Company networks in Wisconsin now have fast and affordable remote help from Progent's accredited network security professionals to assist with complex security issues. The cost is reasonable, charges are per minute, engagement is immediate, and service is world class. Progent also offers assistance for complex projects that requires the services of seasoned security consultants with high-level industry certifications.

In case your Wisconsin office is based some distance from larger metropolitan neighborhoods including Milwaukee, Madison, Green Bay, or Kenosha, access to local certified network security consultants may be limited when you have a security disaster. This can result in a loss of productivity for your business, upset clients, idle employees, and distracted executives. By contacting Progent, you can get in touch with a certified security professional ready to deliver expertise when you have to have it to get your computer network operating and restore your information.

Progent can assist you in all your efforts to protect your IT environment with services that can range from security audits to creating a company-wide security strategy. Progent provides economical service to assist companies of any size to configure and maintain safe networks based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security companies to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a deeper level of inspection for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter.

Progent's certified consultants are accessible remotely or on premises to provide a range of urgent or longer-term IT security services including:

If your network has an urgent need for IT security support, refer to Progent's Urgent Remote Technical Help.

Progent's consultants can deliver world-class services in key areas of computer protection that include analysis, firewalls and VPN, and high-level security planning.

System Evaluation
Progent's certified security engineers can assess the strength of your current network security environment through exhaustive remote automated testing based on sophisticated software tools and tested techniques. Progent's skill in administering this service saves you money and assures a detailed picture of system vulnerability. The information your company is provided can be used as the foundation of a network protection strategy that can permit your information system to operate dependably and respond rapidly to future risks.

Automated Network Vulnerability Audits
Progent offers consulting in the use of security testing utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a set of programmed system auditing scans to identify potential security problems. Progent has broad knowledge of other security auditing products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can help you design security into your business operations, install auditing applications, define and implement a protected system architecture, and recommend policies to maximize the security of your network. Progent's security professionals are able to show you how to set up a firewall, design secure remote access to email and business applications, and integrate virtual private network. Learn additional information on Progent's network security analysis.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory bundles designed to allow small businesses to receive an objective security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, a security expert administers a comprehensive test of your network from beyond your company firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from an authorized computer inside your firewall to assess your exposure to inside attacks. The two security inventory packages are set up and run from a secured external location. The project is managed by a consultant with top security credentials and who produces a document that details and analyzes the data collected by the security scan and proposes cost-effective improvements if appropriate.

Network Security Penetration Testing Support Services
Stealth intrusion checking is an important component of any serious IT system security strategy. Progent’s security experts can perform thorough penetration checks without the knowledge of your company's internal IT resources. Unannounced penetration testing shows whether current security defense tools such as intrusion detection warnings and event history monitoring are correctly configured and consistently monitored. Find out more on Progent's stealth security penetration testing consulting.

Firewall/VPN Solutions
Progent's background in network security technology includes in-depth field work with leading firewalls and VPN technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower configuration and debugging services.

Cisco Security and VPN Consulting Services
Cisco's security and remote access products represent a full range of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP certifications who can help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business objectives. Read additional details about Progent's Engineering Expertise for Cisco Security and VPN Products.

Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right technologies from a variety of vendors to achieve your security objectives while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis tools to guard endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which routinely escape legacy signature-matching AV products. ProSight ASM protects local and cloud resources and provides a unified platform to automate the complete malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver economical multi-layer security for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering through leading-edge technologies packaged within one agent accessible from a single control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's unique requirements and that allows you demonstrate compliance with government and industry data security regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also assist your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup processes and allows rapid restoration of critical data, applications and virtual machines that have become unavailable or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide advanced support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security vendors to deliver centralized management and comprehensive security for your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting environment without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and safeguard data related to your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your network documentation, you can save up to 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether you’re planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Design
Every business ought to have a thoroughly considered security strategy that incorporates both preventive processes and reaction planning. The pre-attack plan is a collection of procedures that help to reduce security weaknesses. The post-attack plan helps your network security engineers to assess the damage resulting from a security penetration, repair the system, document the event, and get business functions operational as soon as feasible.

Progent's certified IT security engineers can to assist you to perform a full vulnerability assessment and create a company-wide security plan to establish security policies and mechanisms to minimize ongoing attacks and threats.

CISM Qualified System Security Consulting Services
The CISM committee describes the core capabilities and international standards of performance that IT security professionals are required to learn. CISM gives business management the confidence that consultants who have qualified for their CISM certification possess the background and capability to provide efficient security management and support consulting. Progent offers the support of CISM certified security consultants to help companies with:

  • IS Security Governance
  • Risk Analysis
  • IS Security Program Management
  • Information Security Management
  • Recovery Planning
Find out more details concerning Progent's CISM Certified Information Security Engineering Expertise.

CISSP Accredited Security Consulting Expertise
CISSP certification recognizes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification recognition in the area of information protection under ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your business in a broad range of security areas such as:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Read more information concerning Progent's CISSP Accredited Information Security Support Expertise.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP qualified network architecture engineers are experts who have been awarded ISSAP status as a result of thorough examination and extensive work with network security architecture. The ISSAP credential indicates demonstrated mastery in the most challenging demands of IS security architecture within the wider scope of IS security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all aspects of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and DRP
  • Site Security
Read more details concerning Progent's ISSAP Qualified Secure Network Architecture Support Professionals.

CISA Accredited IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that indicates expertise in information system security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates pass a comprehensive examination administered by the ISACA professional group. Progent's CISA-certified security audit consultants are available to help your company with:

  • IS Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Qualified Security Auditing Engineering Expertise.

CRISC Consultants
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to plan, implement, and support information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity plan that follows leading practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation consultants offer a variety of risk identification services including:

  • Gather data and review documentation to evaluate significant vulnerabilities
  • Inventory legal, industry, and contractual mandates and organizational policies associated with your information system to assess their potential influence on your business goals
  • Point out possible threats for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your organization appreciate IS risk so they can assist with your risk management process
  • Connect key risk scenarios to related operational processes to help assign risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to ensure they are in agreement
Get more information concerning Progent's CRISC Experts.

GIAC Qualified Network Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to validate the skill of computer security engineers. GIAC's goal is to ensure that an accredited professional has the skills necessary to provide support in vital areas of network, information, and application program security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC security audit engineers are available to assist your IT organization with:

Find out additional details concerning Progent's GIAC Information Assurance Services.

Contact a Security Expert
To find out how you can access a Progent security engineer for online or onsite support in Wisconsin, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.