For fast online assistance with computer security problems, companies in Chesapeake Virginia have access to expert support from Progent's certified security engineers. Progent's online service consultants are ready to offer efficient and economical help with security problems that are impacting the viability of your network. Progent's accredited consultants are premier to support systems based on Microsoft, Linux, macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's wide array of consulting services covers firewall configuration, email security, secure system infrastructure, and disaster recovery planning. Progent's support staff has been awarded the industry's top security certifications including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional (CISSP).
Progent provides remote security expertise on a per-minute basis with no minimum times and without extra fees for setup or after hours support. By billing per minute and by providing world-class expertise, Progent's pricing policy keeps costs under control and eliminates situations where simple solutions entail major bills.
Our System Has Been Attacked: What Do We Do Now?
In case your network is currently fighting a security emergency, visit Progent's Emergency Remote Computer Support to learn how to receive fast aid. Progent maintains a team of certified network security specialists who offer online and onsite support that includes threat containment, mitigation, recovery, forensics, and hardening of your cybersecurity defense to protect against future attacks.
For organizations who have planned beforehand for an attack, the step-by-step incident response model promoted by GIAC (Global Information Assurance Certification) is Progent's approved method of handling a major security penetration.
Introduction to Security Services
Managing network security and preparedness for recovering critical data and systems following a security breach demands an on-going effort that entails a variety of tools and processes. Progent's certified professionals can assist your business at any level in your efforts to secure your IT network, ranging from security assessments to creating a complete security program. Some technologies supported by Progent's experts include Planning and Prevention, Information Recovery and Security Forensics, and Managed Filtering of E-mail-Based Spam and Viruses.
Designing and Implementing Secure Environments
Any business ought to develop a thoroughly considered security strategy that incorporates both proactive and reactive steps. The proactive strategy is a collection of steps that works to reduce vulnerabilities. The post-attack plan defines activities to assist security personnel to assess the losses resulting from a breach, repair the damage, document the experience, and revive network functions as quickly as feasible. Progent can advise you how to incorporate security into your business processes. Progent can configure scanning software, define and build a safe computer architecture, and recommend processes and policies that will optimize the safety of your information system. Progent's security professionals are ready to help you to configure a firewall, deploy secure offsite access to e-mail and information, and configure an effective VPN.
If your company is interested in an affordable way for jobbing out your network security management, Progent's Round-the-clock Network Support Packages include automated remote network monitoring and quick resolution of emergencies.
Hybrid Cloud Solutions
Progent can help your company you to plan, implement, manage and repair enterprise hybrid cloud solutions that include local and cloud hosted infrastructure and that comply with regulatory data security standards. (Learn about Progent's Microsoft 365 integration with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud Platform (GCP) planning and integration consulting.)
Data Recovery and Failure Analysis
Progent has expertise in recovering systems and computers that have been hacked, are in question, or have ceased to function following a security attack. Progent can show you how to evaluate the damage caused by the breach, restore normal functions, and recover data compromised owing to the event. Progent's security specialists can also perform a thorough failure analysis by examining event logs and using other advanced assessment tools. Progent's background with security issues reduces your downtime and permits Progent to propose effective strategies to prevent or mitigate new attacks.
Ransomware Cleanup and Recovery Services
Progent offers the help of seasoned ransomware recovery consultants with the knowledge to reconstruct an IT network victimized by a ransomware virus such as Ryuk, Dharma, NotPetya, or Locky. To learn more, see ransomware removal and recovery consulting.
Work-from-Home Security Solutions
At-home staff members commonly use their own devices and often operate in a unsecured physical area. This increases their susceptibility to malware threats and calls for careful configuration of firewalls, AV tools, multi-factor authentication, remote monitoring, intensive end-user education, and the development of security policies based on best practices. Progent's seasoned team of telecommuter support experts can assist your business to plan, implement and maintain an effective cybersecurity solution that guards critical IT resources in environments that incorporate telecommuters.
Software/Firmware Update Management Services
Progent's managed services for patch management offer organizations of all sizes a versatile and cost-effective solution for assessing, testing, scheduling, implementing, and documenting updates to your dynamic IT system. In addition to optimizing the protection and functionality of your computer environment, Progent's software/firmware update management services allow your IT staff to focus on line-of-business initiatives and tasks that derive the highest business value from your network. Find out more about Progent's software/firmware update management services.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes SentinelOne's next generation behavior machine learning technology to defend endpoint devices and physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely escape legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the complete threat progression including filtering, identification, containment, remediation, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense powered by SentinelOne technology.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical in-depth protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge tools packaged within one agent managed from a single control. Progent's data protection and virtualization experts can help your business to plan and implement a ProSight ESP deployment that meets your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry information security standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate action. Progent can also assist you to install and test a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
Progent has worked with leading backup/restore technology vendors to create ProSight Data Protection Services (DPS), a portfolio of offerings that deliver backup-as-a-service (BaaS). All ProSight DPS services automate and track your data backup processes and enable transparent backup and rapid recovery of important files, apps, images, plus Hyper-V and VMware virtual machines. ProSight DPS lets you protect against data loss caused by hardware breakdown, natural calamities, fire, cyber attacks like ransomware, user mistakes, ill-intentioned insiders, or software bugs. Managed services available in the ProSight DPS portfolio include ProSight Ataro VM Backup, ProSight Ataro Office 365 Total Backup, ProSight ECHO Backup based on Barracuda dedicated storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent expert can assist you to identify which of these fully managed backup services are most appropriate for your network.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security companies to provide web-based management and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Duo MFA: Two-factor Authentication (2FA) Services
Progent's Duo MFA service plans utilize Cisco's Duo cloud technology to defend against stolen passwords through the use of two-factor authentication (2FA). Duo supports single-tap identity confirmation with iOS, Google Android, and other out-of-band devices. With 2FA, whenever you sign into a protected application and give your password you are asked to verify who you are on a unit that only you have and that uses a different ("out-of-band") network channel. A wide range of devices can be utilized as this second form of authentication such as a smartphone or watch, a hardware/software token, a landline telephone, etc. You can designate multiple verification devices. To find out more about Duo identity validation services, visit Cisco Duo MFA two-factor authentication services for an at-home workforce.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains and warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you're planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Learn more details about ProSight IT Asset Management service.
