Business IT networks in the state of Alaska can depend on fast and economical online help from Progent's certified security professionals to resolve urgent security issues. Rates are reasonable, charges are by the minute, sign-up is quick, and service is unbeatable. Progent also provides assistance for complex projects that requires the knowledge of senior security engineers with high-level industry certifications.
In case your Alaska organization is located some distance from larger urban neighborhoods such as Anchorage, Juneau, or Fairbanks, contact with local certified network security consultants is often limited when you have an urgent situation. This can result in lost productivity for your company, angry customers, idle employees, and defocused executives. By calling Progent, you can get in touch with a Certified security engineer ready to deliver help whenever you have to have it to keep your network running and recover your data.
Progent can assist you in a variety of ways in your efforts to protect your IT environment with support services ranging from security audits to developing a comprehensive security plan. Progent provides economical support to assist businesses of all sizes to set up and maintain safe networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security companies to deliver web-based management and comprehensive protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.
Progent's certified consultants are accessible remotely or in person to offer a variety of emergency or project-based computer security services including:
If your network has an immediate requirement for computer security help, refer to Progent's Emergency Online Technical Help.
- Run comprehensive security evaluations
- Recuperate rapidly after serious security breaches
- Install firewalls from multiple vendors
- Implement safe techniques for offsite and mobile connectivity
- Install advanced software for protection against spam and DHAs
- Develop a company-wide security strategy with proactive security monitoring
- Offer outsourced Call Center Services
- Help Develop an effective network backup and restore strategy based on Data Protection Manager backup technology
Progent's security experts provide advanced services in vital facets of computer security including analysis, firewall/VPN support, and advanced security planning.
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection systems by performing exhaustive remote automated analysis based on advanced utilities and proven procedures. Progent's skill in administering this service saves your company time and money and offers an accurate picture of system vulnerability. The knowledge your business gains can be used as the basis of a security strategy that can allow your information system to run dependably and respond rapidly to new threats.
Automated Network Security Assessment
Progent provides expertise in the application of security auditing utilities including MBSA and GFI LANguard for economically running a set of programmed system auditing scans to identify possible security weaknesses. Progent has extensive knowledge of other security analysis utilities including NMAP, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react appropriately.
Progent can help you build security into your company processes, configure scanning applications, define and implement a protected network environment, and recommend procedures to maximize the safety of your network. Progent's security consultants are able to help you configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Learn additional information on Progent's network security assessment.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles designed to enable small businesses to receive an objective network security assessment from a certified security consultant. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive test of your IT infrastructure from beyond your firewall to uncover possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized computer inside your firewall to evaluate the risk to internal assaults. Both security inventory packages are configured and executed from a secured remote site. The project is directed by an engineer with top security credentials and who produces a document that summarizes and interprets the information collected by the security scan and proposes practical improvements if called for.
Network Penetration Analysis Consulting
Stealth penetration testing is an important part of any successful network security strategy. Progentís security experts can run thorough penetration checks without the knowledge of your organization's internal IT resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log monitoring are properly configured and consistently checked. Find out additional information on Progent's network security penetration testing support services.
Progent's background in network security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help your company to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA 5500-X Firewalls with Firepower configuration and debugging support.
Cisco Network Security and VPN Support Expertise
Cisco's network security and offsite access technology represent a full range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Read additional details about Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select appropriate products from a variety of vendors to achieve your security objectives while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to guard endpoint devices as well as servers and VMs against modern malware assaults like ransomware and email phishing, which easily get by traditional signature-matching anti-virus products. ProSight ASM safeguards local and cloud-based resources and provides a single platform to manage the complete threat lifecycle including filtering, identification, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection services offer economical in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge tools incorporated within a single agent managed from a single console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your organization's specific requirements and that allows you prove compliance with legal and industry information protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require urgent action. Progent can also assist you to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates your backup activities and enables fast recovery of vital files, applications and VMs that have become unavailable or damaged as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security vendors to deliver centralized management and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be ported easily to an alternate hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard information related to your network infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate up to half of time spent searching for vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Planning
Every business ought to have a thoroughly considered security program that includes both preventive processes and response planning. The proactive plan is a set of procedures intended to reduce vulnerabilities. The reactive plan helps your company's security engineers to evaluate the impact resulting from a security penetration, repair the network, record the event, and get business functions operational as rapidly as possible.
Progent's expert IT security consultants are available to help you to run a comprehensive vulnerability evaluation and create a company-wide security plan to implement security policies and controls to minimize future assaults and threats.
CISM Accredited System Security Support Expertise
The CISM organization describes the basic competencies and worldwide standards of skill that IT security professionals are required to learn. It gives business management the assurance that those who have qualified for their CISM certification possess the background and knowledge to deliver efficient security management and support services. Progent offers the support of CISM Certified security professionals to help businesses with:
Learn additional information concerning Progent's CISM Network Security Support Services.
- Information Security Strategies
- Vulnerability Analysis
- IS Security Implementation Management
- Information Security Management
- Response Planning
CISSP Qualified Security Engineering Expertise
CISSP recognizes mastery of an international standard for network security. ANSI has granted the CISSP credential accreditation in the area of data security stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields such as:
Read additional information about Progent's CISSP Cybersecurity Support Expertise.
- Security Management Procedures
- Security Infrastructure and Models
- Access Management Systems and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Technology
- Telecommunications, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure Network Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier system architecture engineers are experts who have earned ISSAP Certification through thorough examination and significant experience with network security design. The ISSAP credential indicates demonstrated skill in the more complex demands of IS security architecture bounded by the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of architecture security including.
Read additional details about Progent's ISSAP Accredited Secure Information System Architecture Engineering Professionals.
- Access Management Mechanisms and Methodologies
- Telecom and Network Protection
- Encryption/Decryption Options
- Needs Analysis and Security Criteria
- Business Continuity Planning and DRP
- Hardware Security
CISA Certified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a globally recognized achievement that represents expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo an extensive test administered by the ISACA professional group. Progent's CISA-certified security audit engineers are available to help your business in the areas of:
Read more information about Progent's CISA Qualified Security Auditing Consulting Services.
- IS Audit Services
- IT Enforcement
- Systems and Architecture Lifecycle Planning
- Information Technology Support
- Safeguarding Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's ability to design, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to create and carry out a business continuity plan that follows leading practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC network risk management engineers offer a variety of risk assessment services including:
Read additional details concerning Progent's CRISC Risk Management Consultants.
- Collect information and study documentation to evaluate major vulnerabilities
- Inventory legal, industry, and business mandates and company standards associated with your information system to assess their potential influence on your strategic goals
- Point out possible threats for your operational workflows to help in analyzing your enterprise risk
- Develop a risk awareness initiative and provide training to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
- Connect key risk vectors to related operational processes to help assign risk ownership
- Validate risk tolerance with your senior leadership and key stakeholders to make sure they match
GIAC Accredited Information System Security Engineering Expertise
Learn additional information concerning Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge appropriate to provide services in critical areas of system, information, and program security. GIAC certifications are acknowledged by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC security audit engineers are available to help your business with:
Contact a Progent Security Specialist
To see how to contact a Progent security engineer for online or on-premises assistance in Alaska, phone 1-800-993-9400 or visit Online Computer Support.