Business information networks inAlaskacan have prompt and affordable online access to Progent's accredited security consultants to fix urgent security issues. The cost is reasonable, billing is by the minute, engagement is quick, and service is unbeatable. Progent also provides help for long-term projects that demand the knowledge of senior security engineers with high-level industry credentials.
If yourAlaskabusiness is far from more populated urban areas includingAnchorage, Juneau, or Fairbanks, access to nearby accredited network security engineers is often limited during a crisis. This could mean a drop in revenue for your company, angry clients, idle employees, and distracted executives. By utilizing Progent's remote support, you have access to a Certified security consultant ready to provide assistance when you need it to keep your information system operating and recover your data.
Progent can assist you in your initiatives to protect your information system with support ranging from network security audits to developing a company-wide security plan. Progent offers affordable support to help businesses of all sizes to configure and manage secure networks based on Windows and Cisco products and that may include computers running UNIX or Linux platforms as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security vendors to deliver centralized management and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a deeper level of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter.
Progent's certified professionals are available online or in person to offer a range of emergency or project-based computer security services which include:
If your network has an urgent requirement for computer security help, go to Progent's Emergency Remote Technical Help.
Progent's engineers can deliver advanced services in vital fields of computer protection including analysis, firewall and VPN solutions, and high-level security planning.
Progent's expert security consultants can evaluate the vulnerability of your existing computer security implementation by performing exhaustive remote automated testing based on advanced software tools and tested procedures. Progent's experience in administering this testing saves your company consulting fees and offers an objective portrayal of weaknesses. The information your IT organization is provided can form the foundation of a security strategy that will permit your information system to run safely and adapt rapidly to future risks.
Automated Security Assessment
Progent offers consulting in the use of security analysis packages such as Microsoft's MBSA and GFI LANguard for affordably performing a variety of programmed system testing checks to identify possible security weaknesses. Progent has extensive knowledge of additional network auditing tools such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and react appropriately.
Progent can show you how to design security into your company operations, install scanning tools, plan and implement a protected network architecture, and suggest policies to optimize the safety of your network. Progent's security engineers are able to show you how to configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Find out additional information about Progent's network security assessment.
Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory packages designed to enable small companies to receive an objective security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive test of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from an authorized machine within your firewall to assess your exposure to internal threats. The two security inventory services are set up and run from a secured remote location. The process is overseen by an engineer who has earned high-level security accreditations and who produces a document that summarizes and analyzes the information collected by the scan and proposes cost-effective remediation if appropriate.
Stealth Penetration Testing Support Services
Stealth penetration testing is an important part of any serious network security strategy. Progentís security experts can perform extensive penetration tests without the awareness of your organization's in-house IT resources. Stealth penetration checking shows whether current security defense systems such as intrusion incident alerts and event log analysis are correctly configured and consistently checked. Learn more on Progent's stealth security penetration analysis consulting.
Firewalls and VPN Solutions
Progent's background in network security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants with important networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to manage your legacy PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access technology represent a comprehensive range of manageable security products to help protect your wired and wireless information system. Cisco's VPN line features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business objectives. Learn more details about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Products.
Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and choose the right technologies from a variety of suppliers to support your security objectives while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a single platform to address the complete malware attack progression including protection, infiltration detection, mitigation, cleanup, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools packaged within one agent accessible from a unified control. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that allows you prove compliance with government and industry data security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also help you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical files, apps and VMs that have become unavailable or damaged due to component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced expertise to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading information security vendors to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By updating and managing your network documentation, you can save as much as half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether youíre making enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more details about ProSight IT Asset Management service.
Certified Network Security Consulting
Any company ought to develop a thoroughly thought out security program that includes both proactive procedures and response planning. The proactive plan is a collection of procedures designed to reduce security weaknesses. The reactive plan helps your network security personnel to evaluate the impact caused by an attack, fix the damage, document the experience, and get business functions operational as quickly as feasible.
Progent's expert information security consultants can to help your company to perform a full risk assessment and define a company-wide security plan to implement security policies and mechanisms to reduce ongoing attacks and threats.
CISM Accredited Network Security Support Services
The Certified Information Security Manager (CISM) organization defines the core capabilities and global standards of performance that information security managers are required to learn. CISM gives executive management the assurance that consultants who have qualified for their CISM credential have the experience and capability to provide efficient security management and consulting consulting. Progent offers the services of CISM Premier security consultants to help companies with:
Learn more information concerning Progent's CISM Accredited IS Security Consulting Expertise.
- Information Security Strategies
- Vulnerability Management
- IS Security Program Management
- Information Security Administration
- Response Planning
CISSP Certified Security Consulting Expertise
CISSP certification denotes expertise with a global standard for data security. The American National Standards Institute has awarded certification accreditation in the field of information protection stipulated by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields including:
Learn more information concerning Progent's CISSP Network Security Consulting Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Management Systems and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have been awarded ISSAP Certification through thorough testing and significant work with network security design. The ISSAP certification represents proven skill in the most in-depth requirements of information security architecture within the broader field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all aspects of architecture security including.
Read additional details about Progent's ISSAP Accredited Secure Network Architecture Engineering Expertise.
- Access Control Mechanisms and Techniques
- Telecom and Network Security
- Data Encryption Options
- Requirements Analysis and Security Guidelines
- BCP and DRP
- Site Security
CISA Accredited Network Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates mastery in IS security audit and control. Certified by ANSI, the CISA credential has candidates undergo an extensive test given by the ISACA professional association. Progent's CISA-certified IS security audit consultants are available to assist your business in the areas of:
Read more information about Progent's CISA Qualified Network Security Auditing Consulting Support.
- Information Systems Audit Process
- Information Technology Administration
- Network Assets and Architecture Lifecycle Planning
- IT Support
- Safeguarding Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify an IT professional's skills to plan, deploy, and maintain IS controls to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists can provide a range of risk identification services such as:
Read additional information about Progent's CRISC Risk Management Experts.
- Gather information and study documentation to evaluate major risk scenarios
- Inventory statutory, industry, and business requirements and company policies related to your information system to assess their possible impact on your business objectives
- Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
- Create a risk awareness program and conduct seminars to make sure your stakeholders understand information system risk so they can contribute to your risk management process
- Match identified risk vectors to your associated business procedures to help determine risk responsibility
- Determine risk tolerance with your senior management and major stakeholders to make sure they match
GIAC Qualified Information System Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security experts. GIAC's mission is to ensure that an accredited security consultant has the skills appropriate to deliver services in critical categories of system, information, and software security. GIAC certifications are recognized by businesses and institutions all over the world including and the United States National Security Agency. Progent's GIAC-certified network security audit engineers are available to help your business in the areas of:
Find out more information concerning Progent's GIAC Information Assurance Expertise.
- Auditing IT Infrastructure
- Security Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Contact a Security Expert
To find out how to contact a security engineer for online or onsite support in Alaska, phone 1-800-993-9400 or visit Remote Network Help.