Greater Chicago Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Greater Chicago Metro Area.
Progent locations in the Greater Chicago Metro Area
||500 North Michigan Avenue
Chicago, Illinois 60611
|Sales Phone: 312-800-0223
Link: Chicago Network Support Services
|Downers Grove, IL
||650 Warrenville Rd
Lisle, Illinois 60532
|Sales Phone: 331-251-1422
Link: Downers Grove, IL Network Support Services
||1900 E Golf Rd
Schaumburg, Illinois 60173
|Sales Phone: 847-944-8599
Link: Schaumburg, IL Network Support Services
||1363 Shermer Road
Northbrook, Illinois 60062
|Sales Phone: 224-534-2088
Link: Skokie, IL Network Support Services
To get fast remote help with computer security problems, businesses in Chicago, IL, can find world-class support by contacting Progent's certified security professionals. Progent's online support consultants are available to offer fast and economical assistance with security emergencies that are impacting the productivity of your IT network. Progent's security engineers are qualified to provide help for environments based on Microsoft, Linux, macOS and OS X, Solaris, and popular derivatives of UNIX. Progent's wide range of consulting services covers firewall configuration, email security, protected network architecture, and disaster recovery planning. Progent's support team has been awarded the world's most advanced security accreditations including Global Information Assurance Certification and Certified Information Systems Security Professional.
Progent provides remote security expertise on a by-the-minute model with no minimum call duration and without extra charges for setup or off-hour support. By billing per minute and by providing top-level help, Progent's billing model keeps costs under control and eliminates scenarios where quick fixes turn into big charges.
Our System Has Been Attacked: What Can We Do Now?
If you are now experiencing a security emergency, visit Progent's Urgent Online Computer Support to find out how to receive fast aid. Progent has a pool of certified network security specialists who can provide remote and on-premises support that includes threat containment, mitigation, recovery, forensics, and hardening of your cybersecurity profile to protect against future exploits.
For organizations who have planned in advance for being hacked, the step-by-step post-attack handling model outlined by Global Information Assurance Certification is Progent's approved method of reacting to a serious security attack.
Introduction to Progent's Security Services
Managing computer security and planning for restoring critical data and systems following a security breach requires a continual process involving a variety of technologies and procedures. Progent's security professionals can support your business at whatever level in your attempt to secure your IT system, ranging from security assessments to creating a complete security program. Important technologies covered by Progent's security engineers include Security Planning and Implementation, Data Recovery and Security Failure Analysis, and Managed Protection from E-mail-Borne Threats.
Designing and Implementing Protected Networks
Every company should have a thoroughly considered security strategy that includes both preventive and reactive steps. The pre-attack plan is a collection of steps that helps to minimize vulnerabilities. The post-attack strategy specifies procedures to assist security personnel to evaluate the damage resulting from a breach, repair the damage, record the experience, and restore business functions as quickly as feasible. Progent can advise you how to incorporate protection into your business processes. Progent can configure scanning software, define and build a safe IT infrastructure, and recommend procedures and policies to enhance the safety of your computing environment. Progent's security professionals are ready to help you to configure a firewall, deploy secure offsite access to email and information, and configure an effective virtual private network.
If your company is looking for an affordable way for outsourcing your network security administration, Progent's 24x7 Monitoring Packages feature automated remote network tracking and quick resolution of emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to design, implement, manage and repair enterprise hybrid cloud solutions that combine local and cloud hosted resources and that comply with regulatory security standards. (Find out about Progent's Office 365 Exchange Online integration with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
System Restoration and Security Forensics
Progent has skill in recovering networks and computers that have been compromised, are in question, or have ceased to function because of a security attack. Progent can help evaluate the damage caused by the attack, restore normal business operations, and retrieve data lost as a result of the assault. Progent's security specialists can also oversee a comprehensive forensic analysis by going over event logs and using a variety of proven forensics techniques. Progent's experience with security consulting minimizes your downtime and permits Progent to suggest efficient strategies to avoid or mitigate new assaults.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the entire malware attack progression including blocking, infiltration detection, containment, remediation, and forensics. Key features include single-click rollback using Windows VSS and real-time system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device control, and web filtering through cutting-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP deployment that addresses your company's specific needs and that helps you demonstrate compliance with government and industry information security regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent can also help your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of vital files, applications and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images/, as well as Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class expertise to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can help you to recover your critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security companies to deliver web-based management and comprehensive protection for your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect information related to your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate up to half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you’re making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more details about ProSight IT Asset Management service.
