Small business IT networks in Wisconsin can now get quick and affordable remote access to Progent's accredited security consultants to help with complex security problems. The cost is affordable, billing is per minute, engagement is immediate, and support is world class. Progent also provides help for complex engagements that requires the knowledge of senior security consultants with high-level industry certifications.

In case your Wisconsin network is located some distance from more populated urban neighborhoods such as Milwaukee, Madison, Green Bay, or Kenosha, the availability of nearby qualified network security experts is often limited when you have an urgent situation. This can result in a drop in productivity for your company, upset clients, unproductive workers, and distracted executives. By contacting Progent's online services, you can get in touch with a qualified security professional ready to deliver help when you have to have it to keep your information system on line and restore your information.

Progent can assist you in all your initiatives to guard your information system with support services ranging from network security assessments to creating a company-wide security plan. Progent offers economical service to assist businesses of all sizes to configure and manage secure networks based on Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's certified consultants are accessible online or in person to offer a range of urgent or longer-term computer security services including:

  • Perform thorough network security evaluations
  • Recuperate promptly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Configure secure techniques for remote and mobile access
  • Install advanced solutions for automatic protection against viruses, spam and DHAs
  • Develop a company-wide security plan with 24x7 network monitoring
  • Provide comprehensive Help Desk Services
  • Create a practical data backup and recovery solution centered on System Center Data Protection Manager backup technology
If your company has an immediate need for IT security help, refer to Progent's Emergency Online Technical Support.

Progent's consultants provide advanced support in key fields of computer protection that include auditing, firewall/VPN support, and high-level security planning.

Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection systems through exhaustive remote automated testing via advanced software tools and proven procedures. Progent's experience in this testing saves you time and money and offers an objective portrayal of system vulnerability. The information your company is provided can be used as the basis of a network protection plan that can allow your network to operate safely and respond quickly to new threats.

Automated Network Security Evaluation
Progent provides consulting in the application of security analysis software including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a variety of automatic system auditing scans to uncover potential security holes. Progent has broad knowledge of additional network auditing products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can help you design protection into your business operations, install scanning tools, plan and implement a protected system environment, and suggest policies to optimize the security of your IT system. Progent's security engineers are able to assist you to set up a firewall, implement secure remote connectivity to email and business applications, and integrate virtual private network. Find out additional information concerning Progent's network security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory scanning bundles designed to allow small businesses to get an objective network security assessment from a certified security specialist. With Progent's External Security Inventory Scan, a security expert administers a comprehensive test of your network from beyond your company firewall to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your company firewall to assess the risk to inside attacks. Both security inventory packages are configured and run from a secured external location. The project is directed by an engineer who has earned high-level security accreditations and who produces a document that details and analyzes the information captured by the security scan and proposes cost-effective remediation where appropriate.

Stealth Intrusion Testing Consulting
Stealth intrusion testing is a key part of any serious network security strategy. Progentís security experts can perform extensive penetration tests without the knowledge of your organization's in-house IT staff. Unannounced penetration testing shows whether current security defense systems such as intrusion incident warnings and event history analysis are correctly set up and actively checked. Find out additional information on Progent's network security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network technology offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower configuration and debugging services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access technology represent a full line of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Find out more information about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.

Consulting Services for Additional Firewall and VPN Solutions
Progent provides small and medium size businesses expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and choose the right technologies from a variety of suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security vendors to deliver centralized control and world-class protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper level of inspection for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that stays within your security perimeter. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior machine learning tools to defend endpoints and servers and VMs against new malware assaults like ransomware and file-less exploits, which easily escape traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to address the entire malware attack progression including blocking, identification, mitigation, remediation, and forensics. Key features include single-click rollback with Windows VSS and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup activities and enables fast recovery of vital files, apps and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect information about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can save as much as 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Any company ought to have a carefully considered security strategy that includes both preventive processes and response plans. The proactive strategy is a collection of steps intended to reduce security weaknesses. The reactive plan assists your security engineers to assess the impact resulting from a security penetration, fix the network, document the experience, and get the IT network operational as quickly as feasible.

Progent's expert information security engineers can to help you to perform a comprehensive risk evaluation and create a company-wide security plan to establish security policies and mechanisms to reduce future attacks and threats.

CISM Qualified Network Security Support Expertise
The CISM organization defines the basic capabilities and global standards of skill that IT security professionals are required to master. It gives business management the assurance that those who have earned their CISM credential possess the experience and capability to provide effective security management and consulting consulting. Progent can provide the expertise of CISM qualified security professionals to help businesses with:

  • IS Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Response Planning
Find out additional information about Progent's CISM Accredited Security Consulting Services.

CISSP Accredited Security Engineering Services
The CISSP credential recognizes mastery of a global standard for information security. ANSI has granted the CISSP credential accreditation in the area of data security defined by ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP-certified Security Support Expertise.

ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's ISSAP qualified IT architecture engineers are consultants who have earned ISSAP status as a result of thorough examination and extensive experience with network security design. The ISSAP credential indicates demonstrated mastery in the more challenging requirements of information security architecture bounded by the wider scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Physical Security
Learn more information about Progent's ISSAP Qualified Secure System Architecture Engineering Services.

CISA Accredited Network Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that signifies mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive examination administered by the ISACA international professional group. Progent's CISA-certified IS security audit consultants can help your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Business Continuity Preparedness
Learn the details concerning Progent's CISA Qualified Security Auditing Consulting Support.

CRISC Consultants
The CRISC certification program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation experts can provide a variety of risk evaluation services such as:

  • Gather data and review documentation to help identify significant risk scenarios
  • Inventory statutory, regulatory, and contractual mandates and organizational standards associated with your information system to assess their potential impact on your strategic objectives
  • Identify potential threats for your business workflows to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders understand information system risk so they can contribute to your risk control process
  • Connect key risk scenarios to your associated business procedures to help determine risk ownership
  • Validate risk tolerance with executive leadership and major stakeholders to make sure they match
Get more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to verify that a certified professional has the skills needed to deliver services in key areas of network, information, and application software security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC information security audit consultants are available to help your business in the areas of:

Read more details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Progent Security Engineer
To find out how you can contact a Progent security consultant for online or onsite assistance in Wisconsin, phone 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.