Company information networks in the state of West Virginia now have quick and affordable remote help from Progent's qualified security engineers to fix urgent security problems. Rates are reasonable, billing is by the minute, engagement is immediate, and service is unbeatable. Progent also offers help for long-term engagements that demand the knowledge of seasoned security consultants with top security certifications.

If your West Virginia network is based outside of major urban areas including Charleston, Huntington, Morgantown, or Parkersburg, the availability of nearby accredited network security engineers may be problematic when you have an urgent situation. This can result in a drop in revenue for your company, upset clients, unproductive employees, and defocused management. By utilizing Progent's online services, you can get in touch with a certified security engineer who can provide assistance when you require it to keep your network on line and recover your data.

Progent can help you in all your initiatives to guard your IT environment with services that can range from network security audits to developing a comprehensive security strategy. Progent provides affordable service to assist companies of any size to design and maintain secure networks powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to provide web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper level of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's certified experts are accessible remotely or on site to provide a variety of emergency or project-based network security services such as:

  • Run automated network security evaluations
  • Clean up promptly after serious security breaches
  • Set up and troubleshoot firewalls
  • Implement secure solutions for remote and mobile access
  • Install advanced applications for automatic defense against spam and directory harvest attacks
  • Help create a company-wide security plan with 24x7 security monitoring
  • Offer outsourced Help Desk Support
  • Help Create a practical network backup and recovery strategy based on Data Protection Manager backup capability
If your business has an emergency requirement for IT security support, refer to Progent's Emergency Remote Technical Support.

Progent's consultants offer world-class services in key areas of system protection including security evaluation, firewall and VPN solutions, and high-level security planning.

System Evaluation
Progent's expert security consultants can evaluate the strength of your current network security systems through comprehensive remote automated analysis via advanced utilities and proven techniques. Progent's skill in this testing saves your company consulting fees and offers an accurate picture of gaps. The information your business gains can form the basis of a security plan that can permit your information system to operate dependably and adapt quickly to new threats.

Automated Security Audits
Progent offers consulting in the use of security evaluation utilities including MBSA and GFI LANguard NSS for economically performing a set of programmed system auditing checks to identify potential security vulnerabilities. Progent has broad knowledge of other network analysis tools including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can help you build security into your company operations, configure auditing software, define and implement a protected system environment, and recommend procedures to maximize the security of your network. Progent's security professionals are ready to assist you to configure a firewall, design secure remote access to email and business applications, and integrate VPN. Find out additional information on Progent's network security audits.

Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles designed to enable small companies to receive an impartial security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, an engineer runs an extensive test of your network from outside your firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized computer within your company firewall to determine your exposure to inside attacks. The two security inventory services are configured and run from a secured remote site. The project is overseen by an engineer who has earned high-level security accreditations and who generates a report that summarizes and interprets the data captured by the scan and proposes practical improvements if appropriate.

Stealth Intrusion Testing Support Services
Stealth penetration testing is a key component of any comprehensive network security strategy. Progentís security experts can perform extensive intrusion tests without the knowledge of your organization's internal IT resources. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event log analysis are correctly configured and actively monitored. Find out additional information concerning Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned important networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services offer substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection products offer a comprehensive line of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and CCNP qualifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business goals. Learn additional information concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.

Consulting Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a detailed security plan and choose appropriate technologies from multiple vendors to achieve your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to provide centralized management and world-class protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper level of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email that stays within your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily get by traditional signature-matching AV products. ProSight ASM protects local and cloud resources and offers a single platform to address the complete threat lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows fast recovery of vital data, applications and VMs that have become unavailable or damaged as a result of hardware breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Backup.

Expert Network Security Design
Any business should develop a carefully thought out security strategy that incorporates both pre-attack processes and reaction plans. The pre-attack plan is a collection of steps that help to minimize vulnerabilities. The reactive plan assists your network security personnel to assess the impact caused by an attack, fix the network, record the experience, and get business functions running as quickly as feasible.

Progent's certified information security engineers are available to assist your business to run a full vulnerability assessment and define a network security plan to implement security policies and controls to mitigate ongoing assaults and threats.

CISM Accredited System Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of performance that IT security professionals are expected to learn. It gives business management the confidence that consultants who have qualified for their CISM certification possess the background and knowledge to provide efficient security management and support services. Progent can provide the expertise of CISM certified security professionals to help businesses with:

  • IS Security Strategies
  • Vulnerability Management
  • Network Security Program Management
  • Network Security Management
  • Response Management
Find out more details about Progent's CISM Accredited Security Engineering Professionals.

CISSP Certified Security Consulting Services
CISSP certification recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data security under ISO 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Find out additional details about Progent's CISSP-certified Security Consulting Services.

ISSAP Qualified Secure IT Architecture Engineering Support
Progent's ISSAP certified IT architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and significant work with network security architecture. The ISSAP certification indicates proven competence in the most challenging requirements of information system security architecture within the wider scope of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security consultants can help your company with all aspects of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Phone System and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more information about Progent's ISSAP Qualified Secure Network Architecture Engineering Services.

CISA Accredited Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a globally recognized qualification that signifies expertise in IS security auditing. Certified by ANSI, the CISA credential has candidates pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified network security audit experts are available to assist your company in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISA Certified IS Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's ability to plan, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and carry out a business continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation specialists can provide a variety of risk assessment services including:

  • Collect information and review documentation to help identify significant vulnerabilities
  • Inventory statutory, regulatory, and contractual requirements and organizational policies related to your network to determine their possible impact on your business objectives
  • Identify possible vulnerabilities for your business processes to assist in analyzing your corporate risk
  • Create a risk awareness program and provide seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk management process
  • Match key risk scenarios to your associated business processes to help assign risk ownership
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they align
Read additional information about Progent's CRISC Consultants.

GIAC Certified Information System Security Consulting Support
GIAC was founded in 1999 to certify the knowledge of network security professionals. GIAC's mission is to verify that an accredited security consultant possesses the skills appropriate to deliver services in key categories of system, data, and program security. GIAC certifications are acknowledged by companies and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified security audit specialists can help your IT organization in the areas of:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read more details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Specialist
To find out how you can contact a certified Progent security engineer for remote or onsite help in West Virginia, call 1-800-993-9400 or go to Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.