Small business information networks in the state of Wisconsin can now get quick and economical remote technical support from Progent's accredited network security professionals to assist with complex security problems. The cost is reasonable, billing is per minute, sign-up is quick, and support is world class. Progent also offers help for long-term projects that requires the expertise of senior security engineers with top security credentials.

In case your Wisconsin business is based some distance from major metropolitan areas including Milwaukee, Madison, Green Bay, or Kenosha, the availability of local accredited network security experts may be limited during a security disaster. This can result in a drop in income for your company, upset clients, idle employees, and defocused management. By contacting Progent's online services, you can get in touch with a qualified security professional ready to offer help when you have to have it to keep your computer network on line and restore your data.

Progent can help you in a variety of ways in your efforts to protect your IT environment with services ranging from security assessments to developing a comprehensive security plan. Progent provides affordable service to help small and midsize companies to configure and maintain protected IT environments based on Microsoft Windows and Cisco products and that can include computers based on UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to deliver centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's certified professionals are accessible remotely or in person to offer a range of urgent or longer-term IT security services which include:

  • Run automated network security evaluations
  • Clean up rapidly after virus and worm attacks
  • Set up and troubleshoot firewalls
  • Implement secure methods for offsite and mobile access
  • Install effective solutions for protection against spam and directory harvest attacks
  • Develop a company-wide security strategy with 24x7 monitoring
  • Provide comprehensive Help Desk Call Center Services
  • Help Develop an effective backup and restore strategy centered on Microsoft DPM fault-tolerant technology
If your network has an immediate requirement for IT security support, refer to Progent's Emergency Online Network Support.

Progent's support professionals provide world-class services in key areas of computer security including security assessment, firewall and VPN expertise, and high-level security planning.

System Security Audits
Progent's expert security engineers can evaluate the effectiveness of your existing computer security systems by performing exhaustive remote automated analysis via advanced utilities and proven techniques. Progent's experience in this testing saves your company consulting fees and assures a detailed portrayal of system vulnerability. The information your company is provided can form the foundation of a security strategy that can permit your information system to run safely and respond rapidly to new risks.

Automated Network Vulnerability Analysis
Progent offers expertise in the use of security testing products including Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a variety of programmed network testing scans to uncover possible security gaps. Progent has broad experience with additional security auditing tools including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design protection into your company processes, configure auditing software, plan and deploy a secure system architecture, and recommend policies to optimize the security of your network. Progent's security consultants are able to help you configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Find out additional information on Progent's automated security audits.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages designed to allow small companies to receive an objective security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, an engineer runs a comprehensive test of your network from beyond your firewalled perimeter to determine possible risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from an authorized machine within your firewall to assess vulnerabilities to inside assaults. Both security inventory services are set up and executed from a protected remote site. The process is overseen by a consultant who has earned top security credentials and who generates a document that details and interprets the information captured by the scan and suggests practical remediation if called for.

Stealth Security Penetration Analysis Consulting
Stealth penetration checking is an important component of any successful IT system security plan. Progentís security professionals can perform extensive intrusion checks without the awareness of your company's internal network support resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion incident warnings and event log analysis are correctly configured and consistently monitored. Learn more on Progent's network security penetration testing support services.

Firewall/VPN Support
Progent's expertise in security technology encompasses in-depth field work with major firewalls and Virtual Private Network technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to manage your legacy PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Support Services
Cisco's security and offsite access technology represent a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Learn additional details concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Products.

Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security plan and select the right technologies from multiple vendors to achieve your security objectives while staying within your budget limits.

Expert Security Consulting
Every company ought to develop a thoroughly considered security strategy that incorporates both pre-attack processes and response planning. The proactive strategy is a set of procedures designed to reduce security weaknesses. The post-attack strategy helps your company's network security engineers to assess the impact resulting from a security penetration, repair the network, record the event, and get business functions running as rapidly as possible.

Progent's certified IT security engineers are available to help your company to run a complete risk assessment and create a company-wide security plan to implement security processes and controls to minimize ongoing attacks and threats.

CISM Accredited Information Security Consulting Expertise
The CISM organization describes the basic capabilities and worldwide standards of performance that IT security managers are required to master. It gives business management the assurance that consultants who have earned their CISM certification possess the background and knowledge to provide efficient security administration and support consulting. Progent offers the services of CISM certified security consultants to assist businesses with:

  • IS Security Processes
  • Vulnerability Management
  • Information Security Implementation Management
  • Information Security Management
  • Response Management
Learn additional details concerning Progent's CISM Accredited Security Support Professionals.

CISSP Certified Security Consulting Assistance
The CISSP credential denotes expertise with an international standard for information security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security areas such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Read more information concerning Progent's CISSP-certified Security Engineering Professionals.

ISSAP Accredited Secure Network Architecture Consulting Support
Progent's ISSAP certified network architecture engineers are experts who have earned ISSAP Certification through rigorous examination and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the most challenging requirements of information system security architecture within the wider scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Find out more information concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Qualified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that signifies expertise in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants pass an extensive examination administered by the ISACA international professional group. Progent's CISA security audit engineers can assist your business in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Find out more details concerning Progent's CISA Certified Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's ability to plan, implement, and maintain information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help you to create and execute a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management experts offer a variety of risk assessment services such as:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory statutory, industry, and contractual requirements and company standards associated with your network to determine their potential influence on your business objectives
  • Point out possible vulnerabilities for your business workflows to help in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your stakeholders understand information system risk so they can contribute to your risk management program
  • Connect identified risk vectors to your associated operational processes to help assign risk ownership
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Get additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Security Consulting Expertise
GIAC was established in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to assure that an accredited professional has the knowledge appropriate to provide services in vital categories of system, data, and application program security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified information security audit specialists can help your business in the areas of:

Learn more details about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Engineer
To find out how you can contact a certified Progent security engineer for online or on-premises assistance in Wisconsin, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.