Business computer networks in the state ofAlaskacan now get fast and economical online access to Progent's certified security professionals to resolve critical security problems. The cost is reasonable, billing is by the minute, sign-up is quick, and support is world class. Progent also offers assistance for complex projects that requires the services of seasoned security engineers with top industry credentials.
In case yourAlaskanetwork is located far from major metropolitan areas such asAnchorage, Juneau, or Fairbanks, the availability of nearby accredited security professionals is often limited when you have an urgent situation. This can cause a drop in productivity for your business, upset clients, idle workers, and defocused executives. By utilizing Progent's online services, you can get in touch with a Certified security consultant ready to provide assistance when you require it to get your computer network operating and salvage your information.
Progent can help you in all your initiatives to guard your information system with support that can range from security audits to developing a comprehensive security plan. Progent provides affordable support to help small and midsize companies to set up and maintain protected networks based on Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of leading data security vendors to deliver web-based management and world-class security for your email traffic. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter.
Progent's security professionals are accessible online or in person to offer a variety of emergency or project-based computer security services such as:
If your company has an urgent need for IT security help, refer to Progent's Urgent Remote Network Help.
- Perform automated security audits
- Recover promptly after attacks
- Install and troubleshoot firewalls
- Configure secure techniques for remote and mobile connectivity
- Install effective solutions for automatic defense against spam and directory harvest attacks
- Help create a company-wide security plan with 24x7 monitoring
- Provide comprehensive Help Desk Support
- Create a practical network backup and recovery solution centered on System Center Data Protection Manager backup/restore capability
Progent's security experts provide advanced support in vital fields of system security including analysis, firewall and VPN solutions, and advanced security consulting.
System Security Evaluation
Progent's expert security consultants can assess the effectiveness of your current computer protection environment by performing comprehensive remote automated testing based on sophisticated software tools and proven techniques. Progent's skill in administering this testing saves you money and assures a detailed picture of weaknesses. The knowledge your business is provided can form the basis of a network protection strategy that can permit your information system to operate safely and adapt quickly to new threats.
Automated Vulnerability Evaluation
Progent provides expertise in the application of security auditing products including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a variety of programmed system testing scans to identify possible security vulnerabilities. Progent has broad experience with additional network analysis utilities such as NMAP, AMAP, eEye, plus utilities such as Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can help you design protection into your business processes, install auditing tools, define and deploy a secure system environment, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are available to show you how to set up a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's network security assessment.
Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory scanning packages designed to allow small companies to get a professional security assessment from a certified security expert. With Progent's External Security Inventory Scan, a security engineer runs an extensive examination of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert runs a system scan from an authorized machine within your company firewall to assess vulnerabilities to inside threats. Both security inventory packages are set up and run from a secured external location. The project is directed by an engineer with high-level security accreditations and who generates a document that summarizes and interprets the information captured by the scan and suggests practical remediation where appropriate.
Network Security Penetration Testing Support Services
Stealth intrusion checking is an important component of any comprehensive IT system security strategy. Progentís security professionals can run extensive penetration tests without the knowledge of your organization's internal IT staff. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion incident warnings and event history monitoring are properly configured and actively checked. Find out additional information on Progent's stealth penetration analysis support services.
Firewalls and VPN Support
Progent's expertise in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned key industry accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower integration and debugging support.
Cisco Network Security and VPN Engineering Services
Cisco's security and offsite access products provide a full range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Read more details concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Products.
Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and choose the right products from a variety of vendors to achieve your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the entire threat progression including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, device control, and web filtering via cutting-edge tools incorporated within a single agent managed from a single console. Progent's security and virtualization experts can assist your business to plan and implement a ProSight ESP environment that meets your company's specific needs and that helps you demonstrate compliance with legal and industry information protection standards. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate attention. Progent can also help you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup processes and allows rapid recovery of critical files, apps and VMs that have become lost or corrupted due to component failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can provide world-class expertise to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FINRA, and PCI and, whenever needed, can help you to restore your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security companies to provide centralized control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hosting solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard data related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can eliminate up to half of time thrown away looking for vital information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre planning improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Find out more about ProSight IT Asset Management service.
Expert Network Security Design
Any business should develop a thoroughly thought out security strategy that incorporates both proactive procedures and response planning. The pre-attack strategy is a collection of procedures intended to minimize security weaknesses. The post-attack plan assists your company's network security engineers to evaluate the damage caused by a security penetration, fix the damage, record the experience, and get business functions running as quickly as possible.
Progent's certified IS security consultants can to assist your business to perform a full risk evaluation and create a network security strategy to establish security policies and controls to minimize future attacks and dangers.
CISM Certified System Security Engineering Assistance
The Certified Information Security Manager (CISM) organization describes the basic competencies and worldwide standards of performance that information security professionals are required to master. It provides business management the assurance that those who have qualified for their CISM certification possess the background and knowledge to deliver effective security management and support consulting. Progent offers the expertise of CISM Certified security consultants to help companies with:
Learn additional information about Progent's CISM Accredited Information Security Consulting Professionals.
- IS Security Strategies
- Vulnerability Analysis
- Network Security Program Management
- IS Security Management
- Response Management
CISSP Accredited Security Engineering Support
CISSP certification recognizes expertise with a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data protection stipulated by ISO 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields such as:
Read additional details about Progent's CISSP Accredited Information Security Consulting Expertise.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure System Architecture Consulting Services
Progent's CISSP-ISSAP Certified IT architecture professionals are experts who have been awarded ISSAP Certification through rigorous examination and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most in-depth demands of IS security architecture bounded by the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture including.
Learn additional details about Progent's ISSAP Certified Secure Information System Architecture Support Professionals.
- Access Management Systems and Methodologies
- Telecom and Network Infrastructure Protection
- Cryptography Solutions
- Needs Evaluation and Security Guidelines
- BCP and DRP
- Hardware Security
CISA Qualified Security Auditing Consulting Assistance
The CISA credential is a globally recognized qualification that indicates expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential has candidates pass an extensive examination given by the ISACA international professional association. Progent's CISA-qualified IS security audit engineers can assist your business with:
Read more information concerning Progent's CISA Certified Security Auditing Consulting Services.
- Information Systems Audit Process
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle Planning
- IT Support
- Safeguarding Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's ability to plan, implement, and maintain information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity plan that follows leading practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation specialists can provide a variety of risk identification services such as:
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and study documentation to evaluate major risk scenarios
- Inventory statutory, regulatory, and contractual mandates and company policies associated with your network to determine their potential impact on your strategic goals
- Identify possible threats for your operational processes to assist in analyzing your enterprise risk
- Create a risk awareness program and provide seminars to ensure your stakeholders understand information system risk so they can contribute to your risk management program
- Match key risk vectors to your associated business procedures to help determine risk responsibility
- Validate risk appetite with executive management and major stakeholders to ensure they match
GIAC Accredited Information System Security Engineering Assistance
Read more details concerning Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to assure that an accredited security consultant possesses the knowledge needed to provide services in vital categories of network, data, and program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC-certified security audit specialists can assist your IT organization with:
Contact a Certified Progent Security Expert
To find out how to get in touch with a certified Progent security engineer for remote or on-premises assistance in Alaska, call 1-800-993-9400 or go to Online Network Support.