Special Security Services Available from Progent
Progent's certified consultants can provide world-class support in vital facets of network security such as:
Vulnerability Audits and Compliance Testing
Progent offers experience with security auditing tools like Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic system tests to uncover possible security problems. Progent has broad experience with these and similar tools and can assist you to understand audit results and react efficiently. Progent's certified security consultants also can perform web software testing and can conduct expert evaluation of enterprise-wide security to determine your organization's compliance with important global security standards such as HIPAA, NIST, and ISO. Also, Progent can assess the strength of your wireless security covering in-place wireless appliances plus portable handsets. Find out the details about Progent's Information Risk Audits and Security Compliance Assessment.
Cisco Network Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can provide in-depth consulting support for Cisco's complete family of protection and Virtual Private Network solutions including PIX 500 Series Firewalls and ASA Series Firewalls, the Catalyst FWSM, protected high-speed and integrated services routers, wireless access points, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst family switches. Find out additional details concerning Cisco Protection, VPN and Wireless Expertise.
Additional Firewall and Virtual Private Network (VPN) Consulting Services
Unannounced Penetration Testing Services
In addition to supporting a broad range of protection solutions available from Microsoft and Cisco, Progent can provide businesses of any size expert engineering services for technologies from other popular firewall and Virtual Private Network suppliers. Progent's engineers can provide:
Unannounced intrusion testing is a key technique for allowing businesses to find out how exposed their information systems are to potential attacks by showing how thoroughly network protection procedures and mechanisms hold up to authorized but unpublicized intrusion attempts instigated by seasoned security specialists using the latest hacking methods. Read additional details about Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Services
Certified Information Security Manager (CISM) identifies the basic competencies and international standards of performance that computer security professionals are expected to achieve. It offers executive management the assurance that those who have earned their certification have the experience and knowledge to provide effective security administration and engineering services. Progent can offer a CISM support professional to assist your organization in vital security disciplines such as information security governance, vulnerability management, data security process control, and incident handling management.
Read the details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.
CISSP Security Consulting Expertise
Progent's CISSP consultants are security engineers who have been awarded CISSP accreditation as a result of verified experience, rigorous study, and exhaustive examination. CISSP qualification indicates expertise in an international standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security administration practices, security architecture and test systems, access permission systems, applications development security, business processes security, hardware security, encryption, telecommunications, network security, and disaster recovery planning.
Read additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Certified Consultants for Secure System Infrastructure
Progent's ISSAP certified security experts have earned ISSAP accreditation after rigorous examination and substantial hands-on work with network security architecture. ISSAP consultants have acquired comprehensive knowledge of access control systems and techniques, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture.
Get more details concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Services.
CISSP-ISSEP Certified Cybersecurity Engineering Consultants
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide large organizations with the services expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent can provide the skills of a certified CISSP-ISSEP cybersecurity consultant to assist your enterprise to utilize modern system security engineering theory and processes in system development, evaluate system security designs according to security engineering leading practices, create cohesive system designs that incorporate compliant security mechanisms for all key system functions, develop efficient design strategies to provide operational security, perform comprehensive risk analysis, and recommend realistic cybersecurity models that balance your operational goals with your organization's tolerance for risk.
Learn the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
CISA Security Auditor Support Expertise
The CISA accreditation is a globally recognized achievement that signifies expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test administered by the ISACA international professional association. Progent can provide the services of a CISA-certified security professional able to assist companies in the areas of IS audit process, IT administration, network assets and infrastructure planned useful life, IT support, protecting data resources, and disaster recovery preparedness.
Get additional details concerning Progent's Certified Information Systems Auditor (CISA) Support Services.
CRISC-certified Risk Management Consultants
The CRISC certification program was established by ISACA to verify a consultant's skills to design, deploy, and support information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity plan based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's network risk management services are complementary to the support provided by Progent's CISA-certified consultants for impartially evaluating your IS control design and also with the services of Progent's CISM-certified experts for implementing company-wide security policies.
Find out additional details about Progent's CRISC-certified Network Risk Management Consulting.
GIAC (Global Information Assurance Certification) Professional Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security experts. GIAC's mission is to ensure that an accredited professional possesses the skills appropriate to provide support in important categories of network, data, and application program security. GIAC certifications are recognized by companies and institutions throughout the world including United States NSA. Progent offers the expertise of GIAC certified consultants for any of the network security capabilities covered under GIAC accreditation programs including auditing perimeters, security incident response, traffic analysis, web services security, and SIEM solutions.
Find out additional details concerning Progent's GIAC Information Assurance Expertise.
Contact Progent for Computer Security Help
If your company is located in Chicago or anywhere in Illinois and you're trying to find computer security expertise, call Progent at 800-993-9400 or visit Contact Progent.