Small business information networks in the state of West Virginia can depend on prompt and economical remote technical support from Progent's accredited network security engineers to fix critical security issues. Rates are affordable, billing is by the minute, sign-up is immediate, and service is world class. Progent also provides assistance for long-term projects that requires the knowledge of senior security consultants with high-level security credentials.

In case your West Virginia business is away from major metropolitan neighborhoods such as Charleston, Huntington, Morgantown, or Parkersburg, contact with local qualified security experts could be limited when you have a crisis. This can result in lost productivity for your company, upset customers, unproductive employees, and defocused management. By calling Progent's remote support, you have access to a qualified security consultant who can provide assistance when you need it to get your information system operating and salvage your data.

Progent can help you in your efforts to defend your information system with support services ranging from security assessments to developing a comprehensive security strategy. Progent offers economical service to help businesses of all sizes to design and manage safe networks based on Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external threats and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.

Progent's certified consultants are available online or in person to provide a variety of urgent or longer-term computer security services such as:

  • Perform comprehensive security audits
  • Clean up promptly after virus and worm attacks
  • Configure effective firewalls
  • Implement safe techniques for remote and mobile access
  • Install effective utilities for automatic protection against viruses, spam and directory harvest attacks
  • Help create a comprehensive security strategy with proactive monitoring
  • Provide outsourced Call Center Services
  • Help Develop an effective data backup and disaster recovery plan built around Microsoft Data Protection Manager backup technology
If your business has an urgent need for computer security help, refer to Progent's Emergency Online Network Support.

Progent's engineers can deliver advanced support in key fields of computer security that include auditing, firewalls and VPN, and high-level security planning.

System Security Audits
Progent's expert security engineers can assess the strength of your current computer protection implementation by performing exhaustive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in this testing saves you time and money and assures a detailed picture of weaknesses. The knowledge your company is provided can be used as the foundation of a security strategy that can allow your information system to run dependably and respond quickly to future threats.

Automated Security Analysis
Progent offers consulting in the use of security evaluation utilities including Microsoft's MBSA and GFI LANguard NSS for affordably running a variety of automatic system auditing scans to uncover possible security weaknesses. Progent has broad experience with additional network auditing utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can show you how to design protection into your business operations, install auditing applications, define and implement a protected system architecture, and suggest policies to maximize the security of your IT system. Progent's security engineers are ready to help you set up a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Learn more concerning Progent's automated security assessment.

Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get an objective security assessment from a qualified security specialist. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive test of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from an authorized computer inside your firewall to uncover vulnerabilities to inside threats. The two security inventory services are configured and run from a secured remote location. The process is overseen by a consultant with top security credentials and who generates a document that summarizes and interprets the information captured by the scan and proposes practical remediation if called for.

Stealth Penetration Testing Consulting
Stealth penetration checking is a key part of any serious IT system security strategy. Progent’s security experts can run thorough intrusion tests without the awareness of your company's internal IT staff. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event log monitoring are properly set up and consistently monitored. Find out additional information concerning Progent's network penetration analysis consulting.

Firewall/VPN Support
Progent's background in network security technology includes in-depth familiarity with leading firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, tune, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Security and VPN Engineering Services
Cisco's network security and offsite access technology represent a comprehensive line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Find out more information concerning Progent's Engineering Expertise for Cisco Security Technology and VPN Appliances.

Consulting Expertise for Other Firewall and VPN Solutions
Progent offers small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security plan and select appropriate technologies from multiple vendors to achieve your security goals while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely escape legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to automate the entire threat progression including blocking, identification, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device management, and web filtering through leading-edge technologies incorporated within one agent managed from a unified console. Progent's security and virtualization experts can help you to design and configure a ProSight ESP deployment that meets your company's specific requirements and that helps you prove compliance with legal and industry information protection regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent can also assist your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup processes and enables fast recovery of critical files, apps and VMs that have become lost or damaged due to component breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery consultants can provide advanced support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your critical data. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security companies to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most threats from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hosting solution without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard information related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether you’re making enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Security Design
Every business should develop a carefully thought out security strategy that includes both preventive processes and reaction plans. The pre-attack strategy is a set of steps intended to reduce vulnerabilities. The post-attack plan assists your company's security personnel to assess the damage caused by a security penetration, repair the damage, document the experience, and get the IT network running as quickly as feasible.

Progent's expert information security engineers are available to help you to perform a comprehensive vulnerability assessment and define a network security strategy to establish security processes and controls to reduce ongoing attacks and dangers.

CISM Certified System Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and international standards of skill that information security managers are required to learn. CISM provides executive management the confidence that consultants who have earned their CISM credential possess the experience and capability to deliver effective security management and consulting consulting. Progent can provide the services of CISM qualified security consultants to help companies with:

  • Information Security Processes
  • Risk Management
  • Network Security Program Management
  • Network Security Management
  • Recovery Planning
Read additional details concerning Progent's CISM Certified Information Security Engineering Services.

CISSP Certified Security Consulting Services
CISSP certification denotes expertise with an international standard for information security. ANSI has awarded certification accreditation in the field of information protection stipulated by ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional information about Progent's CISSP Qualified Information Security Consulting Professionals.

ISSAP Qualified Secure IT Architecture Consulting Assistance
Progent's ISSAP qualified network architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and extensive experience with information security design. The ISSAP credential represents proven skill in the most in-depth requirements of information system security architecture bounded by the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all aspects of secure network architecture such as.

  • Access Control Systems and Techniques
  • Telecom and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more information about Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.

CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies expertise in information system security auditing. Accredited by ANSI, the CISA accreditation has candidates undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA-certified security audit consultants are available to assist your business with:

  • Information Systems Audit Services
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Data Resources
  • Business Continuity Planning
Get more details concerning Progent's CISA Qualified IS Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to plan, deploy, and support IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and carry out a workplace continuity strategy based on leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation experts can provide a range of risk identification services such as:

  • Collect information and study documentation to evaluate significant risk scenarios
  • Identify statutory, regulatory, and contractual mandates and company policies related to your information system to determine their potential impact on your strategic goals
  • Point out possible vulnerabilities for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide seminars to make sure your organization appreciate IT risk so they can assist with your risk control process
  • Connect key risk scenarios to related business procedures to help assign risk ownership
  • Validate risk appetite with your senior leadership and key stakeholders to ensure they align
Learn the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Engineering Services
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to make sure that a certified security consultant has the knowledge necessary to provide services in vital areas of system, information, and software security. GIAC accreditations are recognized by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC security audit experts are available to assist your company with:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Specialist
To find out how you can contact a security engineer for online or on-premises help in West Virginia, call 1-800-993-9400 or visit Online Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.