security analysis.

Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory packages designed to enable small companies to receive an objective network security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from an authorized computer inside your firewall to uncover your exposure to internal assaults. Both security inventory packages are set up and executed from a secured remote location. The project is managed by a consultant with top security accreditations and who generates a report that details and interprets the information collected by the scan and suggests practical remediation where appropriate.

Network Penetration Analysis Support Services
Stealth penetration checking is an important component of any serious IT system security strategy. Progentís security professionals can perform extensive intrusion tests without the awareness of your company's internal network support staff. Unannounced penetration checking shows whether existing security defense tools such as intrusion incident alerts and event log analysis are properly configured and actively monitored. Learn additional information on Progent's stealth security penetration analysis support services.

Firewall and Virtual Private Network Expertise
Progent's background in network security solutions encompasses extensive field work with leading firewalls and Virtual Private Network technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important networking accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite access products provide a complete range of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company goals. Find out additional information about Progent's Support Services for Cisco Security and VPN Products.

Support Services for Other Firewall and VPN Products
Progent offers small and mid-size companies expert support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security plan and choose the right technologies from a variety of suppliers to support your security objectives while sticking within your budget limits.

Certified Network Security Planning
Every business ought to have a carefully thought out security program that incorporates both pre-attack procedures and reaction planning. The proactive plan is a set of steps designed to reduce security weaknesses. The reactive plan helps your company's IT security personnel to evaluate the impact caused by an attack, fix the damage, record the event, and get the IT network operational as rapidly as possible.

Progent's expert information security engineers can to assist your company to perform a complete vulnerability evaluation and define a network security strategy to establish security processes and controls to minimize ongoing attacks and dangers.

CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the basic capabilities and worldwide standards of performance that IT security professionals are required to learn. CISM gives executive management the assurance that consultants who have qualified for their CISM certification possess the background and capability to deliver efficient security management and support consulting. Progent offers the expertise of CISM qualified security professionals to assist companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Planning
Read more details concerning Progent's CISM Accredited Security Consulting Services.

CISSP Certified Security Consulting Assistance
CISSP recognizes mastery of a global standard for information security. ANSI has awarded the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Read more details about Progent's CISSP Qualified Security Engineering Expertise.

ISSAP Accredited Secure System Architecture Engineering Services
Progent's ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP status as a result of rigorous examination and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most complex demands of IS security architecture bounded by the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture including.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out additional details about Progent's ISSAP Certified Secure IT Architecture Consulting Expertise.

CISA Qualified IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that represents expertise in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an extensive test given by the ISACA professional group. Progent's CISA-qualified network security audit consultants can assist your IT organization in the areas of:

  • IS Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Read more details about Progent's CISA Certified IS Security Auditing Consulting Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's ability to design, implement, and maintain IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a business continuity strategy that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists offer a range of risk identification services such as:

  • Collect data and review documentation to evaluate major risk scenarios
  • Inventory statutory, regulatory, and business requirements and organizational policies related to your information system to assess their potential impact on your strategic objectives
  • Point out possible threats for your operational workflows to assist in evaluating your corporate risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate IS risk so they can contribute to your risk control process
  • Connect key risk scenarios to related operational processes to help assign risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to ensure they match
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Engineering Expertise
GIAC was established in 1999 to validate the skill of IT security engineers. GIAC's mission is to assure that an accredited security consultant possesses the knowledge necessary to deliver services in critical categories of system, information, and program security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC security audit consultants are available to help your company with:

Find out more information concerning Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Expert
To find out how you can access a Progent security engineer for online or onsite help in Virginia, call 1-800-993-9400 or go to Remote Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.