For fast remote assistance with computer security issues, companies in Brasília Federal District have access to world-class expertise from Progent's certified security engineers. Progent's remote service staff is available to offer fast and economical help with security emergencies that are impacting the productivity of your network. Progent's security engineers are certified to provide help for systems based on Microsoft Windows, Linux, Apple macOS and OS X, Solaris, and popular versions of UNIX. Progent's broad array of services encompasses firewall technology, email security, secure network architecture, and disaster recovery preparedness. Progent's support team has earned the world's top security certifications including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional.
Progent offers online security support services on a per-minute model with no minimum times and no additional charges for setup or after hours support. By charging per minute and by providing top-level help, Progent's billing policy keeps costs under control and eliminates scenarios where quick solutions entail big charges.
We've Been Attacked: What Should We Do?
If your network is now faced with a security emergency, go to Progent's Emergency Remote Computer Help to find out how to receive immediate assistance. Progent has a pool of seasoned network security experts who offer remote and on-premises support that includes containment, mitigation, restoration, forensics, and enhancement of your security profile to guard against future exploits.
For businesses that have prepared beforehand for being hacked, the formal incident response procedure promoted by GIAC (Global Information Assurance Certification) is Progent's recommended method of reacting to a serious security incident.
Introduction to Security Services
Coordinating network protection plus preparedness for restoring vital data and systems after a security breach requires a continual effort that entails an array of tools and processes. Progent's certified consultants can assist your organization at all levels in your efforts to secure your information network, from security evaluation to creating a complete security plan. Some areas covered by Progent's security consultants include Security Planning and Implementation, Information Recovery and Security Forensics, and Managed Protection from E-mail-Based Spam and Viruses.
Designing and Building Secure Environments
Every business ought to have a thoroughly considered security plan that includes both preventive and reactive elements. The proactive plan is a collection of steps that works to minimize vulnerabilities. The post-attack plan specifies procedures to help IT staff to evaluate the losses caused by a breach, repair the damage, document the experience, and restore business activity as quickly as possible. Progent can show you how to design security into your business operations. Progent can set up scanning software, create and build a safe computer architecture, and propose procedures and policies to enhance the protection of your information system. Progent's security professionals are ready to assist you to configure a firewall, deploy safe offsite connectivity to e-mail and information, and install an effective VPN.
If you are interested in an affordable way for jobbing out your network security management, Progent's 24x7 Monitoring Services feature continual remote network tracking and quick response to problems.
Hybrid Cloud Solutions
Progent can assist your IT team you to design, deploy, manage and troubleshoot enterprise hybrid cloud solutions that incorporate local and cloud hosted infrastructure and that comply with regulatory security requirements. (Find out about Progent's Office 365 integration with on-premises Exchange deployments, Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud Platform planning and integration consulting.)
Data Recovery and Failure Analysis
Progent offers skill in restoring networks and servers that have been hacked, are in question, or have ceased to function because of a security penetration. Progent can help determine the losses resulting from the assault, return your company to normal functions, and retrieve information lost owing to the breach. Progent's security specialists can also manage a thorough forensic evaluation by examining event logs and using a variety of advanced forensics techniques. Progent's experience with security issues reduces your business disruption and allows Progent to recommend efficient strategies to prevent or mitigate new attacks.
Ransomware Removal and Recovery Consulting
Progent offers the help of experienced ransomware recovery experts with the skills to restore an information system compromised by a ransomware virus like Ryuk, Dharma, Hermes, or Locky. To find out more, see ransomware cleanup and restoration consulting.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning technology to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely get by legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to automate the complete threat lifecycle including blocking, identification, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge tools incorporated within one agent accessible from a single control. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry information security standards. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent's consultants can also assist your company to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and enables rapid restoration of vital files, applications and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight DPS to be compliant with regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top information security vendors to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported immediately to an alternate hardware solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can save up to half of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether you’re making enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Special Security Expertise Offered by Progent
Progent's seasoned consultants offer unique expertise in key facets of network security including:
Information Risk Evaluation and Compliance Assessment
Progent offers experience with information risk evaluation software such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic system scans to identify possible security holes. Progent has extensive skills with these tools and can assist you to understand audit results and respond efficiently. Progent's security consultants also offer web application testing and can perform expert evaluation of corporate-wide security to assess your company's compliance with important industry security standards including FISMA, NIST, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless protection covering in-place wireless appliances plus mobile devices. Learn more information concerning Progent's Security Vulnerability Audits and Compliance Assessment.
