Small business information networks in the state of West Virginia can now get fast and affordable remote access to Progent's certified security professionals to help with critical security issues. Rates are competitive, charges are per minute, sign-up is fast, and support is world class. Progent also offers help for long-term projects that demand the knowledge of senior security consultants with top security certifications.

If your West Virginia network is based away from larger metropolitan neighborhoods such as Charleston, Huntington, Morgantown, or Parkersburg, contact with local certified security experts could be limited when there's a security disaster. This can result in lost revenue for your company, upset customers, idle workers, and defocused management. By contacting Progent's remote support, you can get in touch with a qualified security engineer ready to deliver help whenever you require it to get your network on line and recover your data.

Progent can assist you in a variety of ways in your efforts to defend your network with services ranging from security audits to developing a comprehensive security strategy. Progent offers economical service to assist companies of any size to configure and maintain secure networks based on Windows and Cisco products and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple handhelds or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to provide web-based control and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway device adds a further layer of analysis for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter.

Progent's certified experts are accessible remotely or on site to provide a variety of emergency or project-based IT security services including:

  • Perform thorough security audits
  • Clean up quickly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement safe methods for offsite and mobile connectivity
  • Deploy effective software for automatic defense against spam and DHAs
  • Develop a company-wide security strategy with 24x7 monitoring
  • Provide comprehensive Help Desk Support
  • Create a practical network backup and disaster recovery plan based on Data Protection Manager (DPM) backup/restore capability
If your network has an urgent requirement for computer security help, go to Progent's Emergency Remote Technical Help.

Progent's consultants can deliver world-class support in key areas of network security including auditing, firewall and VPN solutions, and advanced security planning.

Security Assessment
Progent's certified security consultants can assess the effectiveness of your current computer protection environment by performing exhaustive remote automated testing based on sophisticated utilities and proven procedures. Progent's skill in this testing saves you consulting fees and offers an accurate picture of weaknesses. The knowledge your business is provided can make up the basis of a security plan that can permit your information system to operate dependably and adapt quickly to future risks.

Automated Vulnerability Audits
Progent offers consulting in the use of security evaluation software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a set of automatic system testing scans to identify potential security weaknesses. Progent has broad experience with additional network auditing utilities such as NMAP, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.

Progent can show you how to design security into your company operations, configure scanning applications, define and implement a protected network environment, and suggest policies to maximize the security of your network. Progent's security engineers are able to show you how to configure a firewall, design secure remote connectivity to email and data, and integrate VPN. Find out more on Progent's network security assessment.

Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory bundles designed to allow small companies to get a professional security assessment from an accredited security expert. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized computer inside your company firewall to uncover the risk to inside threats. The two security inventory packages are configured and executed from a secured external site. The process is managed by an engineer who has earned high-level security credentials and who generates a document that details and analyzes the data collected by the scan and proposes cost-effective remediation if called for.

Stealth Security Penetration Analysis Consulting
Stealth intrusion testing is an important part of any comprehensive network security strategy. Progentís security professionals can perform thorough penetration tests without the knowledge of your organization's in-house network support resources. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion incident alerts and event history monitoring are properly configured and consistently checked. Find out more on Progent's stealth penetration analysis support services.

Firewall/VPN Solutions
Progent's expertise in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network technology from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your current PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and offsite connection products provide a complete line of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Learn more details concerning Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you create a detailed security strategy and select the right products from a variety of suppliers to achieve your security goals while sticking within your budget limits.

Expert Network Security Planning
Every business ought to develop a carefully considered security strategy that includes both pre-attack procedures and reaction plans. The pre-attack plan is a collection of steps intended to reduce vulnerabilities. The post-attack plan assists your company's network security engineers to assess the impact resulting from an attack, repair the system, record the experience, and get business functions operational as quickly as feasible.

Progent's expert IS security engineers can to help your company to perform a comprehensive risk assessment and create a company-wide security plan to establish security processes and controls to reduce future attacks and threats.

CISM Accredited System Security Support Services
The CISM organization describes the core competencies and worldwide standards of performance that IT security managers are required to master. It provides executive management the assurance that consultants who have qualified for their CISM certification have the experience and capability to provide effective security management and support services. Progent can provide the services of CISM qualified security consultants to assist businesses with:

  • Information Security Processes
  • Vulnerability Analysis
  • Information Security Program Management
  • IS Security Administration
  • Recovery Management
Learn additional information about Progent's CISM Certified Security Engineering Expertise.

CISSP Certified Security Consulting Assistance
The CISSP credential recognizes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification recognition in the area of data protection defined by ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your company in a variety security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISSP Accredited Information Security Engineering Expertise.

ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's ISSAP certified IT architecture professionals are experts who have been awarded ISSAP status as a result of rigorous examination and extensive work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the more in-depth demands of IS security architecture bounded by the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Protection
  • Data Encryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Learn more details concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Expertise.

CISA Accredited Information System Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a globally recognized achievement that represents mastery in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo a comprehensive test given by the ISACA international professional association. Progent's CISA-qualified IS security audit consultants are available to help your business with:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Infrastructure Planned Useful Life
  • IT Support
  • Protecting Information Assets
  • Disaster Recovery Preparedness
Get additional information concerning Progent's CISA Certified Security Auditing Consulting Support.

CRISC Experts
The CRISC program was established by ISACA to validate a consultant's skills to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity strategy based on leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists can provide a variety of risk identification services such as:

  • Collect information and review documentation to help identify major risk scenarios
  • Inventory statutory, industry, and contractual mandates and company standards related to your network to determine their possible influence on your strategic goals
  • Identify possible threats for your business processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to make sure your stakeholders appreciate information system risk so they can assist with your risk management program
  • Match identified risk vectors to related operational processes to help determine risk ownership
  • Determine risk tolerance with executive management and major stakeholders to make sure they align
Find out more information concerning Progent's CRISC Experts.

GIAC Qualified Network Security Engineering Expertise
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to verify that an accredited professional possesses the knowledge needed to provide services in critical areas of system, information, and program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit experts are available to help your company with:

  • Auditing Perimeters
  • Security Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn more information concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Security Expert
To see how to access a Progent security engineer for online or onsite support in West Virginia, phone 1-800-993-9400 or go to Online Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.