Small business computer networks in Alaska can have prompt and economical remote help from Progent's accredited security experts to fix the toughest security issues. Rates are affordable, charges are per minute, sign-up is quick, and service is unbeatable. Progent also offers help for long-term engagements that demand the expertise of senior security engineers with top security certifications.
If your Alaska office is situated some distance from more populated urban neighborhoods like Anchorage, Juneau, or Fairbanks, support from nearby accredited network security consultants may be problematic when you have a security disaster. This can result in a loss of income for your business, upset customers, idle workers, and defocused management. By contacting Progent, you can get in touch with a Premier security professional who can provide assistance when you require it to keep your information system operating and salvage your data.
Progent can help you in all your initiatives to guard your information system with services that can range from security audits to developing a comprehensive security strategy. Progent offers economical support to assist small and midsize companies to design and maintain protected IT environments powered by Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security solution that incorporates the technology of top information security vendors to deliver web-based management and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter.
Progent's security professionals are accessible online or on premises to offer a variety of urgent or project-based IT security services such as:
If your network has an emergency need for IT security help, refer to Progent's Emergency Remote Technical Help.
- Perform thorough network security evaluations
- Recuperate promptly after virus and worm attacks
- Set up hardware and software firewalls
- Configure safe techniques for offsite and mobile connectivity
- Deploy effective utilities for automatic defense against spam and DHAs
- Help create a company-wide security strategy with 24x7 monitoring
- Offer outsourced Help Desk Services
- Help Create a practical data backup and restore strategy built around Microsoft DPM backup/restore technology
Progent's engineers offer advanced support in key facets of network protection including security evaluation, firewall/VPN support, and advanced security consulting.
Progent's certified security engineers can assess the effectiveness of your existing computer security systems by performing comprehensive remote automated testing based on sophisticated software tools and tested procedures. Progent's experience in this testing saves you money and assures an accurate portrayal of weaknesses. The knowledge your IT organization is provided can form the basis of a network protection plan that can allow your network to operate dependably and react rapidly to new risks.
Automated Network Vulnerability Evaluation
Progent provides consulting in the application of security evaluation software such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a set of automatic system testing checks to uncover potential security vulnerabilities. Progent has broad knowledge of other security auditing utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.
Progent can help you build security into your business processes, install auditing tools, define and implement a protected network architecture, and suggest policies to maximize the safety of your network. Progent's security engineers are available to assist you to configure a firewall, design secure remote access to email and business applications, and install VPN. Find out additional information on Progent's network security assessment.
Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles intended to allow small companies to receive an impartial security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive test of your network from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from a secure computer inside your firewall to assess vulnerabilities to inside threats. Both security inventory services are configured and executed from a protected external site. The project is directed by an engineer who has earned high-level security credentials and who produces a document that summarizes and analyzes the information collected by the security scan and suggests cost-effective remediation if appropriate.
Stealth Intrusion Analysis Support Services
Stealth intrusion testing is an important part of any successful network security strategy. Progentís security professionals can run thorough penetration tests without the awareness of your organization's in-house network support staff. Stealth penetration testing uncovers whether existing security defense tools such as intrusion detection alerts and event history analysis are correctly configured and consistently checked. Find out more on Progent's stealth security penetration testing support services.
Firewall and Virtual Private Network Solutions
Progent's background in network security solutions includes extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Support Services
Cisco's network security and remote connection technology represent a full line of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Learn more information about Progent's Engineering Services for Cisco Security and VPN Products.
Consulting Expertise for Other Firewall and VPN Technology
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and Symantec. Progent can show you how to design a detailed security plan and choose appropriate products from multiple suppliers to support your security objectives while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis tools to defend endpoint devices as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the complete malware attack progression including filtering, detection, mitigation, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device control, and web filtering via leading-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can assist you to design and implement a ProSight ESP environment that addresses your organization's specific requirements and that allows you prove compliance with legal and industry information protection standards. Progent will help you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for urgent action. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates your backup processes and enables fast restoration of critical data, apps and virtual machines that have become lost or damaged due to hardware failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading information security vendors to provide web-based management and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to track and protect internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be moved easily to a different hosting environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as half of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every business ought to have a carefully thought out security program that includes both preventive procedures and reaction plans. The pre-attack plan is a set of procedures that help to reduce security weaknesses. The reactive strategy assists your company's security personnel to assess the impact caused by a security penetration, fix the network, document the event, and get the IT network running as soon as possible.
Progent's expert IS security consultants are available to help you to perform a full vulnerability assessment and define a network security strategy to implement security processes and controls to reduce future assaults and dangers.
CISM Qualified Network Security Support Assistance
The CISM organization describes the core competencies and global standards of skill that information security managers are expected to learn. It provides executive management the assurance that consultants who have qualified for their CISM certification possess the background and capability to provide efficient security management and support consulting. Progent can provide the support of CISM Premier security professionals to help businesses with:
Read additional details about Progent's CISM Accredited IS Security Engineering Expertise.
- IS Security Processes
- Vulnerability Management
- IS Security Program Management
- Information Security Management
- Recovery Management
CISSP Qualified Security Consulting Support
CISSP denotes expertise with a global standard for network security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of information protection under ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields such as:
Learn more information concerning Progent's CISSP-certified Network Security Support Services.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecom, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the most complex requirements of information system security architecture within the broader field of IS security expertise required for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all phases of secure network architecture including.
Learn additional information concerning Progent's ISSAP Accredited Secure System Architecture Support Expertise.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Data Encryption Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning and DRP
- Physical Security
CISA Certified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a globally recognized qualification that represents mastery in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA network security audit consultants can help your company with:
Read more information concerning Progent's CISA Qualified IS Security Auditing Engineering Support.
- Information Systems Audit Services
- IT Governance
- Systems and Architecture Lifecycle Planning
- Information Technology Support
- Safeguarding Information Assets
- Disaster Recovery Preparedness
The CRISC program was established by ISACA to verify a consultant's skills to design, implement, and maintain information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to help you to create and execute a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation engineers can provide a range of risk identification services including:
Learn additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and review documentation to help identify major risk scenarios
- Inventory legal, industry, and business mandates and company policies related to your network to determine their potential impact on your strategic goals
- Point out potential threats for your business workflows to help in evaluating your corporate risk
- Develop a risk awareness program and conduct training to make sure your organization understand IS risk so they can contribute to your risk management program
- Connect identified risk vectors to related business procedures to help determine risk responsibility
- Validate risk tolerance with executive management and major stakeholders to ensure they align
GIAC Qualified Information System Security Engineering Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security experts. GIAC's goal is to ensure that a certified professional possesses the knowledge needed to provide support in vital areas of system, data, and application security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit specialists are available to assist your IT organization in the areas of:
Read more details concerning Progent's GIAC Information Assurance Expertise.
- Auditing Perimeters
- Security Incident Handling
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Contact a Progent Security Engineer
To learn how you can get in touch with a Progent security engineer for remote or on-premises assistance in Alaska, call 1-800-993-9400 or visit Remote Network Support.