Small business computer networks in West Virginia now have quick and economical remote help from Progent's certified network security support specialists to assist with complex security problems. Rates are reasonable, charges are per minute, engagement is immediate, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the expertise of senior security consultants with top security credentials.

If your West Virginia office is situated some distance from more populated urban neighborhoods such as Charleston, Huntington, Morgantown, or Parkersburg, access to nearby qualified security support specialists is often limited during an emergency. This could mean lost income for your company, upset customers, idle workers, and defocused executives. By utilizing Progent's online services, you can get in touch with a certified security professional ready to deliver expertise when you need it to get your network on line and salvage your information.

Progent can help you in a variety of ways in your initiatives to protect your network with support that can range from security checks to developing a comprehensive security plan. Progent offers economical service to help small and midsize companies to configure and manage safe networks powered by Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall.

Progent's security professionals are accessible online or on premises to offer a range of urgent or project-based network security services including:

If your company has an urgent requirement for computer security help, refer to Progent's Emergency Remote Technical Help.

Progent's support professionals provide advanced services in vital areas of system protection that include security evaluation, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's expert security engineers can assess the effectiveness of your existing network protection implementation through comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in this service saves you consulting fees and assures an objective portrayal of system vulnerability. The knowledge your business gains can form the basis of a network protection strategy that will permit your network to operate safely and respond rapidly to future risks.

Automated Security Analysis
Progent provides expertise in the application of security evaluation packages such as MBSA and GFI LANguard NSS for affordably performing a set of automatic system auditing checks to uncover potential security problems. Progent has extensive experience with other security analysis products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can show you how to design security into your business operations, configure auditing applications, define and implement a secure network environment, and recommend policies to optimize the safety of your network. Progent's security professionals are ready to show you how to configure a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Learn additional information about Progent's network security assessment.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles intended to allow small companies to receive a professional network security assessment from an accredited security specialist. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your network from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from a secure machine inside your company firewall to determine the risk to inside assaults. The two security inventory services are configured and executed from a secured external location. The project is overseen by a consultant with top security credentials and who generates a document that details and interprets the data collected by the security scan and suggests practical improvements if called for.

Network Penetration Testing Support Services
Stealth intrusion checking is an important part of any successful network security plan. Progent’s security experts can perform extensive penetration checks without the knowledge of your organization's internal IT resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion incident alerts and event log monitoring are properly set up and consistently checked. Learn additional information on Progent's network security penetration testing consulting.

Firewall/VPN Expertise
Progent's background in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and VPN Support Expertise
Cisco's network security and offsite access products represent a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Read additional information concerning Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Other Firewall and VPN Solutions
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and choose appropriate products from a variety of suppliers to support your security objectives while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to defend endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily get by traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to address the complete malware attack progression including filtering, detection, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge technologies packaged within a single agent managed from a unified console. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your company's unique needs and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent can also help your company to install and test a backup and disaster recovery system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates your backup processes and enables rapid restoration of vital files, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to configure ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can help you to restore your critical information. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security vendors to provide web-based management and world-class protection for your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more information, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether you’re making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Consulting
Any company ought to develop a thoroughly considered security strategy that incorporates both preventive procedures and response planning. The pre-attack strategy is a collection of steps intended to minimize security weaknesses. The post-attack strategy helps your network security personnel to evaluate the impact caused by a security penetration, fix the damage, record the event, and get business functions running as rapidly as feasible.

Progent's certified IS security engineers can to assist you to perform a complete vulnerability evaluation and create a network security strategy to establish security processes and mechanisms to reduce ongoing attacks and threats.

CISM Qualified System Security Engineering Assistance
The CISM committee describes the core capabilities and worldwide standards of skill that IT security managers are expected to learn. It provides executive management the confidence that consultants who have qualified for their CISM certification possess the experience and knowledge to deliver effective security administration and consulting services. Progent can provide the support of CISM certified security professionals to assist companies with:

  • Network Security Governance
  • Vulnerability Management
  • IS Security Program Management
  • IS Security Management
  • Recovery Planning
Find out more details concerning Progent's CISM Qualified IS Security Engineering Services.

CISSP Qualified Security Consulting Expertise
CISSP denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information protection defined by ISO 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP-certified Cybersecurity Support Expertise.

CISSP-ISSAP Qualified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified system architecture engineers are experts who have earned ISSAP status through rigorous testing and significant experience with network security architecture. The ISSAP certification indicates demonstrated mastery in the more challenging requirements of information security architecture within the wider field of IS security knowledge required for CISSP certification. Progent's ISSAP-qualified security specialists can assist your business with all phases of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Security
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more details concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Expertise.

CISA Qualified Network Security Auditing Consulting Support
The CISA accreditation is an important qualification that signifies expertise in IS security audit and control. Certified by the American National Standards Institute, the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA professional association. Progent's CISA security audit engineers can assist your company in the areas of:

  • IS Audit Services
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Get additional information concerning Progent's CISA Qualified Security Auditing Engineering Support.

CRISC Experts
The CRISC certification program was established by ISACA to verify a consultant's skills to plan, implement, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity strategy based on industry best practices identified by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists can provide a variety of risk identification services such as:

  • Collect information and review documentation to evaluate major risk scenarios
  • Inventory legal, regulatory, and business mandates and organizational standards associated with your information system to assess their possible influence on your strategic goals
  • Point out possible threats for your business workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide seminars to make sure your organization understand IT risk so they can assist with your risk management process
  • Match key risk vectors to related operational processes to help assign risk ownership
  • Validate risk tolerance with your senior management and key stakeholders to make sure they match
Learn additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to certify the skill of IT security experts. GIAC's mission is to make sure that an accredited professional has the knowledge needed to deliver services in critical categories of system, information, and application security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit experts are available to help your IT organization in the areas of:

  • Assessing Security Systems
  • Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Engineer
To see how to contact a certified security consultant for remote or onsite assistance in West Virginia, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2019 Progent Corporation. All rights reserved.