For fast online assistance with computer security issues, businesses in Brasília Federal District can find world-class support from Progent's certified security professionals. Progent's online support staff is ready to offer effective and economical help with security problems that are impacting the viability of your information system. Progent's accredited engineers are certified to support systems powered by Windows, Linux, Apple macOS and OS X, and major versions of UNIX. Progent can provide expert support for critical cybersecurity and recovery solutions like AI-based End Point Protection and Response, MDR (Managed Detection and Response), full system restoration testing, immutable backup, and off-site backup. Progent's broad range of consulting services addresses firewall technology, email security, secure system infrastructure, and disaster recovery preparedness. Progent's support staff has earned the industry's top security accreditations including CISA and Information System Security Architecture Professional (ISSAP).
Progent provides remote security help on a per-minute model with no minimum call duration and without extra charges for setup or off-hour service. By charging per minute and by providing top-level support, Progent's billing model keeps expenses under control and avoids situations where simple fixes entail major expenses.
Ransomware Hot Line: 800-462-8800
Ransomware requires time to steal its way across a network. For this reason, ransomware assaults are typically unleashed on weekends and at night, when IT personnel may take longer to recognize a breach and are less able to mount a rapid and coordinated response. The more lateral progress ransomware is able to manage inside a victim's system, the more time it will require to recover basic operations and scrambled files and the more data can be exfiltrated to the dark web. Progent's Ransomware Hot Line is intended to guide organizations to complete the time-critical first phase in mitigating a ransomware attack by containing the malware. Progent's remote ransomware experts can assist businesses to identify and quarantine breached devices and guard undamaged assets from being penetrated. If your network has been breached by any strain of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800.
Our System Has Been Attacked: What Do We Do Now?
In case you are now faced with a security crisis other than ransomware, visit Progent's Urgent Remote Network Help to see how to get immediate assistance. Progent has a pool of certified network security experts who can provide online and on-premises support that includes threat containment, mitigation, recovery, forensics, and enhancement of your security posture to guard against future exploits.
For organizations that have prepared in advance for an attack, the step-by-step incident handling procedure outlined by GIAC is Progent's preferred method of handling a major security attack.
Overview of Progent's Security Services
Managing computer security and planning for recovering critical data and functions after an attack requires a continual effort that entails a variety of tools and processes. Progent's security consultants can help your business at whatever level in your efforts to safeguard your IT network, ranging from security evaluation to designing a comprehensive security program. Important technologies supported by Progent's experts include Security Planning and Prevention, Information Recovery and Security Forensics, and Outsourced Protection from Email-Borne Spam and Viruses.
Planning and Building Secure Environments
Any business ought to have a carefully thought out security plan that incorporates both proactive and responsive activity. The proactive plan is a set of steps that works to minimize vulnerabilities. The reactive strategy specifies procedures to help IT staff to evaluate the damage caused by an attack, repair the damage, record the event, and revive network activity as soon as feasible. Progent can show you how to incorporate protection into your company processes. Progent can set up auditing software, create and execute a secure IT architecture, and recommend procedures and policies that will optimize the safety of your computing environment. Progent's security professionals are ready to assist you to configure a firewall, deploy secure online and mobile access to email and data, and configure an effective VPN.
If you are interested in an economical option for outsourcing your security management, Progent's 24x7 Monitoring Services include continual online network tracking and fast resolution of emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, manage and repair enterprise hybrid cloud solutions that include physical and cloud hosted resources and that comply with government data security requirements. (Learn about Progent's Microsoft 365 Exchange Online integration solutions with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud Platform (GCP) integration expertise.)
System Recovery and Security Forensics
Progent has expertise in restoring systems and servers that have been hacked, are suspect, or have ceased to function following a security breach. Progent can show you how to evaluate the damage resulting from the assault, return your company to normal business operations, and recover data compromised as a result of the event. Progent's certified engineers can also perform a thorough forensic analysis by going over activity logs and using other advanced forensics techniques. Progent's background with security problems minimizes your off-air time and permits Progent to suggest efficient strategies to prevent or contain future attacks.
Ransomware Removal and Recovery Consulting
Progent offers the services of experienced ransomware recovery consultants with the knowledge to reconstruct an IT network damaged by a ransomware virus such as Ryuk, WannaCry, Hermes, or MongoLock. For more information, see ransomware cleanup and recovery services.
Work-from-Home (WFH) Security Consulting
Work-from-Home (WFH) workers commonly utilize their own computers and usually operate in a unsecured physical area. This situation increases their vulnerability to malware threats and calls for judicious configuration of firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, intensive end-user training, and the creation of policies built on best practices. Progent's veteran team of Work-from-home support consultants can help your business to design, configure and manage an effective security solution that protects vital information resources in networks that incorporate an at-home workforce as well as hybrid workers.
