Small business IT networks in Wyoming can depend on prompt and economical remote technical support from Progent's qualified security professionals to fix critical security issues. The cost is competitive, charges are per minute, sign-up is immediate, and support is unbeatable. Progent also provides assistance for long-term projects that demand the knowledge of seasoned security consultants with high-level security certifications.

In case your Wyoming network is based away from larger urban neighborhoods like Cheyenne, Casper, Gillette, or Laramie, support from local certified security experts could be problematic when there's an urgent situation. This can result in a loss of revenue for your company, upset customers, unproductive workers, and defocused management. By calling Progent's online services, you can get in touch with a qualified security professional ready to deliver help when you require it to get your computer network running and salvage your information.

Progent can assist you in a variety of ways in your initiatives to protect your information system with support that can range from network security checks to creating a comprehensive security strategy. Progent provides affordable service to assist companies of any size to design and manage safe networks powered by Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security companies to deliver web-based control and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further level of inspection for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, DLP, and encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.

Progent's security experts are available remotely or in person to provide a variety of urgent or project-based IT security services including:

  • Run thorough security evaluations
  • Recuperate quickly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Configure secure techniques for offsite and mobile connectivity
  • Deploy effective solutions for automatic defense against viruses, spam and DHAs
  • Develop a comprehensive security plan with 24x7 security monitoring
  • Provide outsourced Help Desk Support
  • Help Develop an effective backup and restore strategy built around Data Protection Manager backup capability
If your company has an urgent need for IT security support, refer to Progent's Emergency Online Technical Help.

Progent's consultants can deliver advanced services in vital fields of system security including security assessment, firewall and VPN solutions, and high-level security planning.

System Evaluation
Progent's certified security engineers can evaluate the effectiveness of your current network protection systems by performing exhaustive remote automated analysis based on advanced utilities and proven procedures. Progent's experience in administering this service saves you money and assures a detailed picture of security holes. The information your company gains can make up the foundation of a security strategy that will permit your network to run safely and adapt quickly to new risks.

Automated Vulnerability Assessment
Progent offers expertise in the application of security testing products such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably running a variety of automatic network testing scans to identify possible security gaps. Progent has extensive experience with other network auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like Metasploit, Hydra, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can help you build security into your business operations, install auditing applications, plan and implement a secure system architecture, and suggest procedures to optimize the security of your network. Progent's security engineers are ready to show you how to configure a firewall, design safe remote access to email and data, and integrate virtual private network. Find out additional information about Progent's network security assessment.

Security Inventory Bundles for Small Companies
Progent offers two low-cost security inventory scanning bundles designed to enable small companies to get an impartial security assessment from an accredited security engineer. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from a secure computer within your company firewall to uncover vulnerabilities to internal threats. The two security inventory packages are configured and executed from a secured external location. The project is managed by a consultant who has earned top security accreditations and who produces a document that details and analyzes the information collected by the security scan and proposes practical remediation if called for.

Network Security Penetration Analysis Consulting
Stealth penetration testing is an important component of any successful IT system security strategy. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's in-house network support resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event log analysis are correctly set up and actively monitored. Find out more on Progent's network penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote connection technology offer a comprehensive range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Read additional information concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Appliances.

Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate products from a variety of suppliers to support your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a portfolio of affordable, set-price monthly services designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a further level of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior-based analysis technology to defend endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a single platform to manage the entire threat lifecycle including blocking, identification, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup activities and enables fast recovery of vital files, apps and VMs that have become unavailable or damaged as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to restore your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

Certified Network Security Consulting
Every company ought to develop a carefully considered security strategy that includes both pre-attack processes and response plans. The proactive plan is a set of mechanisms designed to minimize security weaknesses. The reactive plan helps your company's network security engineers to assess the damage caused by an attack, repair the damage, document the event, and get the IT network restored as quickly as feasible.

Progent's certified IS security engineers can to assist your company to run a full vulnerability assessment and create a computer security plan to implement security policies and mechanisms to minimize ongoing assaults and dangers.

CISM Accredited System Security Engineering Services
The CISM organization describes the basic capabilities and international standards of skill that information security managers are expected to learn. CISM provides business management the assurance that consultants who have qualified for their CISM credential possess the experience and capability to provide effective security administration and consulting services. Progent can provide the support of CISM certified security consultants to help companies with:

  • IS Security Processes
  • Vulnerability Management
  • Information Security Implementation Management
  • IS Security Management
  • Recovery Management
Find out more details about Progent's CISM Accredited Security Support Expertise.

CISSP Accredited Security Engineering Support
The CISSP credential denotes expertise with an international standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data protection stipulated by ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Read additional details about Progent's CISSP Qualified Network Security Support Services.

ISSAP Accredited Secure Network Architecture Engineering Services
Progent's ISSAP certified system architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the most challenging demands of information system security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Find out additional information about Progent's ISSAP Accredited Secure System Architecture Engineering Expertise.

CISA Accredited Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies mastery in network security audit and control. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA information security audit experts are available to help your business in the areas of:

  • IS Audit Services
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Planning
Learn additional details about Progent's CISA Qualified Network Security Auditing Consulting Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's ability to plan, deploy, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and carry out a business continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk management specialists can provide a range of risk assessment services such as:

  • Gather information and review documentation to identify major risk scenarios
  • Identify legal, industry, and contractual requirements and organizational policies related to your information system to determine their possible influence on your strategic goals
  • Point out potential threats for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct seminars to ensure your stakeholders understand IS risk so they can assist with your risk control process
  • Connect identified risk vectors to your associated business procedures to help determine risk responsibility
  • Validate risk appetite with executive management and major stakeholders to ensure they align
Get more information about Progent's CRISC Experts.

GIAC Qualified Information System Security Engineering Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security professionals. GIAC's mission is to make sure that a certified professional has the knowledge appropriate to deliver services in key areas of system, information, and software security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC network security audit experts can help your IT organization in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Expert
To see how to get in touch with a certified security engineer for remote or on-premises expertise in Wyoming, phone 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.