Business IT networks in the state of West Virginia now have quick and affordable remote technical support from Progent's certified network security engineers to resolve urgent security issues. Rates are affordable, charges are per minute, sign-up is fast, and support is world class. Progent also offers help for long-term projects that demand the services of seasoned security consultants with top security credentials.

In case your West Virginia network is located some distance from larger metropolitan neighborhoods like Charleston, Huntington, Morgantown, or Parkersburg, access to nearby accredited security consultants could be limited when you have an urgent situation. This can cause lost income for your company, upset clients, idle workers, and distracted executives. By contacting Progent's remote support, you have access to a qualified security consultant who can provide expertise when you have to have it to keep your information system on line and restore your information.

Progent can help you in your efforts to protect your information system with support services that ranges from network security checks to creating a company-wide security plan. Progent offers economical service to help companies of any size to configure and maintain protected IT environments based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux platforms plus mobile clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security companies to deliver centralized management and world-class security for your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further level of inspection for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's security consultants are accessible remotely or in person to provide a range of urgent or longer-term network security services which include:

If your network has an emergency requirement for computer security support, refer to Progent's Emergency Online Technical Support.

Progent's engineers offer world-class support in key facets of system security that include security evaluation, firewall and VPN solutions, and high-level security consulting.

System Security Assessment
Progent's certified security consultants can assess the strength of your current network security systems by performing exhaustive remote automated analysis via advanced utilities and proven techniques. Progent's skill in this service saves your company time and money and offers an objective portrayal of weaknesses. The information your company gains can form the foundation of a security strategy that can permit your network to operate safely and respond rapidly to future risks.

Automated Security Analysis
Progent provides consulting in the use of security auditing utilities including Microsoft's MBSA and LANguard from GFI for affordably performing a set of automatic system auditing checks to uncover potential security vulnerabilities. Progent has broad experience with other security analysis tools such as NMAP, AMAP application mapper, eEye, as well as tools like SolarWinds, Hydra, and Nikto. Progent can show you how to understand testing reports and react appropriately.

Progent can help you design security into your company operations, configure scanning tools, define and implement a protected system environment, and recommend policies to maximize the security of your network. Progent's security consultants are ready to help you set up a firewall, design secure remote access to email and business applications, and install virtual private network. Find out more about Progent's automated security audits.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service packages designed to allow small businesses to receive a professional network security evaluation from an accredited security expert. With Progent's External Security Inventory Scan, a security engineer runs a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from an authorized computer within your company firewall to assess vulnerabilities to internal attacks. Both security inventory services are set up and run from a secured external location. The process is overseen by an engineer who has earned high-level security credentials and who generates a report that summarizes and analyzes the data collected by the scan and suggests practical remediation if called for.

Stealth Security Penetration Testing Consulting
Stealth intrusion testing is a key part of any comprehensive IT system security plan. Progentís security professionals can perform extensive penetration checks without the awareness of your company's internal network support staff. Stealth penetration checking shows whether existing security defense tools such as intrusion detection warnings and event log analysis are properly set up and actively monitored. Find out additional information concerning Progent's stealth penetration testing consulting.

Firewalls and VPN Expertise
Progent's background in network security technology includes in-depth familiarity with leading firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key networking certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your current PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and offsite access products offer a full line of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and CCNP qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Find out more information about Progent's Engineering Services for Cisco Security Solutions and VPN Products.

Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right technologies from multiple vendors to support your security objectives while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security companies to provide web-based management and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning technology to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight ASM safeguards local and cloud-based resources and provides a single platform to address the complete malware attack lifecycle including protection, identification, containment, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup processes and allows rapid restoration of vital data, apps and virtual machines that have become lost or damaged as a result of component breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR consultants can provide advanced support to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can eliminate as much as half of time thrown away trying to find critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre making enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more about ProSight IT Asset Management service.

Certified Security Design
Every company should develop a thoroughly thought out security strategy that includes both pre-attack procedures and response planning. The proactive strategy is a set of mechanisms that help to minimize security weaknesses. The post-attack strategy helps your security personnel to evaluate the impact caused by a security penetration, fix the damage, record the event, and get the IT network running as soon as feasible.

Progent's certified IS security engineers can to assist you to perform a complete vulnerability evaluation and create a computer security plan to establish security policies and mechanisms to reduce future assaults and threats.

CISM Qualified System Security Engineering Assistance
The CISM committee defines the basic competencies and international standards of skill that IT security managers are required to learn. CISM gives business management the confidence that consultants who have qualified for their CISM credential have the experience and capability to deliver effective security administration and support services. Progent can provide the support of CISM certified security consultants to assist companies with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • Information Security Administration
  • Response Management
Read additional information concerning Progent's CISM Accredited IS Security Consulting Services.

CISSP Accredited Security Consulting Services
The CISSP credential denotes mastery of an international standard for information security. The American National Standards Institute has awarded certification accreditation in the field of information security defined by ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP-certified Security Consulting Services.

ISSAP Accredited Secure Network Architecture Engineering Expertise
Progent's ISSAP qualified IT architecture engineers are consultants who have earned ISSAP Certification as a result of rigorous examination and significant experience with network security design. The ISSAP credential represents demonstrated skill in the most in-depth requirements of information system security architecture bounded by the broader scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecom and System Infrastructure Security
  • Cryptography Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out additional information concerning Progent's ISSAP Certified Secure IT Architecture Support Professionals.

CISA Certified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that indicates mastery in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA network security audit specialists are available to help your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISA Accredited Information System Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's skills to design, deploy, and support information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and execute a business continuity strategy based on industry best practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC IT risk management engineers offer a range of risk identification services such as:

  • Gather information and review documentation to evaluate significant risk scenarios
  • Identify legal, industry, and contractual requirements and company policies associated with your information system to assess their potential impact on your business objectives
  • Point out potential threats for your operational processes to help in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your organization understand IS risk so they can contribute to your risk control process
  • Match key risk vectors to related business processes to help assign risk responsibility
  • Validate risk tolerance with your senior management and major stakeholders to ensure they align
Read more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to verify that a certified security consultant possesses the knowledge necessary to provide support in critical areas of system, data, and program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC IS security audit consultants can help your IT organization in the areas of:

  • Auditing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Learn additional information concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Specialist
To see how to contact a Progent security consultant for online or on-premises assistance in West Virginia, call 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.