Small business computer networks in the state of Alaska can now get prompt and economical online access to Progent's qualified security professionals to help with critical security problems. The cost is reasonable, billing is per minute, sign-up is immediate, and support is world class. Progent also offers help for long-term projects that demand the services of senior security consultants with high-level security certifications.
If your Alaska company is situated away from major metropolitan areas like Anchorage, Juneau, or Fairbanks, support from nearby accredited security support specialists is often limited when there's a crisis. This could mean lost income for your business, angry clients, unproductive workers, and distracted executives. By utilizing Progent's online services, you have access to a Premier security engineer who can deliver expertise whenever you need it to get your network operating and restore your data.
Progent can assist you at any level in your initiatives to protect your network with support that can range from network security checks to developing a comprehensive security strategy. Progent provides affordable service to assist companies of any size to design and manage secure IT environments powered by Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone devices.
Ransomware Hot Line: 800-462-8800
Progent's Ransomware Hot Line is intended to assist you to complete the time-critical first phase in responding to a ransomware assault by containing the malware. Progent's online ransomware experts can help you to identify and isolate breached devices and guard clean resources from being penetrated.
If your system has been breached by any version of ransomware, act fast. Get help quickly by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.
Overview of Progent's IT Security Services
Progent can help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver centralized management and comprehensive protection for your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email traffic that stays within your corporate firewall.
Progent's certified professionals are available remotely or on premises to provide a variety of emergency or longer-term IT security services which include:
Progent's support professionals offer world-class support in key areas of computer protection that include security assessment, firewall/VPN support, and advanced security consulting.
System Security Evaluation
Progent's expert security consultants can assess the effectiveness of your existing network security systems through exhaustive remote automated analysis via advanced software tools and tested procedures. Progent's experience in this testing saves your company time and money and offers an accurate picture of gaps. The knowledge your business gains can make up the basis of a network protection strategy that can permit your network to run safely and respond quickly to future threats.
Automated Vulnerability Audits
Progent provides expertise in the application of security evaluation utilities including Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a variety of automatic system auditing checks to uncover potential security problems. Progent has broad knowledge of additional network analysis tools including NMAP, AMAP Application Scanner, eEye, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.
Progent can help you design security into your business processes, configure scanning applications, define and deploy a secure network environment, and suggest procedures to optimize the security of your network. Progent's security consultants are able to assist you to set up a firewall, design safe remote access to email and data, and integrate virtual private network. Learn additional information on Progent's network security analysis.
Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory scanning packages intended to allow small businesses to receive an objective security assessment from a qualified security specialist. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your network from beyond your firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a network scan from an authorized machine within your company firewall to evaluate vulnerabilities to internal assaults. The two security inventory services are configured and executed from a secured remote location. The project is directed by an engineer with top security credentials and who generates a report that details and interprets the information collected by the security scan and proposes cost-effective remediation if appropriate.
Expertise with Horizon3.ai's NodeZero Security Assessment Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that supports continuous, simultaneous, automated assessment of your internal and perimeter network to help you find, prioritize, remediate, and verify cybersecurity vulnerabilities before threat actors can exploit them. Progent's pentest experts can assist you to deploy NodeZero to perform thorough penetration tests of your network perimeter and your internal IT infrastructure so you can determine your current security posture. Progent's NodeZero experts can also assist you to strengthen your network security and can help you to plan and implement a cohesive cybersecurity ecosystem that simplifies management and provides optimum protection for on-premises, multi-cloud, and perimeter IT assets. To learn additional details about Progent's vulnerability assessment services based on on NodeZero's PEN test platform, visit Consulting Services for NodeZero's PEN Test Platform.
Network Intrusion Testing Support Services
Stealth intrusion testing is a key component of any comprehensive IT system security plan. Progent's security professionals can run thorough intrusion tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event log monitoring are correctly set up and consistently monitored. Learn more about Progent's network security penetration testing consulting.
Firewall and Virtual Private Network Solutions
Progent's expertise in security technology encompasses extensive familiarity with leading firewalls and VPN products from multiple companies such as Cisco, Microsoft, CheckPoint and Watch Guard. Progent can provide the services of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The new ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote connection products represent a full line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Find out more information concerning Progent's Consulting Services for Cisco Security and VPN Products.
Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and SonicWall. Progent can show you how to design a comprehensive security strategy and choose the right technologies from a variety of vendors to achieve your security goals while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates SentinelOne's cutting edge behavior machine learning tools to defend endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to manage the entire threat progression including filtering, identification, mitigation, remediation, and post-attack forensics. Key features include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered threats. Progent is a SentinelOne Partner, dealer, and integrator. Learn more about Progent's
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge technologies packaged within one agent accessible from a single console. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's unique needs and that allows you prove compliance with government and industry information security standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require immediate attention. Progent can also help your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Find out more about Progent's
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical files, applications and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced support to configure ProSight DPS to to comply with regulatory requirements like HIPAA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical data. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to deliver centralized control and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a further layer of analysis for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved immediately to a different hardware environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect data about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether you're making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Certified Security Consulting
Every business should have a thoroughly considered security program that includes both proactive processes and response planning. The proactive strategy is a set of procedures designed to reduce vulnerabilities. The reactive strategy helps your company's IT security personnel to assess the impact resulting from a security penetration, repair the damage, document the experience, and get the IT network operational as quickly as possible.
Progent's expert IS security consultants can to help you to perform a complete vulnerability evaluation and create a company-wide security plan to implement security processes and mechanisms to reduce future assaults and threats.
CISM Qualified Information Security Engineering Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and worldwide standards of performance that information security professionals are required to master. CISM provides executive management the assurance that those who have qualified for their CISM credential possess the background and capability to deliver efficient security management and consulting services. Progent can provide the services of CISM Premier security consultants to help companies with:
CISSP Accredited Security Consulting Expertise
The CISSP credential denotes expertise with an international standard for network security. ANSI has awarded certification accreditation in the area of information protection stipulated by ISO 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a variety security areas such as:
CISSP-ISSAP Accredited Secure Network Architecture Engineering Support
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough testing and significant experience with network security design. The ISSAP certification represents demonstrated mastery in the more in-depth demands of information system security architecture bounded by the broader scope of IS security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.
CISA Accredited Security Auditing Engineering Services
The CISA accreditation is a recognized achievement that signifies mastery in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-certified information security audit specialists can help your IT organization in the areas of:
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to plan, implement, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and carry out a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk management specialists can provide a variety of risk identification services such as:
GIAC Qualified IS Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of information technology security experts. GIAC's mission is to ensure that an accredited security consultant possesses the skills needed to deliver services in key categories of network, data, and application security. GIAC certifications are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified network security audit experts can help your company in the areas of:
Contact a Certified Security Engineer
To find out how you can contact a certified security engineer for remote or on-premises assistance in Alaska, call