For immediate remote help with network security issues, companies in Brasília Federal District can find high-level support by contacting Progent's security engineers. Progent's online support staff is ready to provide fast and low-cost assistance with security crises that threaten the viability of your IT network. Progent's accredited engineers are certified to support systems powered by Microsoft, Linux, macOS and OS X, and major derivatives of UNIX. Progent can deliver expert guidance for vital security and restoration solutions such as AI-based End Point Protection and Response, MDR (Managed Detection and Response), full system restore validation, immutable backup, and off-premises backup. Progent's broad range of services encompasses firewall expertise, email filtering and encryption, secure system architecture, and disaster recovery preparedness. Progent's technical support staff has earned the world's most advanced security credentials including GIAC (Global Information Assurance Certification) and CISSP.
Progent provides online security support services on a per-minute basis without minimum minutes and no additional fees for sign-up or off-hour service. By charging per minute and by delivering world-class support, Progent's billing policy keeps costs under control and avoids situations where simple solutions result in major expenses.
Ransomware Hot Line: 800-462-8800
Ransomware needs time to steal its way across a network. Because of this, ransomware assaults are typically unleashed on weekends and late at night, when support personnel are likely to take longer to recognize a breach and are less able to mount a rapid and coordinated response. The more lateral movement ransomware can make within a target's system, the longer it will require to recover basic operations and scrambled files and the more information can be exfiltrated to the dark web. Progent's Ransomware Hot Line is intended to assist organizations to take the time-critical first phase in mitigating a ransomware attack by putting out the fire. Progent's online ransomware engineers can assist businesses to identify and isolate breached servers and endpoints and protect undamaged assets from being compromised. If your system has been breached by any version of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
We've Been Attacked: What Are We Supposed to Do?
In case your business is currently fighting a network security emergency other than ransomware, visit Progent's Urgent Online Network Support to see how to get fast assistance. Progent maintains a team of certified cybersecurity experts who can provide online and on-premises support that includes threat containment, mitigation, recovery, forensics, and hardening of your cybersecurity posture to protect against future attacks.
For businesses who have planned in advance for a security breach, the formal incident handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of handling a major security penetration.
Overview of Progent's Security Support Services
Managing computer protection as well as preparation for recovering vital data and systems after an attack requires an on-going effort that entails a variety of tools and procedures. Progent's certified security consultants can assist your business at any level in your efforts to safeguard your IT system, from security evaluation to creating a comprehensive security program. Key areas supported by Progent's security engineers include Security Planning and Prevention, Data Recovery and Security Forensics, and Managed Filtering of Email-Borne Attacks.
Planning and Building Protected Environments
Any company should develop a thoroughly considered security plan that includes both preventive and responsive elements. The pre-attack plan is a collection of precautions that works to reduce vulnerabilities. The post-attack strategy specifies activities to help IT personnel to inventory the damage resulting from an attack, repair the damage, record the experience, and revive network functions as soon as possible. Progent can advise you how to build security into your company operations. Progent can configure scanning utilities, define and implement a safe network infrastructure, and recommend processes and policies to maximize the safety of your information system. Progent's security experts are available to assist you to configure a firewall, deploy safe offsite connectivity to e-mail and information, and install an effective virtual private network (VPN).
If your company is looking for an affordable option for outsourcing your security management, Progent's Round-the-clock Monitoring Options feature non-stop online system monitoring and fast resolution of emergencies.
Hybrid Cloud Solutions
Progent can assist your IT team you to plan, implement, administer and repair enterprise hybrid cloud solutions that incorporate physical and cloud-based resources and that are compliant with government data security requirements. (Learn about Progent's Microsoft 365 Exchange Online integration with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud integration expertise.)
System Restoration and Failure Analysis
Progent has expertise in recovering networks and devices that have been compromised, are quarantined, or have stopped working because of a security breach. Progent can help assess the damage caused by the breach, restore ordinary functions, and recover data compromised as a result of the breach. Progent's certified specialists can also manage a thorough failure analysis by examining activity logs and utilizing a variety of advanced assessment tools. Progent's background with security consulting minimizes your off-air time and permits Progent to propose effective ways to prevent or mitigate future attacks.
Ransomware Removal and Recovery Consulting
Progent can provide the services of proven ransomware recovery consultants with the knowledge to reconstruct an information system that has suffered an attack by a ransomware virus such as Ryuk, Dharma, Hermes, or Locky. For more information, see ransomware removal and recovery services.
Work-from-Home (WFH) Cybersecurity Consulting
At-home workers typically use their personal computing devices and usually operate in a unsecured physical environment. This increases their vulnerability to malware threats and requires judicious configuration of corporate firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, extensive user training, and the creation of policies built on leading practices. Progent's veteran roster of Work-from-home support experts can help you to design, implement and maintain a compliant cybersecurity solution that protects critical information resources in environments that incorporate telecommuters and hybrid workers.
