Company computer networks in Wisconsin now have prompt and affordable online access to Progent's certified security support specialists to assist with complex security problems. The cost is reasonable, charges are by the minute, sign-up is immediate, and service is world class. Progent also provides help for long-term engagements that requires the services of seasoned security engineers with top industry certifications.

If your Wisconsin company is located some distance from major metropolitan areas like Milwaukee, Madison, Green Bay, or Kenosha, support from nearby certified security professionals may be problematic when you have a security disaster. This can cause lost income for your business, upset clients, idle employees, and defocused management. By calling Progent's online services, you can get in touch with a certified security engineer ready to provide assistance whenever you have to have it to keep your network operating and recover your data.

Progent can help you in all your efforts to protect your information system with services ranging from network security checks to creating a company-wide security plan. Progent provides economical service to help small and midsize companies to configure and manage secure networks powered by Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to deliver centralized control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with a local gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified engineers are accessible online or in person to offer a variety of emergency or project-based computer security services which include:

  • Run automated network security audits
  • Clean up rapidly after virus and worm attacks
  • Install hardware and software firewalls
  • Configure secure techniques for remote and mobile access
  • Install effective software for protection against spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive monitoring
  • Offer outsourced Call Center Support
  • Create an effective network backup and disaster recovery solution based on Data Protection Manager (DPM) backup technology
If your business has an immediate requirement for IT security help, refer to Progent's Urgent Remote Network Help.

Progent's security experts offer advanced services in key areas of computer security that include auditing, firewalls and VPN, and advanced security planning.

System Evaluation
Progent's expert security engineers can assess the strength of your existing network protection implementation by performing exhaustive remote automated analysis based on sophisticated software tools and proven techniques. Progent's experience in this service saves your company time and money and assures an objective portrayal of gaps. The knowledge your IT organization gains can make up the foundation of a security plan that will allow your network to operate dependably and adapt quickly to new threats.

Automated Security Audits
Progent offers consulting in the application of security testing products such as MBSA and GFI LANguard for affordably performing a set of programmed network auditing checks to uncover possible security vulnerabilities. Progent has broad knowledge of other security analysis products including NMAP Port Scanner, AMAP, eEye, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can show you how to design security into your business processes, configure auditing applications, plan and deploy a secure network architecture, and suggest policies to optimize the security of your network. Progent's security professionals are able to show you how to configure a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Find out more concerning Progent's network security analysis.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning packages designed to enable small businesses to get an objective security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from a secure machine inside your company firewall to uncover your exposure to internal attacks. The two security inventory services are set up and run from a protected external site. The process is directed by an engineer who has earned high-level security accreditations and who generates a report that details and interprets the information captured by the scan and proposes practical improvements if appropriate.

Stealth Penetration Analysis Consulting
Stealth penetration testing is a key part of any comprehensive IT system security strategy. Progentís security experts can perform extensive penetration tests without the knowledge of your organization's in-house IT resources. Stealth penetration checking uncovers whether current security monitoring tools such as intrusion incident alerts and event history monitoring are correctly configured and consistently monitored. Find out more concerning Progent's network security penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned key industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and offsite access products offer a complete range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and CCNP certifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Learn additional details about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.

Support Services for Additional Firewall and VPN Solutions
Progent offers small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select appropriate products from multiple vendors to achieve your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Security
Progent offers a collection of low-cost, fixed-price monthly services intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to provide web-based control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a further level of analysis for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior machine learning technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight ASM safeguards local and cloud resources and offers a unified platform to automate the entire threat progression including filtering, detection, containment, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates your backup processes and allows rapid restoration of vital data, applications and virtual machines that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR specialists can provide world-class support to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

Expert Network Security Design
Any company should have a thoroughly thought out security strategy that includes both proactive procedures and response planning. The pre-attack strategy is a set of procedures intended to reduce vulnerabilities. The reactive strategy assists your security personnel to assess the impact caused by an attack, repair the damage, document the experience, and get the IT network restored as quickly as possible.

Progent's expert information security consultants are available to help your company to run a comprehensive risk evaluation and create a computer security plan to establish security processes and mechanisms to minimize ongoing attacks and dangers.

CISM Qualified System Security Engineering Expertise
The Certified Information Security Manager (CISM) committee describes the core competencies and international standards of skill that information security managers are expected to master. CISM provides executive management the confidence that those who have qualified for their CISM certification have the experience and knowledge to deliver effective security administration and support consulting. Progent offers the support of CISM certified security professionals to assist businesses with:

  • Network Security Governance
  • Risk Management
  • IS Security Program Management
  • IS Security Management
  • Response Management
Read additional information concerning Progent's CISM Certified IS Security Consulting Services.

CISSP Certified Security Consulting Services
CISSP certification denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information protection under ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Learn more details about Progent's CISSP Qualified IS Security Consulting Professionals.

ISSAP Accredited Secure System Architecture Consulting Services
Progent's ISSAP qualified information system architecture engineers are consultants who have earned ISSAP status through thorough examination and significant experience with network security architecture. The ISSAP credential represents demonstrated skill in the most challenging demands of IS security architecture bounded by the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture including.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Protection
  • Data Encryption Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional details about Progent's ISSAP Certified Secure Information System Architecture Engineering Services.

CISA Certified Information System Security Auditing Consulting Assistance
The CISA accreditation is a recognized qualification that signifies expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo a comprehensive examination administered by the ISACA professional group. Progent's CISA security audit engineers are available to help your company in the areas of:

  • IS Audit Process
  • IT Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Learn more information about Progent's CISA Accredited IS Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and support IS controls to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and execute a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk management specialists can provide a variety of risk identification services such as:

  • Gather data and review documentation to identify significant vulnerabilities
  • Identify legal, regulatory, and contractual mandates and organizational standards related to your information system to assess their potential influence on your business goals
  • Point out potential threats for your business workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide training to ensure your stakeholders understand information system risk so they can contribute to your risk control program
  • Match key risk vectors to your associated business processes to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they match
Read additional details about Progent's CRISC Experts.

GIAC Certified Information System Security Consulting Services
GIAC was founded in 1999 to certify the skill of computer security engineers. GIAC's goal is to ensure that a certified professional possesses the skills appropriate to deliver services in important categories of system, information, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit experts can assist your IT organization in the areas of:

  • Auditing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Support.

Contact a Security Engineer
To learn how you can contact a Progent security engineer for remote or onsite help in Wisconsin, phone 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.