Patch Management Services
Progent's support services for software and firmware patch management offer organizations of any size a versatile and affordable alternative for assessing, validating, scheduling, implementing, and documenting updates to your dynamic IT system. Besides maximizing the security and reliability of your IT network, Progent's software/firmware update management services allow your in-house IT staff to concentrate on more strategic projects and activities that derive maximum business value from your network. Read more about Progent's software/firmware update management services.
Extended Detection and Response (XDR) Powered by SentinelOne
SentinelOne's Singularity product family is a subscription-based, cloud-centered threat defense stack that includes AI algorithms and professional services to provide comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's small-footprint software agents can be installed in a few minutes to protect popular endpoints against increasingly sophisticated assaults such as ransomware, familiar and zero-day malware, trojans, hacking tool sets, memory exploits, malicious scripts, invasive macros, and living-off-the-land (LotL) attacks. Progent is a certified SentinelOne Partner and dealer and manages thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne is always the first incident response software activated by Progent to provide control and visibility of a client's network in the first stages of a ransomware recovery emergency. For additional details, see Progent's SentinelOne-powered Extended Detection and Response (XDR) expertise.
Consulting Services for Horizon3.ai's NodeZero Penetration Testing Products
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that can deliver continuous, concurrent, programmable testing of your network to help you identify, prioritize, fix, and verify security vulnerabilities before threat actors can take advantage of them. NodeZero pentests can strategically insert decoys called tripwires such as bogus files or credentials to detect when your system is actively being probed across proven attack paths. Tripwires provide enough detail to allow you to take action promptly with your incident response workflows before an attacker can compromise your environment. Progent offers the skills of a NodeZero Certified Operator (NCO) who can help you to deploy NodeZero to carry out comprehensive pentests of your network perimeter and your internal IT infrastructure so you can evaluate your current security profile. Progent's NodeZero experts can also assist you to harden your existing network security and can help you to plan and implement a unified cybersecurity strategy that simplifies management and delivers optimum protection for on-prem, multi-cloud, and perimeter IT assets. To find out additional details about Progent's threat analysis solutions based on on NodeZero's PEN test platform, visit Consulting Support for NodeZero's PEN Test Platform.
Stealth Penetration (PEN) Security Testing Services
Stealth penetration checking is an important component of any comprehensive network security plan. Progent's security professionals can run extensive intrusion tests without the awareness of your organization's in-house network support staff. Stealth penetration checking shows whether current security defense systems such as intrusion incident alerts and event log monitoring are properly configured and consistently observed. Progent can implement continuous automatic PEN testing to define your internal/external attack surface and to detect ways that vulnerabilities, improper configurations, harvested credentials, skipped patches, and ill-advised product defaults can be chained together by hackers into the multi-front attacks common to the latest variants of ransomware. Get additional information about Progent's Stealth PEN Assessment Services.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes SentinelOne's next generation behavior machine learning tools to defend endpoints as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to manage the entire malware attack lifecycle including filtering, detection, containment, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Progent is a certified SentinelOne Partner. Learn more about Progent's
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer affordable multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, device control, and web filtering via leading-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization experts can help you to design and configure a ProSight ESP deployment that meets your company's unique requirements and that allows you prove compliance with government and industry data protection standards. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Learn more about Progent's
ProSight Data Protection Services: Managed Cloud Backup and Recovery
Progent has partnered with leading backup technology vendors to produce ProSight Data Protection Services, a portfolio of management offerings that provide backup-as-a-service. All ProSight DPS products manage and monitor your data backup operations and allow transparent backup and fast restoration of critical files/folders, applications, system images, plus virtual machines. ProSight DPS helps your business recover from data loss caused by equipment failures, natural calamities, fire, malware like ransomware, user mistakes, malicious insiders, or application bugs. Managed services available in the ProSight Data Protection family include ProSight DPS Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup based on Barracuda purpose-built storage, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent expert can help you to determine which of these managed backup services are best suited for your IT environment.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading information security companies to provide centralized management and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a further layer of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Duo MFA: Two-factor Authentication Services
Progent's Duo authentication service plans utilize Cisco's Duo technology to defend against stolen passwords by using two-factor authentication (2FA). Duo enables single-tap identity confirmation on iOS, Android, and other out-of-band devices. With Duo 2FA, whenever you log into a protected application and enter your password you are asked to confirm who you are on a unit that only you have and that uses a separate network channel. A wide range of out-of-band devices can be used as this added means of authentication such as a smartphone or wearable, a hardware token, a landline phone, etc. You may register several verification devices. To learn more about Duo two-factor identity validation services, see Cisco Duo MFA two-factor authentication services for telecommuters.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Since the system is virtualized, it can be moved easily to an alternate hosting solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can save up to half of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you're planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Specialized Security Expertise Offered by Progent
Progent's seasoned consultants can provide unique support in key facets of computer security such as:
Information Risk Evaluation and Compliance Assessment
Progent provides expertise with security evaluation utilities like Microsoft Baseline Security Analyzer and LANguard from GFI for performing a variety of comprehensive network tests to reveal possible security problems. Progent has extensive experience with these and similar tools and can assist you to understand audit reports and respond appropriately. Progent's security consultants also offer web software testing and can perform expert evaluation of corporate-wide security to determine your organization's compliance with major global security standards including FISMA, PCI, and ISO. Also, Progent can assess the effectiveness of your wireless protection covering stationary wireless equipment as well as mobile devices. Find out additional details about Progent's Vulnerability Audits and Compliance Assessment.
Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wireless Consulting
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals can deliver in-depth technical services for Cisco's entire family of protection and VPN products such as PIX Series Firewalls and ASA 5500 Firewalls, Catalyst FWSM, protected high-speed and IS routers, wireless access points and bridges, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Find out more information concerning Cisco Security, VPN and Aironet Wireless Help.
Additional Firewall and Virtual Private Network (VPN) Technologies
As well as being expert in a wide array of network security technologies available from Microsoft and Cisco, Progent offers companies of all sizes expert support for solutions from other important firewall and Virtual Private Network (VPN) vendors. Progent's engineers offer:
Read more details about Progent's CISM Security Consulting Services.
CISSP Security Consulting Services
Progent's CISSP consultants are cybersecurity specialists who have been awarded CISSP accreditation through demonstrated experience, rigorous study, and exhaustive testing. CISSP Certification indicates mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration procedures, security design and test systems, connection permission methodology, applications development security, operations security, physical security, encryption, telecommunications, Internet security, and business continuity planning.
Learn additional information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
CISSP-ISSAP Premier Consultants for Secure System Infrastructure
Progent's ISSAP Premier security experts have been awarded ISSAP certification following thorough testing and substantial hands-on work with information security architecture. ISSAP consultants have acquired comprehensive understanding of access management mechanisms and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, BCP and DRP, and physical security. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security.
Find out the details concerning Progent's ISSAP Certified Protected Network Architecture Consulting Services.
CISSP-ISSEP Premier Security Engineering Experts
Cybersecurity consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide enterprises with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP cybersecurity consultant to assist your enterprise to utilize current system security engineering principles and processes in system development, review system security designs based on cybersecurity engineering leading practices, create cohesive system designs that incorporate compliant security features for all critical system functions, develop efficient configuration strategies to deliver protection for operations, perform comprehensive risk analysis, and propose practical security models that balance your operational goals with your company's tolerance for risk.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
CISA Security Auditor Professional Expertise
The CISA credential is a recognized qualification that indicates expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass a comprehensive test administered by the ISACA professional association. Progent offers the expertise of a CISA-Certified security audit professional trained to help businesses in the areas of IS audit services, IT governance, systems and architecture planned useful life, IT support, safeguarding data resources, and disaster recovery preparedness.
Learn additional details concerning Progent's Certified Information Systems Auditor (CISA) Support Services.
CRISC-certified Risk Mitigation Experts
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to design, implement, and support information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity strategy that follows leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's risk mitigation services are complementary to the services available from Progent's CISA-Certified consultants for objectively auditing your IT control design and with the services of Progent's CISM consultants for implementing security policies and procedures.
Learn more details about Progent's CRISC-certified Network Risk Mitigation Services.
Global Information Assurance Certification Support Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to make sure that a certified professional possesses the knowledge appropriate to deliver support in critical areas of network, information, and program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including United States NSA. Progent can provide the help of GIAC certified professionals for all of the security services covered within GIAC accreditation topics including auditing security systems, incident handling, traffic analysis, web application security, and security information and event management (SIEM) solutions.
Learn more details about Progent's GIAC Information Assurance Services.
Get in Touch with Progent for Computer Security Expertise
If your business is located in Brasília Federal District and you want cybersecurity expertise, phone Progent at
Brasilia Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the great Brasilia metro area.
City | Address | Phone | Link |
Brasília | SCRS, 502, Asa Sul Brasília, DF 70330-530 Brazil |
+55 (61) 3142 0148 | Brasília Network Support Services |