Company information networks in West Virginia now have quick and affordable online technical support from Progent's accredited network security engineers to fix urgent security issues. Rates are reasonable, charges are per minute, sign-up is fast, and support is unbeatable. Progent also provides help for complex engagements that demand the knowledge of seasoned security engineers with top security credentials.

In case your West Virginia network is far from larger metropolitan neighborhoods including Charleston, Huntington, Morgantown, or Parkersburg, contact with nearby certified security experts may be limited when you have an urgent situation. This can result in lost productivity for your business, upset clients, unproductive employees, and defocused management. By utilizing Progent's online services, you have access to a qualified security consultant who can offer help when you have to have it to get your computer network on line and salvage your data.

Progent can assist you in a variety of ways in your initiatives to defend your IT environment with support that can range from network security assessments to creating a company-wide security plan. Progent offers affordable support to help businesses of all sizes to set up and manage safe networks powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security vendors to provide web-based management and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's certified professionals are available online or in person to offer a variety of emergency or longer-term computer security services such as:

  • Run automated security audits
  • Clean up rapidly after virus and worm attacks
  • Configure hardware and software firewalls
  • Configure secure solutions for offsite and mobile connectivity
  • Deploy effective solutions for automatic protection against spam and directory harvest attacks
  • Develop a comprehensive security strategy with 24x7 security monitoring
  • Provide outsourced Help Desk Services
  • Develop an effective network backup and business continuity solution built around Data Protection Manager backup technology
If your company has an urgent requirement for computer security help, go to Progent's Emergency Online Technical Help.

Progent's support professionals provide advanced support in key areas of computer protection including analysis, firewall and VPN solutions, and high-level security planning.

Security Assessment
Progent's expert security engineers can assess the effectiveness of your current computer protection systems by performing exhaustive remote automated analysis based on advanced utilities and proven techniques. Progent's skill in this testing saves you consulting fees and offers an objective portrayal of system vulnerability. The information your business is provided can make up the basis of a network protection plan that will permit your information system to operate dependably and respond quickly to future risks.

Automated Network Security Audits
Progent provides consulting in the application of security analysis packages including MBSA and GFI LANguard for economically running a set of programmed network auditing scans to identify potential security vulnerabilities. Progent has broad experience with other security auditing tools such as NMAP, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can help you design security into your company processes, configure auditing applications, define and implement a secure network environment, and recommend procedures to optimize the safety of your network. Progent's security professionals are ready to show you how to set up a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Learn more about Progent's automated security audits.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation packages intended to enable small businesses to get an objective security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from a secure machine inside your firewall to determine the risk to inside assaults. The two security inventory packages are set up and executed from a protected external site. The process is directed by a consultant who has earned top security accreditations and who produces a document that summarizes and analyzes the data collected by the scan and suggests practical remediation where called for.

Network Penetration Analysis Support Services
Stealth intrusion checking is an important part of any comprehensive IT system security strategy. Progentís security professionals can run thorough intrusion tests without the knowledge of your company's in-house network support staff. Stealth penetration testing shows whether existing security defense tools such as intrusion incident alerts and event history monitoring are correctly configured and consistently checked. Learn additional information on Progent's stealth penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security solutions includes in-depth familiarity with leading firewalls and VPN products from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection technology represent a comprehensive line of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and CCNP certifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your business goals. Find out more details about Progent's Engineering Expertise for Cisco Security Technology and VPN Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and choose appropriate products from multiple vendors to support your security objectives while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to guard endpoint devices and physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily evade legacy signature-based anti-virus products. ProSight ASM protects on-premises and cloud resources and provides a single platform to automate the entire malware attack lifecycle including filtering, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer economical multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge tools packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can assist you to plan and implement a ProSight ESP environment that addresses your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent attention. Progent can also assist you to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows fast recovery of critical files, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security companies to provide web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Since the system is virtualized, it can be moved easily to an alternate hardware environment without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect data about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can save as much as half of time spent looking for vital information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre making enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Learn more details about ProSight IT Asset Management service.

Expert Network Security Design
Every company ought to develop a carefully considered security program that includes both pre-attack procedures and response planning. The proactive plan is a collection of mechanisms designed to minimize security weaknesses. The post-attack strategy assists your security engineers to evaluate the impact caused by an attack, repair the damage, record the event, and get the IT network restored as rapidly as possible.

Progent's expert IT security engineers can to help your company to run a complete risk evaluation and define a network security strategy to establish security policies and mechanisms to minimize ongoing attacks and dangers.

CISM Certified Information Security Support Assistance
The CISM committee describes the basic capabilities and global standards of skill that information security managers are required to master. CISM gives executive management the assurance that those who have qualified for their CISM credential possess the background and knowledge to provide effective security administration and support services. Progent can provide the services of CISM qualified security consultants to assist companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Implementation Management
  • IS Security Management
  • Response Management
Learn more details about Progent's CISM Accredited Security Engineering Services.

CISSP Certified Security Consulting Services
CISSP denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data protection under ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a variety security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP Qualified Information Security Support Professionals.

ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's ISSAP qualified network architecture engineers are experts who have earned ISSAP status through thorough testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the more in-depth demands of IS security architecture bounded by the broader field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Learn more details concerning Progent's ISSAP Accredited Secure System Architecture Consulting Services.

CISA Accredited IS Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive test administered by the ISACA international professional association. Progent's CISA-certified IS security audit consultants can help your company with:

  • Information Systems Audit Process
  • IT Administration
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Learn additional details about Progent's CISA Accredited Network Security Auditing Consulting Assistance.

CRISC Consultants
The CRISC program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and support information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and carry out a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk management engineers can provide a variety of risk evaluation services such as:

  • Collect information and review documentation to help identify major vulnerabilities
  • Inventory statutory, industry, and business requirements and organizational standards associated with your network to determine their possible impact on your strategic objectives
  • Identify potential vulnerabilities for your business processes to help in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your organization understand IT risk so they can assist with your risk management process
  • Connect identified risk scenarios to related business processes to help determine risk responsibility
  • Determine risk tolerance with executive management and key stakeholders to ensure they are in agreement
Read more information concerning Progent's CRISC Experts.

GIAC Certified Information System Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of IT security experts. GIAC's mission is to make sure that a certified security consultant possesses the knowledge appropriate to provide support in key areas of system, information, and software security. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit engineers can assist your company in the areas of:

Find out additional details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Expert
To find out how you can get in touch with a Progent security consultant for online or onsite help in West Virginia, phone 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.