Specialized Security Expertise Offered by Progent
Progent's certified consultants can provide world-class support in vital areas of IT protection including:
Information Risk Audits and Security Compliance Testing
Progent provides experience with information risk auditing utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of comprehensive system scans to reveal possible security problems. Progent has extensive skills with these tools and can assist you to analyze audit reports and respond appropriately. Progent's certified security engineers also offer web software validation and can conduct expert evaluation of enterprise-wide security to assess your company's compliance with key worldwide security standards such as HIPAA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including stationary wireless appliances plus portable devices. Get more details about Progent's Security Vulnerability Audits and Compliance Testing.
Cisco Security, PIX and ASA Firewall, VPN, Aironet and Meraki Wireless Help
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals can provide in-depth technical expertise for Cisco's complete range of security and Virtual Private Network products including PIX Series Firewalls and ASA 5500 Firewalls, Catalyst Firewall Services Module (FWSM), secure high-speed and integrated services (IS) routers, Aironet wireless access points, Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Get additional information about Cisco Protection, Virtual Private Network and Aironet Wireless Support.
Other Firewall and Virtual Private Network (VPN) Solutions
Stealth Penetration Testing Consulting
In addition to supporting a broad array of protection solutions from Microsoft and Cisco, Progent offers organizations of all sizes advanced support for technologies from other popular firewall and Virtual Private Network suppliers. Progent's consultants offer:
Stealth intrusion testing is a key method for allowing organizations to determine how susceptible their networks are to real-world threats by testing how well corporate security policies and mechanisms stand up against planned but unpublicized intrusion attempts instigated by seasoned security specialists using advanced intrusion methods. Read more details concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Support Services
CISM defines the fundamental competencies and international standards of service that information technology security professionals are required to achieve. CISM provides executive management the assurance that those who have been awarded their certification possess the background and skill to offer efficient security management and engineering services. Progent can offer a CISM-certified consultant to assist your organization in critical security disciplines including data security governance, vulnerability management, information protection program control, and incident response management.
Get more information about Progent's CISM Security Support Services.
CISSP Security Consulting Services
Progent's CISSP consultants are security specialists who have been awarded CISSP certification through verified professional work, extensive study, and exhaustive examination. CISSP qualification recognizes expertise in a worldwide standard for information security. ANSI has given the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include cybersecurity administration practices, security design and test systems, access control systems, software development security, operations security, hardware security, encryption, communications, network security, and business continuity planning.
Find out the details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Certified Consultants for Secure Network Infrastructure
Progent's ISSAP Certified cybersecurity experts have earned ISSAP status following rigorous examination and substantial experience. field experience with network security architecture. ISSAP security experts possess comprehensive knowledge of access control mechanisms and techniques, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security. Progent's ISSAP-certified security experts can help your company with all phases of secure network architecture.
Read more details concerning Progent's ISSAP Accredited Protected System Infrastructure Engineering Support.
CISSP-ISSEP Certified Cybersecurity Engineering Experts
Network Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide large organizations with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the skills of a certified CISSP-ISSEP cybersecurity expert to assist your enterprise to follow modern system security engineering principles and techniques in system development, review system security designs based on security engineering leading practices, create viable system designs that include compliant security mechanisms for all critical system functions, define effective design strategies to deliver protection for operations, perform in-depth risk analysis, and recommend practical cybersecurity solutions that balance your operational goals with your organization's tolerance for risk.
Find out the details about Progent's CISSP-ISSEP Network Security Engineering Consulting.
Certified Information Systems Auditor Professional Expertise
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that signifies expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants undergo an exhaustive examination overseen by the ISACA international professional group. Progent can provide the expertise of a CISA-Certified security audit professional able to assist businesses in the areas of information systems audit process, IT administration, systems and architecture lifecycle, IT support, protecting data assets, and business continuity preparedness.
Read additional information about Progent's Certified Information Systems Auditor Professional Expertise.
CRISC Network Risk Management Experts
The CRISC program was established by ISACA to verify a consultant's ability to design, implement, and maintain information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's network risk management services are a good fit the services provided by Progent's CISA-Premier security engineers for objectively assessing your IS control design and with the services of Progent's CISM-certified experts for designing company-wide security policies and procedures.
Learn additional information concerning Progent's CRISC Risk Mitigation Support.
GIAC Support Services
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to verify that a certified professional possesses the skills appropriate to deliver support in important areas of network, data, and program security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including U.S. National Security Agency. Progent can provide the assistance of certified security engineers for all of the security capabilities covered within GIAC accreditation topics such as auditing IT infrastructure, security incident handling, intrusion detection, web application security, and security information and event management (SIEM) solutions.
Read additional details concerning Progent's GIAC Information Assurance Services.
Depend on Progent for Network Security Consulting Services
If your organization is located in Chesapeake Virginia and you're looking for cybersecurity expertise, call Progent at 800-993-9400 or see Contact Progent.
Hampton Roads Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Hampton Roads Area.
Progent locations in
Hampton Roads Metro Area