Greater Boston Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Greater Boston Metro Area.
Progent locations in the Greater Boston Metro Area
To get immediate remote help with network security problems, businesses in Boston, MA, can find expert support by contacting Progent's security professionals. Progent's online service staff is ready to provide efficient and low-cost help with security emergencies that are impacting the viability of your network. Progent's accredited security engineers are qualified to provide help for systems based on Microsoft Windows, Linux, macOS and OS X, Solaris, and popular derivatives of UNIX. Progent's broad array of services encompasses firewall configuration, email filtering and encryption, secure system design, and business continuity preparedness. Progent's technical support staff has been awarded the industry's most advanced security accreditations including CISA and ISSAP.
Progent provides online security support on a by-the-minute model without minimum minutes and no additional fees for sign-up or after hours support. By billing by the minute and by delivering top-level support, Progent's pricing structure keeps expenses low and avoids situations where quick solutions result in big bills.
We've Been Hacked: What Can We Do Now?
If your network is currently experiencing a security crisis, refer to Progent's Urgent Online Network Support to learn how to get immediate aid. Progent maintains a team of seasoned cybersecurity experts who offer remote and onsite assistance that includes containment, mitigation, recovery, forensics, and hardening of your security defense to protect against future attacks.
For organizations that have planned carefully for an attack, the step-by-step post-attack response procedure promoted by Global Information Assurance Certification is Progent's recommended method of responding to a major security incident.
Introduction to Security Services
Managing data security as well as preparation for restoring critical data and systems following an attack requires an on-going effort that entails a variety of technologies and procedures. Progent's certified professionals can help your organization at whatever level in your attempt to protect your IT system, ranging from security assessments to creating a complete security strategy. Key areas covered by Progent's security engineers include Security Planning and Prevention, Data Recovery and Security Forensics, and Outsourced Filtering of Email-Based Spam and Viruses.
Planning and Implementing Secure Environments
Every business should have a carefully considered security strategy that incorporates both preventive and reactive activity. The proactive plan is a collection of precautions that helps to reduce security gaps. The reactive strategy specifies procedures to assist IT personnel to inventory the damage caused by a breach, remediate the damage, document the event, and revive business activity as soon as feasible. Progent can advise you how to build security into your company operations. Progent can set up scanning software, define and execute a safe IT architecture, and propose processes and policies to maximize the safety of your information system. Progent's security professionals are available to assist you to configure a firewall, deploy protected remote access to e-mail and data, and install an efficient virtual private network.
If your company is looking for an economical way for outsourcing your security administration, Progent's 24x7 Network Support Services include non-stop online network tracking and immediate resolution of problems.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, manage and repair enterprise hybrid cloud solutions that incorporate local and cloud-based infrastructure and that are compliant with government and industry security requirements. (Find out about Progent's Office 365 integration solutions with on-premises Exchange deployments, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
Data Recovery and Security Forensics
Progent has expertise in recovering systems and computers that have been compromised, are in question, or have failed because of a security attack. Progent can help evaluate the damage resulting from the assault, restore normal business operations, and retrieve data lost owing to the assault. Progent's certified specialists can also perform a comprehensive forensic evaluation by examining activity logs and using a variety of advanced assessment tools. Progent's background with security consulting reduces your downtime and permits Progent to suggest effective ways to prevent or contain new assaults.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based machine learning technology to defend endpoints and servers and VMs against new malware assaults like ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to automate the complete threat lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint control, and web filtering through leading-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with government and industry information security standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent's consultants can also assist your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of critical data, apps and VMs that have become lost or corrupted as a result of component failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top data security vendors to deliver web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to an alternate hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can eliminate as much as half of time spent trying to find critical information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether you’re planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Special Security Expertise Available from Progent
Progent's veteran consultants can provide unique expertise in vital areas of network security such as:
Information Risk Audits and Compliance Testing
Progent offers experience with information risk auditing tools like Microsoft Baseline Security Analyzer or LANguard for conducting a set of automatic system scans to reveal potential security holes. Progent has broad skills with testing utilities and can help you to analyze assessment results and react efficiently. Progent's security consultants also provide web software testing and can conduct thorough assessments of corporate-wide security to assess your company's compliance with major worldwide security specifications such as HIPAA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless protection covering stationary wireless equipment plus mobile devices. Learn the details concerning Progent's Information Risk Evaluation and Compliance Testing.
