Company networks in the state of Wisconsin can have fast and economical online access to Progent's accredited network security professionals to help with urgent security problems. Rates are reasonable, billing is per minute, engagement is fast, and support is world class. Progent also provides help for long-term projects that demand the expertise of seasoned security consultants with high-level industry certifications.

In case your Wisconsin office is located some distance from more populated metropolitan neighborhoods including Milwaukee, Madison, Green Bay, or Kenosha, support from local certified security professionals is often limited when there's a crisis. This could mean a loss of revenue for your company, upset customers, unproductive workers, and defocused management. By calling Progent, you can get in touch with a qualified security engineer ready to provide help whenever you require it to keep your information system operating and recover your information.

Progent can help you in a variety of ways in your initiatives to protect your IT environment with services that ranges from security checks to creating a comprehensive security plan. Progent offers affordable service to help companies of any size to set up and manage safe IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further layer of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter.

Progent's security engineers are available remotely or on premises to provide a variety of emergency or project-based computer security services such as:

If your network has an emergency requirement for IT security support, go to Progent's Emergency Online Network Help.

Progent's security experts offer world-class support in vital areas of computer security that include auditing, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's expert security engineers can assess the effectiveness of your existing network security implementation by performing comprehensive remote automated analysis based on advanced utilities and proven techniques. Progent's experience in this testing saves your company money and offers an objective picture of system vulnerability. The knowledge your business gains can be used as the basis of a security plan that will permit your network to run dependably and respond rapidly to new risks.

Automated Security Audits
Progent provides expertise in the use of security evaluation software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a variety of automatic network testing scans to identify possible security gaps. Progent has broad knowledge of additional network auditing tools including NMAP Port Scanner, AMAP, eEye, plus utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can show you how to design protection into your business processes, configure scanning tools, plan and implement a secure system architecture, and recommend policies to optimize the safety of your network. Progent's security professionals are able to show you how to configure a firewall, design safe remote access to email and data, and integrate virtual private network. Find out more about Progent's automated security assessment.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages designed to enable small companies to get a professional network security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a security engineer runs a comprehensive test of your IT infrastructure from outside your firewalled perimeter to determine potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from a secure computer inside your company firewall to determine the risk to inside assaults. The two security inventory packages are configured and executed from a secured remote site. The process is directed by a consultant with top security accreditations and who generates a report that summarizes and analyzes the data captured by the scan and proposes practical remediation if appropriate.

Network Security Penetration Testing Support Services
Stealth intrusion testing is a key part of any comprehensive network security plan. Progent’s security experts can perform thorough intrusion checks without the awareness of your company's in-house network support staff. Stealth penetration checking shows whether current security defense tools such as intrusion incident warnings and event log analysis are properly set up and consistently monitored. Find out additional information concerning Progent's stealth security penetration analysis support services.

Firewall/VPN Support
Progent's background in network security solutions includes extensive familiarity with major firewalls and VPN technology offered by multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and remote access products represent a comprehensive line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Find out more details about Progent's Support Expertise for Cisco Security and VPN Appliances.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and choose the right products from multiple suppliers to achieve your security goals while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior machine learning tools to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and email phishing, which easily escape traditional signature-based AV products. ProSight ASM protects local and cloud-based resources and offers a single platform to address the entire malware attack lifecycle including filtering, identification, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge technologies packaged within a single agent managed from a unified control. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP environment that meets your organization's specific requirements and that helps you prove compliance with government and industry data protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require urgent action. Progent can also assist you to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates and monitors your backup activities and enables rapid restoration of critical files, applications and VMs that have become unavailable or damaged due to hardware failures, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can deliver world-class support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical information. Read more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security companies to deliver web-based management and comprehensive security for all your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains. By updating and organizing your network documentation, you can eliminate as much as 50% of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more details about ProSight IT Asset Management service.

Certified Security Design
Every company should have a thoroughly thought out security program that incorporates both pre-attack processes and reaction planning. The pre-attack plan is a set of procedures intended to reduce security weaknesses. The reactive strategy helps your company's security engineers to evaluate the impact caused by an attack, fix the system, document the experience, and get the IT network running as soon as possible.

Progent's certified information security consultants are available to help you to run a comprehensive vulnerability assessment and create a network security strategy to implement security processes and controls to mitigate ongoing assaults and dangers.

CISM Qualified Network Security Engineering Expertise
The Certified Information Security Manager (CISM) committee defines the core capabilities and global standards of skill that information security professionals are expected to master. It gives business management the assurance that those who have qualified for their CISM certification have the experience and capability to provide effective security administration and consulting consulting. Progent can provide the expertise of CISM certified security professionals to help companies with:

  • IS Security Processes
  • Risk Management
  • IS Security Implementation Management
  • IS Security Administration
  • Response Management
Learn more details about Progent's CISM Qualified Security Support Professionals.

CISSP Accredited Security Consulting Expertise
CISSP denotes expertise with a global standard for data security. ANSI has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a variety security areas including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Learn additional information about Progent's CISSP Information Security Consulting Services.

CISSP-ISSAP Accredited Secure System Architecture Consulting Support
Progent's CISSP-ISSAP certified information system architecture professionals are consultants who have earned ISSAP status as a result of rigorous examination and extensive work with information security design. The ISSAP credential indicates demonstrated competence in the more in-depth requirements of information security architecture within the broader scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your company with all phases of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out more information concerning Progent's ISSAP Certified Secure Network Architecture Support Expertise.

CISA Qualified Security Auditing Engineering Expertise
The CISA accreditation is a prestigious qualification that represents mastery in information system security audit and control. Certified by ANSI, the CISA accreditation requires that candidates pass an extensive examination given by the ISACA international professional group. Progent's CISA IS security audit experts can assist your business in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Learn more information about Progent's CISA Certified Information System Security Auditing Engineering Services.

CRISC Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's skills to design, implement, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity strategy based on industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists can provide a variety of risk assessment services such as:

  • Gather data and review documentation to evaluate major risk scenarios
  • Inventory legal, industry, and contractual requirements and company policies associated with your information system to determine their potential impact on your strategic objectives
  • Identify potential threats for your operational workflows to help in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders understand IS risk so they can assist with your risk control process
  • Connect identified risk vectors to your associated operational procedures to help determine risk responsibility
  • Determine risk appetite with executive management and key stakeholders to make sure they align
Read more information concerning Progent's CRISC Risk Management Experts.

GIAC Accredited Security Engineering Expertise
GIAC was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to verify that a certified professional possesses the knowledge necessary to provide services in key areas of network, information, and application software security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC information security audit specialists are available to assist your company in the areas of:

  • Assessing Security Systems
  • Security Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Specialist
To find out how you can contact a certified Progent security consultant for online or onsite support in Wisconsin, call 1-800-993-9400 or go to Online Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.