Company computer networks inAlaskacan now get prompt and affordable online technical support from Progent's certified security experts to resolve the toughest security issues. Rates are affordable, billing is by the minute, sign-up is fast, and service is world class. Progent also offers assistance for complex projects that requires the knowledge of seasoned security consultants with high-level industry certifications.
If yourAlaskanetwork is far from major urban neighborhoods such asAnchorage, Juneau, or Fairbanks, help from local accredited network security consultants may be problematic when there's a security disaster. This could mean a drop in revenue for your business, upset clients, idle workers, and defocused executives. By utilizing Progent's remote support, you can get in touch with a Certified security engineer who can offer help whenever you have to have it to get your computer network operating and restore your data.
Progent can help you at any level in your initiatives to defend your IT environment with support services ranging from security checks to creating a company-wide security plan. Progent provides economical support to help companies of any size to configure and maintain safe IT environments powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security companies to provide web-based control and world-class security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further level of analysis for inbound email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter.
Progent's certified consultants are available remotely or in person to offer a variety of emergency or longer-term IT security services such as:
If your network has an immediate requirement for computer security help, refer to Progent's Emergency Remote Technical Help.
Progent's consultants can deliver world-class services in key areas of network security including security assessment, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can assess the vulnerability of your existing computer protection environment by performing comprehensive remote automated analysis via advanced utilities and proven procedures. Progent's skill in administering this service saves you money and offers an objective picture of weaknesses. The information your IT organization gains can be used as the foundation of a security plan that will allow your network to operate dependably and respond rapidly to new threats.
Automated Network Vulnerability Assessment
Progent provides consulting in the use of security evaluation products such as MBSA and LANguard from GFI for affordably performing a variety of programmed network testing checks to identify potential security vulnerabilities. Progent has extensive knowledge of additional security auditing tools including NMAP, AMAP, eEye, plus utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can show you how to design protection into your business operations, install auditing applications, define and deploy a protected network architecture, and suggest procedures to maximize the safety of your network. Progent's security consultants are able to show you how to configure a firewall, implement safe remote access to email and business applications, and install virtual private network. Learn additional information on Progent's automated security evaluation.
Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory service bundles intended to enable small businesses to receive an objective network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from a secure computer inside your company firewall to uncover vulnerabilities to internal assaults. Both security inventory packages are set up and executed from a protected external site. The process is directed by an engineer with top security accreditations and who produces a report that summarizes and interprets the information collected by the security scan and proposes practical improvements if called for.
Stealth Security Penetration Analysis Support Services
Stealth intrusion testing is a key component of any successful network security plan. Progent's security professionals can perform thorough penetration checks without the knowledge of your company's in-house IT staff. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event history monitoring are properly configured and consistently checked. Find out more on Progent's stealth security penetration testing consulting.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security technology includes in-depth field work with leading firewalls and VPN technology from multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower Services integration and debugging support.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote access technology offer a full range of easy-to-administer security products to help protect your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Read additional information concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.
Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and select the right technologies from multiple vendors to achieve your security objectives while sticking within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates SentinelOne's next generation behavior analysis tools to guard endpoints and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to automate the complete malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and forensics. Top capabilities include one-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Progent is a SentinelOne Partner, dealer, and integrator. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery based on SentinelOne technology.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP offers firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP deployment that addresses your organization's unique needs and that allows you demonstrate compliance with government and industry information protection regulations. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require urgent action. Progent can also help you to set up and test a backup and restore solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid restoration of vital data, apps and VMs that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPAA, FIRPA, and PCI and, when necessary, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top information security vendors to deliver centralized management and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of inspection for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported easily to an alternate hardware environment without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard data about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to half of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether you're planning improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any company should develop a thoroughly thought out security program that incorporates both proactive procedures and response plans. The proactive strategy is a collection of steps that help to reduce vulnerabilities. The reactive plan helps your company's network security engineers to evaluate the damage resulting from a security penetration, fix the network, record the experience, and get business functions restored as quickly as possible.
Progent's expert information security engineers can to help your business to perform a comprehensive vulnerability evaluation and define a company-wide security plan to establish security processes and controls to reduce ongoing assaults and dangers.
CISM Qualified Information Security Consulting Assistance
The CISM committee describes the core competencies and global standards of performance that IT security managers are required to learn. CISM gives business management the confidence that those who have earned their CISM credential possess the background and knowledge to deliver effective security management and consulting consulting. Progent can provide the expertise of CISM Premier security professionals to help businesses with:
Read additional details concerning Progent's CISM Information Security Engineering Professionals.
- IS Security Governance
- Vulnerability Analysis
- Network Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Certified Security Consulting Expertise
CISSP certification denotes expertise with a worldwide standard for network security. ANSI has granted the CISSP credential recognition in the area of data protection under ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security fields such as:
Learn additional information concerning Progent's CISSP Accredited Security Consulting Expertise.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Solutions and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Mechanisms
- Telecom, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough testing and extensive work with information security design. The ISSAP credential represents demonstrated skill in the most challenging demands of IS security architecture within the wider field of information system security expertise required for CISSP certification. Progent's ISSAP-premier security experts can assist your business with all phases of architecture security such as.
Find out more information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Services.
- Access Control Systems and Techniques
- Telecom and Network Security
- Encryption/Decryption Options
- Needs Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Site Security
CISA Accredited Information System Security Auditing Consulting Support
The Certified Information Systems Auditor credential is a recognized qualification that represents mastery in IS security auditing. Certified by ANSI, the CISA accreditation has consultants pass an extensive test given by the ISACA professional association. Progent's CISA security audit consultants can assist your company in the areas of:
Find out more information concerning Progent's CISA Accredited Security Auditing Consulting Expertise.
- Information Systems Audit Process
- Information Technology Administration
- Network Assets and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Protecting Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to verify a consultant's ability to plan, deploy, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a business continuity plan based on leading practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation experts can provide a range of risk assessment services such as:
Find out additional details about Progent's CRISC Risk Management Consultants.
- Collect data and study documentation to evaluate significant vulnerabilities
- Identify statutory, industry, and contractual mandates and organizational standards associated with your network to assess their possible impact on your strategic goals
- Point out potential threats for your operational processes to assist in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to ensure your stakeholders understand IT risk so they can assist with your risk management process
- Match key risk vectors to related operational procedures to help assign risk responsibility
- Validate risk tolerance with executive management and major stakeholders to make sure they align
GIAC Accredited IS Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security experts. GIAC's goal is to make sure that a certified professional possesses the knowledge appropriate to provide services in key areas of network, information, and application security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified IS security audit engineers can assist your company in the areas of:
Learn more information concerning Progent's GIAC Information Assurance Expertise.
- Assessing IT Infrastructure
- Security Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Talk to a Security Engineer
To find out how to contact a certified security consultant for remote or onsite expertise in Alaska, phone 1-800-993-9400 or go to Online Computer Help.