Company information networks in the state ofAlaskacan depend on quick and affordable remote access to Progent's qualified security engineers to help with complex security problems. Rates are competitive, charges are by the minute, engagement is immediate, and service is world class. Progent also provides assistance for long-term engagements that demand the knowledge of seasoned security consultants with high-level industry credentials.
If yourAlaskasmall business is based away from major urban areas likeAnchorage, Juneau, or Fairbanks, contact with local qualified network security engineers may be limited during an urgent situation. This could mean a drop in productivity for your company, angry clients, idle employees, and defocused executives. By utilizing Progent's online services, you can get in touch with a Premier security consultant who can provide help whenever you require it to keep your information system running and recover your data.
Progent can help you in all your efforts to defend your information system with services that can range from network security audits to creating a company-wide security plan. Progent offers affordable support to assist small and midsize companies to configure and maintain protected networks powered by Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the technology of leading data security vendors to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a further level of inspection for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.
Progent's certified experts are available online or on premises to provide a range of urgent or longer-term computer security services including:
If your network has an immediate requirement for IT security help, refer to Progent's Urgent Online Network Help.
- Perform thorough network security audits
- Clean up promptly after virus and worm attacks
- Configure firewalls from multiple vendors
- Configure safe methods for offsite and mobile access
- Deploy effective applications for defense against spam and DHAs
- Develop a company-wide security plan with 24x7 monitoring
- Offer outsourced Call Center Support
- Develop a practical backup and disaster recovery solution built around Data Protection Manager backup/restore technology
Progent's engineers offer advanced services in key fields of network protection including security evaluation, firewall and VPN solutions, and advanced security consulting.
Progent's certified security engineers can evaluate the strength of your existing network protection systems by performing comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in this service saves you time and money and offers an objective portrayal of security holes. The knowledge your company is provided can be used as the foundation of a network protection strategy that will allow your network to run safely and adapt rapidly to new threats.
Automated Network Security Evaluation
Progent offers consulting in the use of security analysis software such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically running a variety of automatic system testing checks to identify possible security holes. Progent has extensive knowledge of other network analysis products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can help you build security into your company processes, install auditing tools, plan and deploy a protected system architecture, and suggest policies to maximize the security of your IT system. Progent's security engineers are able to help you set up a firewall, implement secure remote connectivity to email and business applications, and install VPN. Learn more about Progent's automated security analysis.
Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles intended to allow small companies to receive an impartial network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security expert runs an extensive examination of your network from outside your firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from a secure machine inside your firewall to evaluate the risk to internal assaults. The two security inventory services are configured and run from a secured external location. The process is managed by a consultant with top security credentials and who produces a report that details and interprets the information captured by the scan and proposes practical improvements if appropriate.
Network Penetration Analysis Consulting
Stealth penetration checking is an important part of any serious IT system security strategy. Progentís security professionals can perform thorough intrusion checks without the knowledge of your organization's in-house network support staff. Unannounced penetration checking shows whether current security defense systems such as intrusion incident warnings and event history analysis are properly configured and actively monitored. Learn additional information about Progent's stealth penetration analysis consulting.
Progent's background in network security technology includes in-depth familiarity with major firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with key networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.
Cisco Network Security and VPN Support Expertise
Cisco's security and remote connection products offer a full line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Learn more details about Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Appliances.
Support Expertise for Additional Firewall and VPN Products
Progent offers small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right products from multiple suppliers to support your security goals while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to defend endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely get by legacy signature-matching anti-virus products. ProSight ASM protects local and cloud-based resources and provides a single platform to automate the entire threat progression including filtering, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge technologies incorporated within one agent accessible from a single console. Progent's data protection and virtualization experts can help your business to plan and configure a ProSight ESP environment that meets your organization's unique needs and that allows you demonstrate compliance with government and industry information security standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate action. Progent can also help you to set up and test a backup and restore system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates your backup processes and allows fast recovery of vital files, apps and virtual machines that have become lost or damaged due to hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight DPS to to comply with government and industry regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to provide centralized management and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further layer of inspection for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email that stays within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to a different hardware solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save up to 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more about ProSight IT Asset Management service.
Certified Security Design
Every business should have a carefully thought out security program that includes both preventive processes and reaction planning. The pre-attack plan is a set of steps that help to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to evaluate the damage resulting from an attack, repair the damage, record the event, and get business functions restored as quickly as possible.
Progent's certified IS security engineers can to help your business to run a full risk assessment and create a computer security plan to implement security processes and controls to reduce future assaults and threats.
CISM Accredited Network Security Support Services
The CISM committee describes the basic competencies and international standards of skill that IT security managers are expected to master. CISM gives business management the assurance that consultants who have qualified for their CISM certification possess the background and capability to deliver effective security administration and support services. Progent offers the expertise of CISM Certified security professionals to assist businesses with:
Learn more information concerning Progent's CISM Accredited Network Security Engineering Services.
- Information Security Processes
- Risk Analysis
- Information Security Implementation Management
- IS Security Management
- Response Management
CISSP Accredited Security Engineering Expertise
The CISSP credential denotes expertise with an international standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security fields such as:
Read additional details about Progent's CISSP-certified Cybersecurity Support Professionals.
- Security Management Practices
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier information system architecture engineers are experts who have been awarded ISSAP status through thorough testing and extensive work with network security architecture. The ISSAP certification indicates demonstrated competence in the more challenging demands of information system security architecture bounded by the broader field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture including.
Read more details about Progent's ISSAP Accredited Secure System Architecture Consulting Expertise.
- Access Management Systems and Techniques
- Telecommunications and Network Protection
- Encryption/Decryption Options
- Needs Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Information System Security Auditing Consulting Services
The CISA accreditation is a recognized achievement that represents mastery in IS security auditing. Certified by the American National Standards Institute, the CISA credential has candidates pass an extensive test administered by the ISACA professional association. Progent's CISA-certified IS security audit experts are available to help your IT organization in the areas of:
Get the details concerning Progent's CISA Qualified IS Security Auditing Consulting Support.
- IS Audit Services
- IT Administration
- Systems and Infrastructure Planned Useful Life
- IT Support
- Safeguarding Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, deploy, and maintain information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to create and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk management engineers can provide a variety of risk assessment services including:
Learn more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to evaluate significant vulnerabilities
- Inventory statutory, regulatory, and business requirements and company policies related to your network to determine their possible influence on your business objectives
- Identify possible vulnerabilities for your business workflows to assist in analyzing your enterprise risk
- Develop a risk awareness program and provide seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk management program
- Connect identified risk vectors to your associated business procedures to help assign risk responsibility
- Validate risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
GIAC Certified IS Security Consulting Support
Global Information Assurance Certification was established in 1999 to certify the skill of network security engineers. GIAC's mission is to make sure that a certified security consultant has the knowledge appropriate to deliver services in critical categories of system, data, and application software security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified IS security audit specialists are available to assist your IT organization with:
Read more information about Progent's GIAC Information Assurance Expertise.
- Assessing IT Infrastructure
- Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Get in Touch with a Progent Security Specialist
To find out how to access a certified Progent security engineer for remote or onsite support in Alaska, phone 1-800-993-9400 or visit Remote Computer Support.