Business information networks in the state of West Virginia can now get quick and affordable online technical support from Progent's certified security consultants to fix critical security issues. The cost is reasonable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex projects that requires the services of senior security engineers with high-level industry certifications.

If your West Virginia office is situated outside of more populated metropolitan areas like Charleston, Huntington, Morgantown, or Parkersburg, access to nearby qualified security support specialists could be limited when you have an emergency. This could mean lost revenue for your business, angry clients, unproductive workers, and distracted executives. By calling Progent's remote support, you have access to a qualified security consultant ready to offer help whenever you require it to get your information system running and salvage your information.

Progent can help you at any level in your initiatives to defend your network with support services that ranges from network security checks to developing a comprehensive security strategy. Progent provides economical service to help businesses of all sizes to configure and maintain safe networks powered by Windows and Cisco technology and that can include servers and desktops running UNIX or Linux operating systems as well as mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security vendors to deliver centralized control and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage. Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's certified experts are accessible remotely or in person to offer a range of emergency or project-based network security services which include:

If your company has an urgent requirement for computer security support, go to Progent's Emergency Online Technical Support.

Progent's consultants provide world-class support in vital fields of system security including security evaluation, firewall and VPN solutions, and advanced security consulting.

System Assessment
Progent's expert security engineers can assess the vulnerability of your current computer protection systems through comprehensive remote automated analysis based on advanced utilities and proven techniques. Progent's experience in this testing saves you consulting fees and assures an objective picture of weaknesses. The information your IT organization gains can make up the foundation of a network protection strategy that will permit your information system to operate dependably and respond quickly to future risks.

Automated Network Vulnerability Analysis
Progent offers consulting in the use of security analysis software including Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a set of programmed system auditing scans to identify possible security holes. Progent has broad knowledge of other security analysis products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and react appropriately.

Progent can help you design protection into your business processes, configure auditing tools, plan and implement a protected network environment, and recommend procedures to maximize the security of your IT system. Progent's security consultants are able to help you configure a firewall, design secure remote connectivity to email and data, and install VPN. Learn additional information on Progent's automated security audits.

Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to enable small companies to receive an impartial security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your network from beyond your company firewall to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from a secure computer within your firewall to evaluate the risk to internal assaults. Both security inventory packages are configured and run from a protected external location. The project is managed by a consultant who has earned high-level security accreditations and who produces a document that summarizes and interprets the information captured by the scan and proposes practical remediation if appropriate.

Network Penetration Analysis Consulting
Stealth intrusion checking is an important component of any serious IT system security plan. Progentís security experts can run extensive penetration checks without the awareness of your organization's internal IT resources. Stealth penetration testing shows whether current security defense systems such as intrusion incident alerts and event history analysis are correctly set up and actively monitored. Find out additional information about Progent's network security penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology from multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.

Cisco Security and VPN Support Services
Cisco's network security and offsite access technology offer a complete line of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Learn more information about Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.

Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from multiple suppliers to achieve your security goals while sticking within your budget restraints.

Expert Network Security Consulting
Every business should develop a thoroughly thought out security program that includes both preventive processes and response plans. The proactive plan is a collection of procedures that help to reduce security weaknesses. The reactive plan assists your network security engineers to evaluate the impact resulting from a security penetration, repair the network, record the event, and get business functions running as rapidly as feasible.

Progent's certified IT security consultants are available to help your company to run a comprehensive vulnerability evaluation and define a network security plan to establish security policies and mechanisms to reduce ongoing attacks and dangers.

CISM Qualified Network Security Support Services
The Certified Information Security Manager (CISM) committee defines the core competencies and global standards of skill that IT security professionals are required to learn. CISM gives executive management the confidence that consultants who have earned their CISM certification have the background and capability to deliver effective security administration and support consulting. Progent can provide the expertise of CISM qualified security professionals to assist companies with:

  • IS Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Management
  • Response Management
Learn additional information concerning Progent's CISM Network Security Support Services.

CISSP Qualified Security Engineering Support
CISSP recognizes expertise with an international standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security stipulated by ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional information about Progent's CISSP Qualified Security Engineering Professionals.

ISSAP Certified Secure System Architecture Engineering Assistance
Progent's ISSAP certified information system architecture engineers are consultants who have earned ISSAP status through thorough testing and significant work with network security architecture. The ISSAP certification represents demonstrated mastery in the more challenging requirements of information security architecture within the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Criteria
  • BCP and DRP
  • Physical Security
Find out additional details about Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.

CISA Certified Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a globally recognized achievement that signifies expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive examination given by the ISACA international professional association. Progent's CISA-qualified information security audit consultants can help your company in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Architecture Lifecycle Planning
  • IT Support
  • Protecting Data Resources
  • Business Continuity Planning
Find out additional details about Progent's CISA Accredited Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to verify a consultant's ability to design, implement, and maintain information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation specialists can provide a range of risk evaluation services such as:

  • Gather information and review documentation to help identify significant risk scenarios
  • Inventory legal, industry, and business requirements and organizational policies related to your network to assess their potential impact on your strategic objectives
  • Identify possible vulnerabilities for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and conduct training to make sure your stakeholders appreciate IT risk so they can contribute to your risk control process
  • Connect identified risk vectors to related business procedures to help assign risk ownership
  • Determine risk appetite with executive leadership and major stakeholders to make sure they align
Read more information about Progent's CRISC Consultants.

GIAC Qualified IS Security Consulting Support
Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to assure that an accredited professional has the knowledge necessary to deliver services in critical categories of system, data, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit specialists are available to help your IT organization with:

  • Auditing Security Systems
  • Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Expert
To find out how to contact a security engineer for remote or onsite expertise in West Virginia, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.