Patch Management Services
Progent's support services for software and firmware patch management offer organizations of all sizes a flexible and affordable solution for assessing, validating, scheduling, implementing, and documenting updates to your dynamic information system. In addition to maximizing the security and reliability of your IT network, Progent's patch management services free up time for your IT team to concentrate on more strategic projects and tasks that deliver maximum business value from your network. Read more about Progent's software/firmware update management services.
Extended Detection and Response (XDR) Based on SentinelOne
SentinelOne's Singularity portfolio is a subscription-based, cloud-centric threat defense stack that includes AI algorithms and professional services to provide comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's small-footprint software agents can be installed in minutes to guard popular endpoints against increasingly sophisticated cyberthreats such as ransomware, familiar and brand-new malware, trojan viruses, hacking toolkits, RAM exploits, malicious scripts, destructive macros, and living-off-the-land (LotL) attacks. Progent is a certified SentinelOne Partner and dealer and manages thousands of endpoints secured by SentinelOne technology. SentinelOne is always the first endpoint response tool deployed by Progent to gain control and visibility of a customer's network in the first stages of a ransomware recovery. For more information, refer to Progent's SentinelOne-powered Extended Detection and Response solutions.
Consulting Services for Horizon3.ai's NodeZero Pentest Solutions
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that supports repeated, simultaneous, programmable testing of your network to help you identify, rank, fix, and verify cybersecurity weaknesses before malicious hackers can take advantage of them. NodeZero pentests can plant decoys called tripwires such as bogus files or credentials to detect whether your system is currently being probed along common attack paths. Tripwires provide enough detail to allow you to react quickly with your SIEM workflows before an attacker can compromise your environment. Progent offers the support of a NodeZero Certified Operator who can help you to deploy NodeZero to perform comprehensive pentests of your network perimeter and your internal IT infrastructure in order to determine your current security profile. Progent's NodeZero experts can also help you to harden your existing network security and can assist you to plan and implement a cohesive cybersecurity ecosystem that streamlines management and delivers maximum protection for on-prem, cloud-based, and perimeter IT assets. To learn additional details about Progent's vulnerability analysis solutions powered by on NodeZero's penetration test platform, refer to Consulting Services for NodeZero's PEN Test Products.
Stealth Penetration Security Assessment Services
Stealth intrusion checking is an important part of any comprehensive IT system security plan. Progent's security professionals can perform thorough penetration tests without the knowledge of your organization's internal IT resources. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event log analysis are properly configured and consistently monitored. Progent can implement ongoing automatic PEN testing to map your internal and external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, harvested credentials, missing patches, and unsound product defaults can be combined by hackers into the multi-vector attacks typical of the latest variants of ransomware. Learn more about Progent's Stealth PEN Testing Consultants.
Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates SentinelOne's next generation behavior analysis tools to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to automate the complete malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Progent is a certified SentinelOne Partner. Read more about Progent's
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools packaged within a single agent managed from a single console. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP deployment that addresses your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's
ProSight Data Protection Services: Managed Backup
Progent has worked with leading backup product companies to create ProSight Data Protection Services, a selection of subscription-based offerings that provide backup-as-a-service. All ProSight DPS services automate and monitor your backup processes and enable non-disruptive backup and fast restoration of vital files/folders, apps, system images, and VMs. ProSight DPS lets you recover from data loss resulting from equipment breakdown, natural disasters, fire, cyber attacks like ransomware, user error, malicious insiders, or software bugs. Managed services available in the ProSight Data Protection selection include ProSight DPS Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup using Barracuda dedicated storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent expert can assist you to determine which of these fully managed backup services are best suited for your network.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security companies to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a further layer of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, see ProSight Email Guard spam and content filtering.
ProSight Duo MFA: Two-factor Authentication Solutions
Progent's Duo authentication managed services incorporate Cisco's Duo cloud technology to defend against password theft through the use of two-factor authentication. Duo enables single-tap identity confirmation on iOS, Android, and other out-of-band devices. Using Duo 2FA, whenever you sign into a secured online account and enter your password you are requested to verify your identity via a device that only you have and that is accessed using a separate network channel. A wide range of out-of-band devices can be used as this second form of authentication including an iPhone or Android or watch, a hardware token, a landline telephone, etc. You can designate several verification devices. For more information about Duo two-factor identity validation services, see Cisco Duo MFA two-factor authentication (2FA) services for remote workers.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs or domains. By updating and managing your network documentation, you can eliminate up to half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether you're making enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Specialized Security Services Offered by Progent
Progent's security consultants offer unique support in vital facets of network protection such as:
Vulnerability Audits and Compliance Assessment
Progent offers experience with security auditing utilities like Microsoft Baseline Security Analyzer and LANguard for conducting a set of comprehensive system scans to identify potential security holes. Progent has extensive experience with these and similar tools and can help your company to analyze audit results and respond efficiently. Progent's security engineers also can perform web software testing and can perform expert assessments of corporate-wide security to assess your organization's compliance with major worldwide security standards such as FISMA, PCI, and ISO. Also, Progent can evaluate the strength of your wireless protection covering in-place wireless appliances plus mobile handsets. Learn additional details concerning Progent's Vulnerability Evaluation and Security Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wireless Help
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals can provide world-class consulting expertise for Cisco's complete family of protection and VPN technologies such as PIX 500 Firewalls and ASA 5500 Series Firewalls, Catalyst FWSM, secure high-speed and IS routers, wireless access points and bridges, Cisco Meraki cloud-managed access points, and Catalyst switches. Find out additional information concerning Cisco Protection, Virtual Private Network (VPN) and Aironet Wireless Consulting.
