Columbus Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Columbus Metro Area.
Progent locations in the Columbus Metro Area
To get immediate online help with network security problems, companies in Columbus, OH, can find world-class support from Progent's certified security engineers. Progent's online service staff is ready to offer effective and economical assistance with security crises that threaten the viability of your information system. Progent's accredited engineers are qualified to provide help for environments based on Windows, Linux, Apple macOS and OS X, Sun, and major versions of UNIX. Progent's broad selection of services encompasses firewall expertise, email filtering and encryption, protected system infrastructure, and business continuity preparedness. Progent's support staff has been awarded the industry's most advanced security accreditations including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional.
Progent offers remote security support services on a per-minute basis with no minimum minutes and no extra charges for sign-up or after hours support. By billing per minute and by providing top-level support, Progent's billing policy keeps costs low and eliminates scenarios where quick solutions entail major expenses.
We've Been Hacked: What Do We Do?
If your business is currently experiencing a security emergency, go to Progent's Urgent Remote Computer Support to see how to get fast aid. Progent maintains a pool of certified cybersecurity specialists who can provide remote and on-premises support that includes threat containment, mitigation, recovery, forensics, and hardening of your cybersecurity profile to guard against future attacks.
For organizations that have planned carefully for a security breech, the step-by-step post-attack handling model promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of responding to a major security incident.
Introduction to Security Expertise
Managing network protection plus planning for restoring vital data and functions following a security breach requires an on-going process involving a variety of tools and processes. Progent's certified security experts can support your business at all levels in your efforts to secure your IT system, from security evaluation to creating a comprehensive security program. Key areas supported by Progent's security engineers include Security Planning and Implementation, Information Recovery and Security Failure Analysis, and Managed Protection from Email-Based Spam and Viruses.
Planning and Implementing Protected Networks
Every business should develop a carefully thought out security plan that includes both proactive and responsive activity. The pre-attack strategy is a collection of steps that works to reduce security gaps. The reactive strategy specifies activities to assist security personnel to inventory the damage resulting from a breach, remediate the damage, record the experience, and revive network functions as soon as feasible. Progent can advise you how to build protection into your business processes. Progent can configure scanning software, create and implement a secure computer infrastructure, and recommend procedures and policies that will enhance the safety of your network. Progent's security experts are available to assist you to configure a firewall, design protected remote connectivity to e-mail and information, and install an effective virtual private network.
If your company is interested in an economical way for outsourcing your security management, Progent's Round-the-clock Network Support Options feature continual remote system tracking and quick response to emergencies.
Hybrid Cloud Solutions
Progent can help your company you to plan, deploy, manage and troubleshoot enterprise hybrid cloud solutions that include local and cloud hosted resources and that are compliant with government and industry security requirements. (Learn about Progent's Office 365 Exchange Online integration solutions with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
System Restoration and Failure Analysis
Progent provides skill in recovering networks and computers that have been compromised, are in question, or have ceased to function because of a security breakdown. Progent can help evaluate the damage resulting from the attack, restore normal functions, and retrieve data compromised owing to the assault. Progent's security engineers can also manage a comprehensive forensic evaluation by going over activity logs and utilizing a variety of proven forensics tools. Progent's experience with security problems reduces your downtime and permits Progent to propose effective measures to prevent or mitigate new attacks.
Ransomware Removal and Restoration Expertise
Progent can provide the help of seasoned ransomware recovery experts with the skills to reconstruct an information system compromised by a ransomware cryptoworm such as Ryuk, WannaCry, Hermes, or MongoLock. For more information, see ransomware cleanup and restoration expertise.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based machine learning tools to guard endpoint devices as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-based anti-virus tools. ProSight ASM protects local and cloud resources and provides a single platform to manage the complete threat progression including filtering, detection, containment, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer economical multi-layer security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can help you to design and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you prove compliance with legal and industry information security standards. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent action. Progent's consultants can also help you to install and test a backup and disaster recovery system such as ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates your backup processes and enables rapid recovery of critical data, apps and virtual machines that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security companies to provide centralized control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard data about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can eliminate as much as 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Find out more details about ProSight IT Asset Management service.
