Company IT networks in Alaska now have prompt and affordable remote help from Progent's certified security consultants to fix urgent security problems. The cost is competitive, charges are per minute, engagement is quick, and support is world class. Progent also offers help for complex engagements that demand the expertise of senior security engineers with high-level security certifications.
If your Alaska business is situated some distance from larger metropolitan neighborhoods including Anchorage, Juneau, or Fairbanks, access to local certified network security experts could be problematic when you have an urgent situation. This can result in a drop in productivity for your company, angry clients, unproductive employees, and defocused executives. By utilizing Progent's remote support, you have access to a Certified security consultant who can offer expertise whenever you require it to get your network operating and recover your data.
Progent can help you at any level in your initiatives to defend your information system with support that can range from network security audits to developing a company-wide security plan. Progent offers economical support to assist businesses of all sizes to design and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to deliver centralized control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further level of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter.
Progent's certified professionals are accessible online or in person to provide a range of urgent or longer-term network security services such as:
If your company has an emergency requirement for IT security help, go to Progent's Emergency Online Technical Help.
Progent's support professionals offer advanced support in vital facets of system protection that include security assessment, firewalls and VPN, and high-level security planning.
System Security Evaluation
Progent's expert security engineers can evaluate the effectiveness of your existing network security implementation by performing comprehensive remote automated testing via advanced software tools and proven techniques. Progent's skill in administering this testing saves you money and assures an objective picture of system vulnerability. The information your IT organization gains can be used as the basis of a security strategy that will permit your network to operate safely and respond quickly to new threats.
Automated Security Audits
Progent provides expertise in the application of security testing software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a set of programmed network auditing checks to identify possible security holes. Progent has extensive experience with additional network auditing utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react effectively.
Progent can help you design security into your business processes, configure scanning tools, define and implement a secure system environment, and recommend policies to optimize the security of your network. Progent's security professionals are available to help you configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Find out additional information on Progent's network security assessment.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory service packages intended to enable small businesses to get a professional security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive examination of your network from beyond your firewalled perimeter to determine possible risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from an authorized computer within your firewall to uncover vulnerabilities to internal threats. Both security inventory packages are set up and run from a secured remote site. The project is directed by a consultant with top security credentials and who produces a report that summarizes and analyzes the information collected by the scan and proposes cost-effective improvements where appropriate.
Stealth Penetration Testing Support Services
Stealth intrusion testing is an important part of any comprehensive IT system security plan. Progentís security experts can perform extensive intrusion tests without the knowledge of your organization's internal IT resources. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion detection alerts and event log analysis are properly set up and consistently monitored. Learn additional information about Progent's network security penetration testing support services.
Firewall and Virtual Private Network Expertise
Progent's background in security solutions encompasses extensive field work with major firewalls and Virtual Private Network technology offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important industry accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.
Cisco Network Security and VPN Support Services
Cisco's security and remote access technology provide a full line of easy-to-administer security products to help protect your local and remote information system. Cisco's VPN product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Find out additional details about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.
Consulting Services for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can help you create a detailed security strategy and select appropriate products from multiple suppliers to achieve your security goals while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based machine learning tools to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to automate the complete malware attack lifecycle including blocking, infiltration detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer economical multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device control, and web filtering via cutting-edge tools incorporated within one agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent can also help your company to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital data, applications and VMs that have become unavailable or damaged due to hardware failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can deliver advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your critical information. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security companies to provide web-based management and world-class protection for all your email traffic. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved easily to a different hardware solution without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can eliminate up to half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Security Design
Every company should develop a thoroughly considered security program that incorporates both proactive processes and response plans. The pre-attack plan is a set of procedures designed to reduce vulnerabilities. The reactive plan assists your company's network security engineers to evaluate the damage caused by an attack, repair the system, record the event, and get the IT network restored as rapidly as feasible.
Progent's certified information security engineers are available to help your company to run a full risk assessment and define a computer security strategy to establish security policies and mechanisms to reduce future attacks and threats.
CISM Certified System Security Support Services
The Certified Information Security Manager (CISM) committee describes the core capabilities and worldwide standards of performance that IT security managers are expected to learn. It provides executive management the confidence that consultants who have earned their CISM credential possess the experience and capability to provide efficient security management and consulting services. Progent can provide the services of CISM Certified security professionals to help businesses with:
Find out additional information about Progent's CISM Qualified IS Security Support Expertise.
- IS Security Strategies
- Vulnerability Management
- IS Security Implementation Management
- Network Security Management
- Response Planning
CISSP Certified Security Engineering Services
CISSP certification recognizes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields such as:
Find out additional information concerning Progent's CISSP Qualified Information Security Support Professionals.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Technology
- Telecommunications, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier network architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous examination and extensive experience with information security design. The ISSAP credential represents demonstrated mastery in the most challenging demands of information security architecture bounded by the wider field of IS security knowledge needed for CISSP certification. Progent's ISSAP-premier security experts can help your company with all aspects of secure network architecture such as.
Learn more information concerning Progent's ISSAP Qualified Secure Network Architecture Support Professionals.
- Access Control Systems and Techniques
- Phone System and Network Infrastructure Security
- Cryptography Options
- Requirements Evaluation and Security Criteria
- Business Continuity Planning (BCP) and DRP
- Physical Security
CISA Certified Network Security Auditing Consulting Assistance
The CISA credential is an important qualification that indicates mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive examination administered by the ISACA international professional group. Progent's CISA information security audit engineers can assist your company with:
Learn additional details about Progent's CISA Certified IS Security Auditing Engineering Services.
- IS Audit Services
- IT Enforcement
- Systems and Architecture Lifecycle
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA in 2010 to verify a consultant's skills to plan, deploy, and support information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and execute a workplace continuity plan based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation consultants can provide a variety of risk evaluation services including:
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and review documentation to help identify significant risk scenarios
- Inventory statutory, regulatory, and contractual requirements and company policies related to your information system to determine their possible influence on your strategic goals
- Point out possible threats for your operational workflows to assist in evaluating your corporate risk
- Develop a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
- Match identified risk vectors to your associated operational processes to help determine risk responsibility
- Determine risk tolerance with your senior management and major stakeholders to ensure they are in agreement
GIAC Qualified Network Security Consulting Expertise
GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's mission is to assure that an accredited security consultant has the knowledge needed to deliver services in key categories of system, data, and application security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified information security audit experts are available to help your business in the areas of:
Learn more details concerning Progent's GIAC Information Assurance Support.
- Auditing Perimeters
- Incident Response
- Intrusion Detection
- Web Services Security
- SIEM solutions
Contact a Certified Progent Security Specialist
To find out how to contact a Progent security engineer for remote or on-premises assistance in Alaska, call 1-800-993-9400 or go to Remote Computer Help.