Additional Firewall and Virtual Private Network Consulting Services
In addition to supporting a broad range of protection technologies from Microsoft and Cisco, Progent offers organizations of all sizes advanced engineering services for technologies from other important firewall and Virtual Private Network (VPN) vendors. Progent's engineers can provide:
CISM identifies the basic skills and worldwide benchmarks of performance that computer security professionals are expected to master. CISM provides business management the assurance that consultants who have been awarded their accreditation possess the background and knowledge to provide efficient security management and consulting support. Progent can offer a CISM expert to assist your organization in critical security disciplines including information protection governance, vulnerability assessment, data protection process control, and crisis handling support.
Find out more details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.
CISSP Security Consulting Services
Progent's CISSP consultants are cybersecurity engineers who have been awarded CISSP status as a result of demonstrated professional work, extensive study, and formal examination. CISSP Certification indicates expertise in a worldwide standard for information security. ANSI has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Areas of expertise covered under CISSP include security administration procedures, security design and models, connection permission methodology, applications development security, business processes security, hardware security, encryption, telecommunications, network security, and disaster recovery planning.
Find out additional information about Progent's CISSP Consulting Services.
CISSP-ISSAP Premier Consultants for Secure Network Infrastructure
Progent's ISSAP Premier cybersecurity consultants have earned ISSAP status following rigorous examination and significant experience. field experience with information security architecture. ISSAP consultants have in-depth understanding of access control systems and methodologies, telecommunications and network security, cryptography, needs evaluation, business continuity and disaster recovery, and physical security integration. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture.
Learn more information about Progent's ISSAP Accredited Protected IT Infrastructure Engineering Support.
CISSP-ISSEP Premier Cybersecurity Engineering Experts
Network Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide enterprises with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent can provide the support of a certified CISSP-ISSEP cybersecurity expert to help your organization to utilize current system security engineering theory and processes in system development, review system security designs according to security engineering best practices, create cohesive system designs that incorporate compliant security mechanisms for all key system functions, define effective design strategies to deliver operational security, perform comprehensive risk analysis, and propose realistic security solutions that balance your operational goals with your organization's tolerance for risk.
Learn the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
Certified Information Systems Auditor (CISA) Support Expertise
The CISA credential is a recognized achievement that represents expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive test overseen by the ISACA professional group. Progent offers the services of a CISA-Premier security professional able to assist companies in the areas of IS audit process, information technology administration, systems and infrastructure lifecycle, IT support, safeguarding information assets, and disaster recovery planning.
Get more details about Progent's Certified Information Systems Auditor Consulting Expertise.
CRISC IT Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to design, implement, and maintain information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a workplace continuity strategy based on leading practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's risk management expertise is complementary to the support provided by Progent's CISA-Certified consultants for impartially evaluating your IS control design and with the expertise of Progent's CISM experts for designing security policies and procedures.
Find out additional details about Progent's CRISC-certified Risk Mitigation Support.
Global Information Assurance Certification Support Services
Global Information Assurance Certification was established in 1999 to validate the knowledge of computer security experts. GIAC's goal is to assure that a certified security consultant has the knowledge necessary to deliver services in critical areas of network, data, and application program security. GIAC accreditations are acknowledged by companies and government organizations all over the world including U.S. National Security Agency (NSA). Progent can provide the expertise of GIAC certified professionals for all of the security disciplines covered within GIAC accreditation programs including auditing security systems, incident handling, intrusion detection, web-based services security, and security information and event management (SIEM) solutions.
Read additional information about Progent's GIAC Information Assurance Services.
Depend on Progent for Network Security Help
If your business is located in Brasília Federal District and you're trying to find computer security expertise, call Progent at
Brasilia Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the great Brasilia metro area.
| City | Address | Phone | Link |
| Brasília | SCRS, 502, Asa Sul Brasília, DF 70330-530 Brazil |
+55 (61) 3142 0148 | Brasília Network Support Services |