Specialized Security Services Offered by Progent
Progent's certified security consultants can provide unique consulting support in key facets of computer protection including:
Information Risk Evaluation and Compliance Testing
Progent provides experience with security evaluation software like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of comprehensive system scans to identify potential security gaps. Progent has extensive experience with scanning tools and can assist your company to understand assessment results and respond efficiently. Progent's security consultants also provide web software validation and can perform thorough assessments of enterprise-wide security to assess your organization's compliance with major global security specifications such as FISMA, PCI, and ISO. Also, Progent can evaluate the effectiveness of your wireless security covering in-place wireless appliances as well as portable handsets. Learn more details about Progent's Vulnerability Audits and Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Expertise
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can deliver in-depth technical services for Cisco's complete family of security and VPN solutions including PIX 500 Firewalls and ASA 5500 Firewalls, Catalyst Firewall Services Module, protected high-speed and integrated services routers, Aironet wireless access points, Cisco Meraki cloud-managed Wi-Fi APs, and Catalyst Series switches. Learn additional information about Cisco Security, Virtual Private Network and Wireless Support.
Additional Firewall and Virtual Private Network (VPN) Consulting Services
Unannounced Intrusion Checking Services
In addition to being expert in a wide array of network security solutions from Microsoft and Cisco, Progent can provide organizations of all sizes top-level consulting for technologies from other popular firewall and Virtual Private Network (VPN) vendors. Progent's consultants offer:
Stealth intrusion testing is a valuable method for helping organizations to determine how exposed their IT systems are to real-world threats by testing how thoroughly corporate security policies and technologies hold up against planned but unpublicized penetration efforts instigated by seasoned security engineers using advanced hacking techniques. Read more information concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager identifies the basic skills and international standards of performance that information security professionals are required to achieve. It provides business management the assurance that consultants who have earned their CISM possess the background and skill to provide effective security management and consulting services. Progent can offer a CISM support professional to help your organization in key security areas such as information security governance, risk assessment, information security program management, and incident handling management.
Get more information concerning Progent's Certified Information Security Manager Security Consulting Expertise.
Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's CISSP consultants are security engineers who have earned CISSP status through verified experience, rigorous study, and exhaustive examination. CISSP Certification indicates expertise in an international standard for IT security. American National Standards Institute has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include security management procedures, security architecture and test systems, connection control systems, applications development security, business processes security, physical security, encryption, telecommunications, network security, and disaster recovery planning.
Learn additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Qualified Consultants for Secure System Infrastructure
Progent's ISSAP qualified cybersecurity experts have earned ISSAP accreditation following thorough examination and significant hands-on work with information security architecture. ISSAP security experts have acquired in-depth knowledge of access control systems and methodologies, telecommunications and network security, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture.
Get additional details concerning Progent's ISSAP Certified Secure Network Infrastructure Engineering Support.
CISSP-ISSEP Certified Security Engineering Experts
Cybersecurity consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide large organizations with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP network security expert to assist your enterprise to utilize current system security engineering principles and techniques in system development, review and evaluate system security designs based on security engineering leading practices, produce viable system designs that incorporate compliant security features for all key system functions, define efficient configuration strategies to provide protection for operations, perform in-depth risk analysis, and recommend realistic security models that balance your operational goals with your organization's risk tolerance.
Find out the details about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.
Certified Information Systems Auditor Consulting Expertise
The CISA accreditation is a recognized qualification that indicates mastery in information system security auditing. Certified by ANSI, the CISA credential requires that consultants pass an exhaustive test overseen by the ISACA international professional group. Progent can provide the services of a CISA-qualified security consultant trained to assist businesses in the areas of information systems audit process, IT governance, systems and architecture planned useful life, information technology support, protecting data resources, and business continuity planning.
Read more information about Progent's CISA Consulting Expertise.
CRISC-certified Risk Mitigation Experts
The CRISC program was established by ISACA to verify a consultant's ability to design, implement, and maintain IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's network risk mitigation expertise is complementary to the services available from Progent's CISA-qualified consultants for impartially auditing your IS control design and also with the services of Progent's CISM-certified support professionals for implementing company-wide security policies.
Get the details about Progent's CRISC-certified IT Risk Mitigation Expertise.
Global Information Assurance Certification Professional Expertise
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security experts. GIAC's mission is to make sure that a certified professional has the knowledge needed to provide support in important areas of network, information, and application security. GIAC certifications are recognized by companies and institutions throughout the world including United States National Security Agency. Progent offers the help of GIAC certified consultants for all of the network security disciplines addressed under GIAC accreditation topics including auditing networks, incident handling, intrusion detection, web application security, and SIEM solutions.
Read more information about Progent's GIAC Information Assurance Services.
Get in Touch with Progent for Computer Security Support
If your organization is located in Columbus or anywhere in the state of Ohio and you want network security consulting, call Progent at 800-993-9400 or see Contact Progent.