Company networks in Alaska can have quick and economical online access to Progent's qualified security consultants to fix urgent security problems. The cost is affordable, billing is by the minute, engagement is quick, and support is world class. Progent also provides help for complex engagements that demand the expertise of senior security engineers with top industry certifications.
In case your Alaska small business is located some distance from larger metropolitan areas like Anchorage, Juneau, or Fairbanks, the availability of nearby certified security consultants is often problematic when you have a crisis. This can result in a loss of productivity for your company, upset customers, idle employees, and defocused management. By contacting Progent's online services, you have access to a Premier security engineer ready to deliver help when you need it to keep your information system on line and restore your data.
Progent can assist you in a variety of ways in your efforts to guard your information system with support ranging from security checks to creating a comprehensive security strategy. Progent provides affordable support to assist companies of any size to set up and manage protected IT environments powered by Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.
Ransomware Hot Line: 800-462-8800
Progent's Ransomware Hot Line is designed to assist organizations to carry out the urgent first phase in mitigating a ransomware attack by putting out the fire. Progent's online ransomware experts can assist you to locate and isolate breached devices and guard clean assets from being penetrated.
If your network has been breached by any version of ransomware, act fast. Get help quickly by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.
Overview of Progent's Security Services
Progent can help you outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to deliver centralized management and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a further layer of inspection for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The onsite security gateway can also enable Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.
Progent's certified experts are accessible remotely or in person to offer a range of urgent or project-based network security services including:
Progent's support professionals offer advanced services in vital facets of network security including security assessment, firewall and VPN expertise, and advanced security consulting.
Security Assessment
Progent's certified security consultants can assess the vulnerability of your existing network security systems through exhaustive remote automated analysis via advanced software tools and proven procedures. Progent's skill in this testing saves your company time and money and assures an accurate portrayal of gaps. The information your company is provided can be used as the foundation of a network protection strategy that will allow your network to operate dependably and react rapidly to new threats.
Automated Network Vulnerability Assessment
Progent provides expertise in the use of security evaluation products such as Microsoft's MBSA and GFI LANguard for economically performing a variety of automatic system testing scans to identify possible security vulnerabilities. Progent has broad knowledge of additional network analysis products including NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and respond appropriately.
Progent can show you how to design security into your company operations, configure scanning tools, define and deploy a secure system environment, and suggest policies to maximize the security of your network. Progent's security professionals are available to assist you to configure a firewall, implement safe remote connectivity to email and data, and install VPN. Learn additional information concerning Progent's network security assessment.
Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles intended to enable small companies to receive a professional network security evaluation from a certified security expert. With Progent's External Network Security Inventory Scan, a security expert runs an extensive examination of your network from outside your firewall to determine potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from an authorized machine within your firewall to determine your exposure to inside attacks. The two security inventory packages are configured and run from a protected external site. The process is managed by an engineer who has earned high-level security accreditations and who produces a report that details and analyzes the information collected by the security scan and proposes cost-effective improvements where called for.
Support for Horizon3.ai's NodeZero PEN Testing Solutions
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that supports continuous, simultaneous, automated testing of your network to help you identify, prioritize, remediate, and confirm cybersecurity weaknesses before threat actors can exploit them. Progent can help you to use NodeZero to carry out thorough pentests of your perimeter and your internal network so you can determine your present security posture. Progent's NodeZero experts can also assist you to strengthen your network security and can assist you to plan and implement a cohesive cybersecurity strategy that streamlines management and provides optimum protection for on-premises, multi-cloud, and perimeter IT assets. To learn additional details about Progent's threat assessment solutions based on on NodeZero's penetration test products, visit Consulting Support for NodeZero's PEN Test Products.
Network Penetration Testing Support Services
Stealth intrusion testing is an important part of any comprehensive network security plan. Progent's security professionals can run extensive penetration tests without the knowledge of your organization's internal network support resources. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident alerts and event log analysis are properly set up and actively monitored. Find out more about Progent's network security penetration analysis support services.
Firewall/VPN Solutions
Progent's expertise in network security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology from multiple companies such as Cisco, Microsoft, CheckPoint and Watch Guard. Progent can provide the support of consultants with key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection technology represent a complete range of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Find out additional information about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security plan and choose appropriate technologies from multiple suppliers to achieve your security objectives while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes SentinelOne's cutting edge behavior machine learning technology to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which routinely evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to address the entire threat progression including blocking, identification, mitigation, cleanup, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Progent is a SentinelOne Partner, reseller, and integrator. Find out more about Progent's
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer affordable in-depth protection for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device management, and web filtering via leading-edge tools packaged within one agent accessible from a single console. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of critical data, applications and virtual machines that have become lost or damaged due to hardware failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory requirements like HIPAA, FINRA, and PCI and, whenever necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security companies to provide web-based management and world-class protection for all your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most threats from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's IT support experts. With the ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can eliminate as much as half of time thrown away trying to find critical information about your network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether you're making enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any company should develop a carefully considered security program that includes both proactive processes and response plans. The proactive plan is a collection of procedures that help to reduce vulnerabilities. The post-attack plan helps your network security engineers to assess the damage caused by a security penetration, fix the system, record the experience, and get the IT network running as quickly as feasible.
Progent's certified information security engineers can to help your company to run a full risk evaluation and define a computer security plan to implement security processes and controls to reduce ongoing assaults and dangers.
CISM Certified Information Security Consulting Assistance
The CISM committee describes the basic competencies and international standards of skill that information security managers are required to learn. It provides executive management the assurance that consultants who have earned their CISM credential possess the background and capability to deliver efficient security administration and support consulting. Progent offers the services of CISM Premier security consultants to help businesses with:
CISSP Qualified Security Engineering Support
The CISSP credential denotes mastery of a global standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data security under ISO 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields such as:
CISSP-ISSAP Certified Secure Information System Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have earned ISSAP status through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most challenging demands of IS security architecture within the wider scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.
CISA Accredited Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a globally recognized achievement that signifies mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates pass a comprehensive test administered by the ISACA international professional group. Progent's CISA-certified information security audit specialists can help your company with:
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate an IT professional's ability to design, deploy, and support information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and carry out a business continuity plan based on leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC IT risk mitigation engineers can provide a range of risk identification services such as:
GIAC Accredited Network Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security experts. GIAC's mission is to ensure that a certified security consultant has the skills needed to deliver services in vital areas of network, information, and software security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit experts can help your business in the areas of:
Talk to a Certified Progent Security Engineer
To see how you can get in touch with a certified Progent security engineer for remote or on-premises assistance in Alaska, call