Business networks in the state of Wyoming now have prompt and affordable online access to Progent's certified security support specialists to resolve critical security problems. Rates are reasonable, billing is by the minute, engagement is quick, and support is world class. Progent also offers help for complex projects that demand the services of senior security consultants with high-level industry certifications.

In case your Wyoming network is away from more populated urban neighborhoods like Cheyenne, Casper, Gillette, or Laramie, support from nearby accredited network security support specialists is often problematic when you have an emergency. This could mean a loss of productivity for your business, upset clients, idle workers, and defocused executives. By calling Progent's online services, you have access to a qualified security engineer who can provide expertise whenever you have to have it to get your network running and salvage your information.

Progent can assist you in all your initiatives to guard your IT environment with support that ranges from network security assessments to creating a comprehensive security plan. Progent provides affordable support to help companies of any size to design and maintain safe networks based on Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security vendors to deliver web-based management and world-class security for all your inbound and outbound email. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further level of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also enable Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified consultants are available online or on site to offer a variety of urgent or project-based IT security services including:

  • Run comprehensive security evaluations
  • Clean up rapidly after attacks
  • Set up effective firewalls
  • Configure secure solutions for offsite and mobile connectivity
  • Install effective utilities for defense against viruses, spam and DHAs
  • Help create a comprehensive security strategy with 24x7 security monitoring
  • Provide comprehensive Help Desk Support
  • Help Develop an effective data backup and disaster recovery solution built around Data Protection Manager backup capability
If your company has an immediate need for IT security help, refer to Progent's Emergency Online Technical Help.

Progent's consultants provide advanced support in key areas of network security including analysis, firewall and VPN expertise, and high-level security planning.

System Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your existing network security systems by performing exhaustive remote automated testing via advanced software tools and proven techniques. Progent's experience in this service saves you time and money and assures a detailed picture of system vulnerability. The knowledge your company is provided can form the foundation of a security strategy that can permit your information system to run safely and react rapidly to new risks.

Automated Network Vulnerability Assessment
Progent provides expertise in the application of security auditing products such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably running a set of automatic system testing checks to identify possible security problems. Progent has extensive knowledge of additional network auditing products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can show you how to design security into your company operations, install scanning tools, plan and deploy a secure system architecture, and recommend policies to optimize the safety of your network. Progent's security professionals are able to show you how to set up a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's network security analysis.

Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small businesses to get an impartial network security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, a security expert administers a comprehensive examination of your network from outside your firewalled perimeter to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from a secure machine inside your company firewall to determine your exposure to internal attacks. Both security inventory packages are set up and executed from a protected external location. The process is managed by a consultant with top security credentials and who generates a report that details and analyzes the information collected by the security scan and proposes practical remediation if appropriate.

Stealth Intrusion Testing Consulting
Stealth penetration testing is a key part of any successful network security plan. Progentís security professionals can run thorough penetration checks without the awareness of your company's in-house network support staff. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event history analysis are properly configured and consistently monitored. Find out more about Progent's stealth penetration analysis support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your existing PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services integration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's security and remote access technology provide a complete range of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP qualifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Find out more information about Progent's Support Services for Cisco Security and VPN Appliances.

Consulting Services for Additional Firewall and VPN Solutions
Progent offers small and mid-size companies expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and select appropriate technologies from a variety of suppliers to support your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading data security vendors to deliver web-based control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device provides a further layer of inspection for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning tools to defend endpoints and servers and VMs against new malware assaults like ransomware and file-less exploits, which easily evade traditional signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to address the entire threat progression including blocking, infiltration detection, containment, cleanup, and forensics. Top features include single-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical files, apps and virtual machines that have become unavailable or damaged due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your critical information. Find out more about ProSight DPS Managed Backup and Recovery.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect information about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate up to 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Planning
Any business ought to have a thoroughly thought out security strategy that includes both pre-attack processes and reaction planning. The pre-attack strategy is a collection of mechanisms designed to minimize vulnerabilities. The post-attack strategy assists your company's IT security personnel to assess the impact caused by a security penetration, fix the system, record the event, and get business functions restored as rapidly as possible.

Progent's expert IS security engineers can to help your company to perform a complete risk assessment and define a network security strategy to establish security processes and mechanisms to minimize future assaults and dangers.

CISM Certified Security Engineering Services
The Certified Information Security Manager (CISM) organization describes the basic capabilities and global standards of performance that information security professionals are expected to master. CISM provides executive management the assurance that those who have qualified for their CISM credential possess the background and capability to deliver efficient security management and support consulting. Progent can provide the expertise of CISM qualified security consultants to assist businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • Information Security Implementation Management
  • Information Security Management
  • Recovery Planning
Learn more details concerning Progent's CISM Accredited Security Consulting Services.

CISSP Accredited Security Engineering Assistance
CISSP denotes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information protection under ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security fields including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Learn additional details about Progent's CISSP Accredited IS Security Engineering Services.

ISSAP Qualified Secure Network Architecture Consulting Assistance
Progent's ISSAP qualified system architecture engineers are consultants who have been awarded ISSAP Certification through thorough testing and extensive experience with network security design. The ISSAP credential represents proven mastery in the most in-depth requirements of IS security architecture bounded by the broader scope of information security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all aspects of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Cryptography Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and DRP
  • Physical Security
Read additional information concerning Progent's ISSAP Certified Secure Network Architecture Engineering Professionals.

CISA Accredited Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that indicates expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive examination administered by the ISACA international professional association. Progent's CISA information security audit consultants can assist your company with:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Information Assets
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISA Qualified Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA in 2010 to verify a consultant's ability to design, implement, and maintain IS controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation engineers offer a range of risk identification services including:

  • Gather data and review documentation to evaluate significant risk scenarios
  • Identify legal, industry, and contractual requirements and company policies related to your information system to assess their possible impact on your strategic objectives
  • Point out potential threats for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate IT risk so they can contribute to your risk control process
  • Match key risk vectors to your associated operational processes to help determine risk ownership
  • Validate risk tolerance with executive leadership and major stakeholders to make sure they align
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Engineering Expertise
GIAC was founded in 1999 to certify the knowledge of IT security experts. GIAC's goal is to ensure that an accredited professional possesses the knowledge needed to provide support in critical areas of system, information, and software security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC information security audit engineers are available to assist your company with:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read more information concerning Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Expert
To find out how to access a Progent security engineer for remote or on-premises help in Wyoming, phone 1-800-993-9400 or visit Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.