Business IT networks in the state ofAlaskacan have quick and affordable online access to Progent's accredited network security engineers to fix critical security problems. The cost is competitive, charges are by the minute, sign-up is quick, and support is world class. Progent also provides help for long-term engagements that requires the knowledge of senior security consultants with high-level industry credentials.
If yourAlaskanetwork is based away from larger metropolitan neighborhoods such asAnchorage, Juneau, or Fairbanks, access to nearby accredited security engineers is often problematic when you have an emergency. This can result in a drop in income for your business, upset clients, idle employees, and distracted executives. By utilizing Progent's online services, you can get in touch with a Premier security engineer ready to provide assistance when you need it to keep your network on line and recover your information.
Progent can assist you in all your initiatives to protect your network with services that ranges from network security assessments to creating a comprehensive security plan. Progent offers economical support to assist small and midsize companies to design and maintain protected IT environments powered by Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of top data security companies to deliver centralized control and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.
Progent's certified professionals are available online or on site to offer a variety of emergency or longer-term IT security services such as:
If your business has an urgent requirement for computer security support, go to Progent's Urgent Remote Technical Support.
- Run thorough network security audits
- Clean up quickly after virus and worm attacks
- Configure firewalls from multiple vendors
- Configure safe methods for offsite and mobile access
- Install advanced utilities for protection against spam and DHAs
- Develop a company-wide security strategy with proactive security monitoring
- Offer comprehensive Help Desk Call Center Services
- Develop a practical backup and disaster recovery plan built around Microsoft DPM backup capability
Progent's engineers can deliver world-class services in vital areas of computer security including security assessment, firewalls and VPN, and high-level security planning.
Progent's expert security consultants can evaluate the vulnerability of your current network security systems by performing comprehensive remote automated testing via advanced utilities and tested techniques. Progent's experience in administering this service saves your company consulting fees and assures a detailed picture of weaknesses. The knowledge your IT organization gains can form the foundation of a network protection plan that can permit your information system to operate dependably and react rapidly to future risks.
Automated Network Vulnerability Evaluation
Progent offers expertise in the use of security evaluation products such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically running a set of automatic network auditing scans to uncover potential security vulnerabilities. Progent has broad experience with additional security auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.
Progent can help you design security into your business operations, configure auditing applications, define and deploy a protected network architecture, and suggest procedures to optimize the security of your network. Progent's security professionals are available to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Learn more on Progent's automated security assessment.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small companies to receive an independent security assessment from a certified security expert. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to uncover potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your firewall to uncover vulnerabilities to inside threats. The two security inventory packages are set up and run from a secured remote location. The project is directed by an engineer who has earned high-level security accreditations and who generates a report that summarizes and analyzes the data captured by the security scan and suggests practical remediation where called for.
Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important component of any comprehensive network security strategy. Progentís security experts can perform thorough intrusion checks without the knowledge of your organization's internal IT staff. Stealth penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event history monitoring are correctly set up and actively monitored. Learn more about Progent's network penetration testing support services.
Firewall and Virtual Private Network Expertise
Progent's background in security technology includes extensive familiarity with major firewalls and VPN products from multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important industry accreditations including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower configuration and troubleshooting support.
Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection products provide a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Learn more details concerning Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right products from a variety of suppliers to achieve your security goals while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to automate the entire threat progression including filtering, identification, mitigation, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization experts can help your business to design and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also help you to install and test a backup and restore solution such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital files, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to recover your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to provide web-based management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hosting solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect data about your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains. By updating and organizing your IT documentation, you can eliminate as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Any company should have a carefully considered security strategy that includes both preventive procedures and reaction planning. The proactive strategy is a collection of mechanisms designed to reduce security weaknesses. The post-attack strategy assists your company's network security personnel to evaluate the damage resulting from an attack, fix the system, document the event, and get business functions restored as quickly as possible.
Progent's certified IS security engineers can to assist your company to perform a complete vulnerability assessment and define a computer security strategy to establish security policies and mechanisms to mitigate ongoing assaults and dangers.
CISM Certified Security Support Services
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of skill that IT security professionals are required to master. It provides business management the confidence that consultants who have earned their CISM certification possess the experience and capability to provide effective security administration and consulting consulting. Progent offers the expertise of CISM Premier security professionals to help businesses with:
Find out more details concerning Progent's CISM Qualified Security Engineering Professionals.
- Network Security Strategies
- Vulnerability Analysis
- Network Security Program Management
- Information Security Administration
- Recovery Management
CISSP Certified Security Engineering Assistance
CISSP certification denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has granted certification recognition in the area of data protection stipulated by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields including:
Learn additional information about Progent's CISSP-certified Information Security Consulting Expertise.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Technology
- Telecom, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have earned ISSAP status through thorough testing and extensive work with information security design. The ISSAP certification represents proven mastery in the more complex requirements of information security architecture bounded by the broader scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security including.
Read more information concerning Progent's ISSAP Certified Secure Network Architecture Consulting Expertise.
- Access Management Systems and Techniques
- Telecommunications and Network Infrastructure Security
- Data Encryption Options
- Requirements Evaluation and Security Standards
- BCP and DRP
- Physical Security
CISA Certified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA professional group. Progent's CISA-qualified network security audit specialists are available to assist your business with:
Get additional details about Progent's CISA Qualified Security Auditing Engineering Services.
- IS Audit Process
- IT Governance
- Network Assets and Infrastructure Planned Useful Life
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management engineers offer a variety of risk assessment services such as:
Get the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and review documentation to evaluate significant risk scenarios
- Identify legal, regulatory, and contractual requirements and organizational policies related to your information system to assess their possible influence on your strategic goals
- Point out possible vulnerabilities for your operational workflows to help in evaluating your enterprise risk
- Create a risk awareness program and provide seminars to ensure your stakeholders understand IT risk so they can assist with your risk management process
- Match key risk scenarios to your associated operational processes to help assign risk ownership
- Validate risk appetite with executive management and major stakeholders to make sure they match
GIAC Accredited IS Security Consulting Expertise
Learn additional information about Progent's GIAC Information Assurance Support.
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to assure that an accredited professional has the skills needed to provide services in key areas of system, information, and application software security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit engineers are available to assist your IT organization with:
Talk to a Security Specialist
To learn how you can access a certified Progent security engineer for online or on-premises support in Alaska, call 1-800-993-9400 or go to Online Network Help.