Business computer networks in the state ofAlaskacan now get quick and economical remote help from Progent's accredited network security support specialists to resolve urgent security issues. The cost is competitive, charges are per minute, sign-up is immediate, and support is unbeatable. Progent also provides help for long-term engagements that requires the expertise of seasoned security engineers with high-level industry certifications.
In case yourAlaskaorganization is based far from more populated urban areas likeAnchorage, Juneau, or Fairbanks, contact with nearby accredited security consultants is often limited when you have a crisis. This can cause lost revenue for your company, angry customers, unproductive workers, and defocused management. By contacting Progent, you can get in touch with a Certified security consultant ready to offer assistance when you have to have it to keep your information system on line and recover your information.
Progent can help you in your efforts to guard your information system with support that ranges from security audits to creating a company-wide security strategy. Progent offers affordable support to help businesses of all sizes to design and manage protected networks powered by Windows and Cisco technology and that can include servers and desktops running UNIX or Linux operating systems plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security companies to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further layer of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.
Progent's certified consultants are accessible online or on premises to offer a range of urgent or longer-term IT security services such as:
If your business has an urgent requirement for IT security help, refer to Progent's Urgent Remote Network Help.
Progent's engineers offer advanced services in vital fields of system security that include auditing, firewall and VPN expertise, and high-level security consulting.
Progent's expert security consultants can evaluate the vulnerability of your current network protection environment through exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's experience in this service saves your company time and money and offers an objective picture of weaknesses. The information your business gains can form the foundation of a security plan that can permit your network to operate dependably and adapt rapidly to new threats.
Automated Network Vulnerability Audits
Progent offers expertise in the use of security evaluation packages including MBSA and LANguard from GFI for economically performing a set of automatic network auditing checks to uncover potential security problems. Progent has broad knowledge of other network auditing utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.
Progent can help you design protection into your company processes, install auditing applications, define and implement a secure network environment, and recommend policies to maximize the safety of your network. Progent's security engineers are able to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out additional information about Progent's network security evaluation.
Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to enable small companies to get an independent network security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from outside your company firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine within your company firewall to determine your exposure to inside attacks. The two security inventory packages are configured and run from a secured remote location. The process is directed by an engineer with high-level security credentials and who generates a report that details and analyzes the data captured by the security scan and suggests practical improvements where called for.
Network Penetration Analysis Consulting
Stealth penetration checking is an important component of any successful network security strategy. Progentís security experts can perform extensive intrusion tests without the knowledge of your company's internal network support resources. Stealth penetration testing shows whether existing security monitoring tools such as intrusion detection alerts and event history analysis are correctly configured and actively checked. Find out more concerning Progent's stealth security penetration testing support services.
Firewalls and VPN Solutions
Progent's expertise in security technology includes extensive familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with key networking accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your current PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Security and VPN Support Services
Cisco's network security and remote connection technology provide a comprehensive line of manageable security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business objectives. Learn additional information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.
Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWall. Progent can show you how to create a detailed security plan and select the right products from a variety of suppliers to achieve your security goals while sticking within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based machine learning tools to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely escape legacy signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to manage the complete malware attack lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies packaged within a single agent accessible from a single control. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP environment that meets your company's unique requirements and that helps you prove compliance with government and industry data protection standards. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent action. Progent's consultants can also help your company to set up and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of vital data, applications and VMs that have become lost or damaged due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide world-class support to set up ProSight DPS to be compliant with regulatory requirements such as HIPAA, FIRPA, and PCI and, when necessary, can assist you to recover your critical data. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading information security vendors to deliver web-based control and world-class protection for all your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of inspection for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported immediately to an alternate hardware solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or domains. By updating and managing your IT infrastructure documentation, you can save up to half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Consulting
Any business should have a thoroughly thought out security strategy that incorporates both proactive procedures and response plans. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The post-attack plan helps your company's network security engineers to assess the impact caused by an attack, repair the damage, record the event, and get the IT network restored as rapidly as feasible.
Progent's expert information security consultants are available to help your business to perform a complete vulnerability assessment and define a network security plan to implement security processes and controls to minimize ongoing attacks and threats.
CISM Accredited Security Support Services
The CISM committee defines the core competencies and worldwide standards of performance that IT security professionals are required to learn. It gives business management the confidence that consultants who have qualified for their CISM credential possess the background and capability to deliver effective security administration and support consulting. Progent offers the expertise of CISM Premier security professionals to help businesses with:
Read additional information concerning Progent's CISM Qualified Information Security Consulting Services.
- IS Security Strategies
- Risk Analysis
- IS Security Program Management
- Network Security Administration
- Recovery Management
CISSP Qualified Security Consulting Assistance
CISSP certification recognizes mastery of a global standard for data security. ANSI has granted the CISSP credential recognition in the area of data security stipulated by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your company in a broad range of security areas including:
Learn more details about Progent's CISSP-certified Information Security Support Professionals.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Technology
- Telecom, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure Information System Architecture Consulting Services
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the most in-depth demands of information security architecture bounded by the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all phases of architecture security such as.
Find out additional details concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.
- Access Control Systems and Techniques
- Phone System and Network Infrastructure Security
- Data Encryption Options
- Requirements Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Certified Information System Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that represents expertise in IS security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA international professional group. Progent's CISA-certified security audit consultants are available to assist your IT organization in the areas of:
Get additional information about Progent's CISA Qualified IS Security Auditing Consulting Assistance.
- Information Systems Audit Process
- IT Governance
- Network Assets and Architecture Lifecycle Planning
- Information Technology Service Delivery
- Safeguarding Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to validate a consultant's ability to plan, deploy, and maintain IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and execute a workplace continuity plan based on industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation consultants offer a range of risk assessment services such as:
Read more details concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to identify significant risk scenarios
- Identify statutory, regulatory, and contractual mandates and organizational standards related to your network to assess their possible influence on your business goals
- Point out potential threats for your business processes to help in analyzing your enterprise risk
- Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IT risk so they can assist with your risk management process
- Connect key risk scenarios to your associated business processes to help determine risk responsibility
- Validate risk appetite with executive management and major stakeholders to ensure they are in agreement
GIAC Qualified Security Consulting Services
Global Information Assurance Certification was established in 1999 to validate the knowledge of network security professionals. GIAC's mission is to make sure that an accredited professional has the knowledge necessary to provide support in vital categories of network, information, and application program security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit engineers are available to help your IT organization with:
Learn more details concerning Progent's GIAC Information Assurance Services.
- Auditing Security Systems
- Incident Handling
- Traffic Analysis
- Web Services Security
- SIEM solutions
Talk to a Certified Security Engineer
To see how you can access a Progent security engineer for remote or on-premises assistance in Alaska, call 1-800-993-9400 or go to Remote Network Help.