Cisco Network Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can deliver world-class consulting expertise for Cisco's entire family of protection and Virtual Private Network (VPN) products such as PIX 500 Series Firewalls and ASA Series Firewalls, the Catalyst FWSM, secure broadband and IS routers, wireless access points, Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Get more details concerning Cisco Security, Virtual Private Network and Aironet Wireless Expertise.
Other Firewall and VPN Consulting Services
Unannounced Penetration Testing Consulting
As well as being expert in a broad range of protection solutions from Microsoft and Cisco, Progent offers organizations of all sizes expert support for technologies from other major firewall and Virtual Private Network (VPN) suppliers. Progent's consultants can provide:
Unannounced penetration checking is a vital method for helping organizations to determine how vulnerable their IT systems are to real-world threats by revealing how thoroughly network security procedures and technologies stand up to planned but unannounced intrusion attempts launched by veteran security engineers using advanced hacking techniques. Read more information about Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Services
Certified Information Security Manager defines the basic skills and international benchmarks of service that IT security professionals are expected to master. It provides executive management the confidence that those who have been awarded their accreditation have the background and skill to offer efficient security management and consulting support. Progent can provide a CISM-certified consultant to assist your organization in critical security disciplines such as information security governance, risk management, data protection program control, and crisis handling management.
Read the details about Progent's Certified Information Security Manager (CISM) Security Consulting Services.
CISSP Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP accreditation as a result of demonstrated experience, extensive study, and exhaustive testing. CISSP qualification indicates mastery of a worldwide standard for IT security. ANSI has given the CISSP status accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security administration procedures, security architecture and models, connection permission methodology, applications development security, business processes security, physical security, encryption, communications, Internet security, and business continuity planning.
Read additional information about Progent's CISSP Support Expertise.
CISSP-ISSAP Qualified Consultants for Secure Network Infrastructure
Progent's ISSAP certified cybersecurity consultants have been awarded ISSAP certification after thorough testing and significant hands-on work with information security design. ISSAP consultants have acquired comprehensive knowledge of access management systems and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity and DRP, and physical security. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture.
Read more details concerning Progent's ISSAP Accredited Protected Network Architecture Engineering Support.
CISSP-ISSEP Certified Security Engineering Consultants
Network Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide enterprises with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the support of a certified CISSP-ISSEP network security expert to assist your enterprise to utilize modern system security engineering theory and processes in system development, review system security designs based on cybersecurity engineering best practices, produce cohesive system designs that include compliant security mechanisms for all key system functions, define efficient configuration strategies to deliver operational security, perform in-depth risk analysis, and propose realistic security solutions that balance your operational goals with your company's risk tolerance.
Learn more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
CISA Security Auditor Consulting Services
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates expertise in network security auditing. Certified by ANSI, the CISA accreditation has candidates pass an exhaustive examination overseen by the ISACA international professional group. Progent can provide the expertise of a CISA-qualified security audit engineer trained to assist businesses in the fields of IS audit process, IT administration, systems and architecture planned useful life, IT service delivery, safeguarding information assets, and disaster recovery preparedness.
Get more details about Progent's CISA Professional Services.
CRISC Risk Management Specialists
The CRISC certification program was established by ISACA to verify a consultant's skills to design, implement, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's network risk management expertise is complementary to the services provided by Progent's CISA-qualified security engineers for impartially evaluating your IT management design and with the expertise of Progent's CISM-certified consultants for defining security policies and procedures.
Get more information about Progent's CRISC Network Risk Mitigation Expertise.
GIAC Consulting Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security engineers. GIAC's mission is to make sure that a certified security consultant possesses the skills necessary to deliver services in key categories of system, information, and program security. GIAC certifications are recognized by companies and institutions throughout the world including U.S. NSA. Progent can provide the support of certified consultants for any of the network security services addressed within GIAC accreditation topics including assessing IT infrastructure, incident response, traffic analysis, web-based application security, and security information and event management (SIEM) solutions.
Learn more information about Progent's GIAC Information Assurance Support.
Contact Progent for Computer Security Help
If your company is situated in Boston or anywhere in the state of Massachusetts and you want computer security consulting, phone Progent at 800-993-9400 or visit Contact Progent.