Cisco Network Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver in-depth technical support for Cisco's complete range of protection and Virtual Private Network products including PIX 500 Series Firewalls and ASA Series Firewalls, the Catalyst Firewall Services Module (FWSM), protected broadband and integrated services (IS) routers, wireless access points, Meraki cloud-managed Wi-Fi APs, and Catalyst switches. Find out more information about Cisco Security, Virtual Private Network (VPN) and Wireless Expertise.
Other Firewall and Virtual Private Network (VPN) Solutions
Stealth Penetration Testing Consulting
In addition to supporting a broad array of network security solutions available from Microsoft and Cisco, Progent can provide companies of any size top-level consulting for security products from other major firewall and Virtual Private Network (VPN) suppliers. Progent's consultants can provide:
Unannounced intrusion checking is a vital method for allowing companies to determine how vulnerable their information systems are to real-world threats by testing how effectively corporate protection policies and mechanisms hold up against planned but unannounced intrusion attempts instigated by seasoned security specialists utilizing advanced intrusion techniques. Find out more details concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Expertise
CISM defines the core competencies and international standards of performance that information technology security managers are required to master. It offers executive management the assurance that those who have been awarded their CISM possess the background and skill to provide effective security management and engineering services. Progent can offer a CISM-certified expert to assist your organization in critical security areas including information security governance, vulnerability management, information protection process management, and incident handling management.
Find out more information about Progent's CISM Security Consulting Services.
Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity specialists who have been awarded CISSP accreditation through verified experience, extensive study, and exhaustive testing. CISSP Certification recognizes expertise in an international standard for information security. ANSI has given the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Areas of knowledge included under CISSP include security management practices, security design and models, connection control methodology, applications development security, business processes security, physical security, encryption, telecommunications, Internet security, and disaster recovery planning.
Find out additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
CISSP-ISSAP Certified Consultants for Secure System Architecture
Progent's ISSAP Premier cybersecurity experts have been awarded ISSAP accreditation as a result of thorough testing and substantial hands-on work with network security architecture. ISSAP consultants possess comprehensive understanding of access control systems and methodologies, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-premier security specialists can assist your business with all phases of secure network architecture.
Find out additional details concerning Progent's ISSAP Certified Secure Network Infrastructure Consulting Services.
CISSP-ISSEP Premier Security Engineering Consultants
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide large organizations with the services expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent can provide the support of a certified CISSP-ISSEP cybersecurity expert to help your enterprise to utilize current system security engineering theory and techniques in system development, review and evaluate system security designs according to security engineering leading practices, produce cohesive system designs that incorporate compliant cybersecurity mechanisms for all key system functions, develop efficient configuration strategies to deliver protection for operations, perform comprehensive risk analysis, and propose practical security solutions that balance your operational requirements with your company's risk tolerance.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
Certified Information Systems Auditor Consulting Services
The Certified Information Systems Auditor accreditation is a prestigious qualification that represents expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo an extensive examination overseen by the ISACA international professional association. Progent offers the services of a CISA-Premier security audit consultant trained to assist companies in the fields of IS audit process, IT enforcement, systems and infrastructure lifecycle, IT support, protecting information assets, and business continuity planning.
Learn additional information about Progent's Certified Information Systems Auditor Consulting Services.
CRISC-certified IT Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's skills to plan, implement, and support IS controls to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity plan that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's risk management services are complementary to the services provided by Progent's CISA-Certified consultants for objectively evaluating your IS control mechanisms and also with the services of Progent's CISM support professionals for designing security policies and procedures.
Get additional information about Progent's CRISC-certified IT Risk Management Consulting.
GIAC Support Expertise
Global Information Assurance Certification was founded in 1999 to certify the knowledge of computer security experts. GIAC's goal is to make sure that a certified professional possesses the skills appropriate to provide support in critical categories of network, data, and application software security. GIAC certifications are recognized by businesses and government organizations all over the world including United States NSA. Progent can provide the assistance of certified consultants for any of the network security disciplines covered under GIAC accreditation programs such as auditing perimeters, security incident handling, intrusion detection, web-based application security, and security information and event management (SIEM) solutions.
Read more information concerning Progent's GIAC Information Assurance Expertise.
Contact Progent for Computer Security Support
If your business is situated in Brasília Federal District and you need cybersecurity engineering help, telephone Progent at 800-993-9400 or go to Contact Progent.
Brasilia Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the great Brasilia metro area.
Progent locations in Brasilia Metro