Small business networks in West Virginia can have quick and affordable remote access to Progent's qualified network security consultants to resolve the toughest security issues. Rates are affordable, charges are per minute, sign-up is immediate, and service is world class. Progent also offers assistance for long-term projects that demand the services of senior security consultants with top industry credentials.

If your West Virginia network is away from major urban neighborhoods like Charleston, Huntington, Morgantown, or Parkersburg, contact with local certified security engineers could be limited when there's a security disaster. This can result in a drop in revenue for your company, upset clients, idle workers, and distracted executives. By utilizing Progent's remote support, you have access to a qualified security engineer who can deliver assistance whenever you have to have it to keep your computer network operating and recover your information.

Progent can help you in your initiatives to guard your network with services ranging from network security assessments to creating a comprehensive security strategy. Progent offers economical support to help businesses of all sizes to configure and manage safe networks powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top information security vendors to deliver web-based management and world-class protection for all your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a further layer of inspection for inbound email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The onsite gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter.

Progent's certified engineers are accessible online or in person to provide a range of emergency or longer-term IT security services including:

  • Run automated security evaluations
  • Recover quickly after attacks
  • Configure firewalls from multiple vendors
  • Implement safe methods for remote and mobile access
  • Install effective software for automatic defense against viruses, spam and DHAs
  • Develop a company-wide security strategy with 24x7 network monitoring
  • Provide comprehensive Help Desk Support
  • Help Create an effective network backup and restore plan built around Microsoft Data Protection Manager backup technology
If your business has an immediate need for computer security help, go to Progent's Urgent Remote Technical Help.

Progent's consultants can deliver advanced support in vital areas of network protection that include auditing, firewall/VPN support, and advanced security consulting.

Security Evaluation
Progent's expert security engineers can evaluate the strength of your current computer security environment by performing comprehensive remote automated analysis based on advanced software tools and tested procedures. Progent's skill in this testing saves your company time and money and assures a detailed picture of weaknesses. The information your company is provided can form the basis of a security strategy that can permit your network to run safely and react quickly to future risks.

Automated Security Assessment
Progent provides expertise in the use of security evaluation software including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing checks to uncover possible security problems. Progent has broad experience with additional network auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as SolarWinds, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can help you build security into your company processes, install auditing tools, plan and implement a protected network environment, and recommend procedures to maximize the security of your IT system. Progent's security professionals are able to help you set up a firewall, implement secure remote access to email and business applications, and install VPN. Learn more concerning Progent's automated security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory service packages intended to allow small businesses to get an independent network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your IT infrastructure from outside your company firewall to uncover potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer runs a network scan from a secure machine within your company firewall to determine the risk to internal assaults. Both security inventory services are configured and run from a secured remote location. The project is managed by an engineer with high-level security accreditations and who generates a report that details and interprets the information captured by the security scan and suggests cost-effective remediation where appropriate.

Network Intrusion Testing Consulting
Stealth penetration checking is a key component of any serious IT system security plan. Progentís security professionals can perform thorough penetration checks without the awareness of your company's in-house network support staff. Stealth penetration checking shows whether existing security defense tools such as intrusion detection alerts and event history monitoring are correctly set up and actively checked. Learn additional information on Progent's stealth penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in security solutions encompasses extensive field work with major firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned important networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your existing PIX or Cisco ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services integration and debugging services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite connection products provide a comprehensive line of manageable security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Find out more details about Progent's Consulting Services for Cisco Security Technology and VPN Appliances.

Consulting Services for Other Firewall and VPN Technology
Progent offers small and mid-size companies professional support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and select appropriate products from multiple suppliers to support your security objectives while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to defend endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily escape legacy signature-based anti-virus products. ProSight ASM safeguards local and cloud resources and provides a single platform to manage the entire threat progression including filtering, infiltration detection, containment, remediation, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge technologies packaged within a single agent accessible from a single control. Progent's data protection and virtualization consultants can assist you to design and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for urgent action. Progent can also help you to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and enables fast recovery of vital files, applications and VMs that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced support to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security vendors to deliver centralized management and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper level of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can save as much as 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Design
Any business should have a carefully thought out security program that includes both proactive processes and response planning. The proactive strategy is a collection of procedures that help to minimize security weaknesses. The post-attack plan assists your company's security personnel to evaluate the impact caused by a security penetration, repair the damage, document the event, and get business functions operational as quickly as feasible.

Progent's expert IT security engineers are available to assist your business to perform a comprehensive vulnerability evaluation and define a company-wide security plan to establish security processes and mechanisms to minimize future assaults and dangers.

CISM Accredited Network Security Support Services
The CISM committee defines the basic competencies and worldwide standards of performance that information security professionals are expected to learn. It provides business management the assurance that consultants who have earned their CISM certification have the background and capability to deliver efficient security management and consulting services. Progent can provide the services of CISM qualified security consultants to assist businesses with:

  • IS Security Processes
  • Risk Management
  • Information Security Implementation Management
  • Network Security Administration
  • Recovery Management
Read additional details about Progent's CISM Certified Network Security Consulting Services.

CISSP Qualified Security Consulting Services
The CISSP credential denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data protection defined by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your organization in a variety security fields such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Read more details about Progent's CISSP-certified IS Security Support Services.

ISSAP Accredited Secure System Architecture Consulting Expertise
Progent's ISSAP certified IT architecture engineers are experts who have been awarded ISSAP Certification through thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the most challenging demands of information security architecture bounded by the broader scope of information system security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all phases of secure network architecture such as.

  • Access Control Systems and Techniques
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Standards
  • BCP and DRP
  • Site Security
Find out more details concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Expertise.

CISA Accredited Network Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a globally recognized achievement that indicates mastery in information system security audit and control. Certified by ANSI, the CISA credential requires that candidates pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-certified information security audit consultants can assist your IT organization with:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Architecture Planned Useful Life
  • IT Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Planning
Get additional details concerning Progent's CISA Accredited IS Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's ability to plan, implement, and maintain information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management specialists can provide a range of risk identification services such as:

  • Gather information and study documentation to help identify significant vulnerabilities
  • Identify legal, industry, and contractual requirements and organizational standards associated with your information system to assess their potential impact on your strategic objectives
  • Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Develop a risk awareness program and provide seminars to make sure your stakeholders appreciate information system risk so they can contribute to your risk control process
  • Match identified risk scenarios to your associated business processes to help determine risk ownership
  • Determine risk appetite with executive leadership and major stakeholders to make sure they align
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Information System Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to certify the skill of computer security experts. GIAC's goal is to ensure that a certified professional has the skills appropriate to provide services in key categories of network, information, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States NSA. Progent's GIAC network security audit specialists are available to help your company with:

Find out additional details about Progent's GIAC Information Assurance Services.

Talk to a Security Specialist
To see how to contact a certified Progent security engineer for online or onsite assistance in West Virginia, phone 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.