Small business IT networks in Wyoming now have quick and affordable online help from Progent's accredited security engineers to help with complex security issues. The cost is competitive, charges are by the minute, sign-up is fast, and support is world class. Progent also provides assistance for long-term engagements that requires the knowledge of seasoned security engineers with top industry certifications.

In case your Wyoming organization is far from more populated metropolitan areas such as Cheyenne, Casper, Gillette, or Laramie, support from local certified security support specialists may be limited when you have a security disaster. This can cause a drop in income for your company, angry clients, unproductive employees, and distracted management. By utilizing Progent's remote support, you have access to a qualified security engineer who can provide help when you require it to get your information system on line and salvage your information.

Progent can assist you in all your efforts to defend your information system with support that can range from network security assessments to developing a company-wide security strategy. Progent provides affordable support to help businesses of all sizes to set up and manage protected IT environments based on Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email security solution that uses the technology of top data security companies to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.

Progent's certified engineers are accessible online or on premises to provide a range of urgent or project-based computer security services such as:

If your company has an emergency requirement for computer security support, go to Progent's Emergency Online Network Support.

Progent's consultants provide advanced services in vital facets of computer security that include auditing, firewall and VPN expertise, and high-level security consulting.

System Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your existing network security implementation through exhaustive remote automated analysis based on advanced utilities and proven techniques. Progent's experience in administering this service saves your company time and money and assures a detailed picture of weaknesses. The information your company is provided can be used as the foundation of a security plan that will allow your network to operate safely and respond rapidly to future risks.

Automated Network Security Analysis
Progent offers consulting in the application of security auditing products including MBSA and GFI LANguard Network Security Scanner for economically performing a variety of programmed system auditing checks to uncover possible security weaknesses. Progent has extensive experience with additional network analysis products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can help you design security into your business operations, install auditing tools, plan and implement a secure network architecture, and recommend procedures to maximize the safety of your IT system. Progent's security consultants are able to assist you to configure a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out additional information about Progent's automated security evaluation.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service bundles intended to enable small companies to receive an independent security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from outside your company firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized machine inside your company firewall to evaluate vulnerabilities to inside threats. The two security inventory services are configured and executed from a secured remote site. The process is managed by a consultant with high-level security accreditations and who produces a report that summarizes and interprets the information collected by the security scan and proposes cost-effective improvements if called for.

Network Penetration Testing Consulting
Stealth intrusion checking is an important part of any comprehensive IT system security strategy. Progent’s security professionals can perform thorough intrusion tests without the awareness of your organization's in-house network support resources. Stealth penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event log analysis are correctly set up and actively monitored. Learn additional information on Progent's stealth penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and offsite access technology offer a full line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Learn more information concerning Progent's Engineering Services for Cisco Security Solutions and VPN Products.

Engineering Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and select the right products from multiple suppliers to achieve your security goals while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based analysis technology to guard endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-based anti-virus tools. ProSight ASM protects local and cloud resources and offers a single platform to manage the complete threat progression including protection, identification, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP environment that addresses your company's unique requirements and that helps you prove compliance with government and industry information protection standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate attention. Progent can also assist your company to install and test a backup and restore solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup processes and enables rapid recovery of critical files, apps and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when needed, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security vendors to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most threats from making it to your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further level of inspection for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard data about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can eliminate up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you’re planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any company ought to develop a thoroughly considered security strategy that includes both proactive procedures and reaction plans. The proactive plan is a collection of procedures designed to reduce security weaknesses. The reactive strategy helps your security engineers to evaluate the damage resulting from an attack, repair the system, record the event, and get the IT network restored as quickly as possible.

Progent's expert IT security consultants are available to assist your business to perform a comprehensive risk assessment and create a company-wide security strategy to implement security policies and controls to mitigate future attacks and threats.

CISM Accredited System Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the basic competencies and worldwide standards of performance that IT security professionals are expected to learn. CISM provides executive management the assurance that consultants who have earned their CISM certification have the experience and knowledge to provide efficient security management and support services. Progent can provide the support of CISM certified security consultants to assist businesses with:

  • Information Security Governance
  • Risk Management
  • Information Security Program Management
  • Network Security Management
  • Recovery Planning
Read more information about Progent's CISM Qualified Security Support Services.

CISSP Qualified Security Engineering Expertise
The CISSP credential denotes mastery of an international standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information security defined by ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Find out more details about Progent's CISSP-certified Cybersecurity Support Expertise.

CISSP-ISSAP Accredited Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP qualified information system architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous testing and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more complex demands of information security architecture bounded by the wider field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all phases of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Phone System and Network Infrastructure Protection
  • Data Encryption Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning and DRP
  • Site Security
Read additional details about Progent's ISSAP Accredited Secure Network Architecture Support Professionals.

CISA Certified Network Security Auditing Engineering Services
The CISA credential is a prestigious achievement that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA international professional association. Progent's CISA-qualified network security audit consultants are available to assist your company in the areas of:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Read additional details about Progent's CISA Accredited Security Auditing Consulting Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's skills to plan, implement, and support IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management engineers can provide a variety of risk identification services such as:

  • Gather data and study documentation to identify major vulnerabilities
  • Inventory statutory, industry, and contractual mandates and organizational policies associated with your network to determine their potential impact on your strategic objectives
  • Identify potential vulnerabilities for your business workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your organization understand IS risk so they can assist with your risk control process
  • Match key risk scenarios to your associated operational processes to help determine risk ownership
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Find out more information concerning Progent's CRISC Risk Management Experts.

GIAC Certified IS Security Engineering Expertise
GIAC was founded in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to ensure that a certified professional has the skills necessary to provide services in important areas of network, data, and application software security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit experts can help your IT organization with:

  • Assessing Networks
  • Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Security Engineer
To learn how to contact a security consultant for remote or on-premises support in Wyoming, phone 1-800-993-9400 or visit Remote Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.