To get immediate online assistance with computer security problems, companies in Columbus Ohio can find world-class support from Progent's certified security engineers. Progent's remote service staff is ready to offer effective and economical help with security emergencies that threaten the viability of your IT network. Progent's accredited security consultants are certified to provide help for environments powered by Microsoft Windows, Linux, Apple macOS and OS X, Sun Solaris, and popular derivatives of UNIX. Progent's broad array of consulting services addresses firewall expertise, email filtering and encryption, secure system architecture, and business continuity preparedness. Progent's technical support staff has been awarded the world's top security certifications including GIAC and Certified Information Systems Security Professional.
Progent provides remote security support services on a per-minute model without minimum call duration and no extra charges for setup or off-hour support. By billing per minute and by providing top-level expertise, Progent's billing model keeps costs low and eliminates situations where quick fixes entail big expenses.
Our System Has Been Hacked: What Do We Do?
In case you are now fighting a security crisis, go to Progent's Emergency Online Computer Help to find out how to receive fast help. Progent maintains a pool of seasoned cybersecurity experts who can provide online and on-premises support that includes containment, mitigation, restoration, forensics, and enhancement of your security profile to guard against future attacks.
For organizations that have prepared beforehand for an attack, the formal post-attack handling model promoted by GIAC is Progent's approved method of responding to a major security incident.
Overview of Progent's Security Services
Coordinating network security and preparation for restoring vital data and functions following an attack requires a continual program that entails an array of tools and processes. Progent's certified consultants can help your business at all levels in your attempt to guard your IT system, from security evaluation to creating a comprehensive security plan. Important technologies supported by Progent's experts include Security Planning and Implementation, Information Recovery and Security Failure Analysis, and Managed Filtering of Email-Based Spam and Viruses.
Planning and Building Protected Environments
Every company ought to have a thoroughly considered security strategy that incorporates both preventive and reactive elements. The pre-attack plan is a set of steps that works to minimize security gaps. The post-attack plan defines procedures to assist security staff to inventory the losses resulting from an attack, remediate the damage, document the event, and restore business functions as quickly as possible. Progent can advise you how to build security into your business operations. Progent can install auditing software, create and execute a secure network infrastructure, and propose procedures and policies to maximize the protection of your computing environment. Progent's security professionals are available to help you to configure a firewall, deploy safe remote connectivity to e-mail and data, and configure an efficient virtual private network (VPN).
If you are interested in an affordable option for jobbing out your security administration, Progent's 24x7 Network Support Options feature automated remote server monitoring and fast resolution of problems.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, manage and troubleshoot enterprise hybrid cloud solutions that combine local and cloud-based infrastructure and that are compliant with regulatory security standards. (Find out about Progent's Office 365 integration solutions with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud Platform planning and integration expertise.)
System Recovery and Failure Analysis
Progent provides expertise in recovering systems and servers that have been hacked, are suspect, or have ceased to function following a security breakdown. Progent can show you how to assess the losses resulting from the assault, restore normal business operations, and retrieve information lost owing to the event. Progent's certified engineers can also manage a comprehensive forensic evaluation by examining event logs and utilizing a variety of proven assessment tools. Progent's background with security issues minimizes your downtime and allows Progent to suggest efficient ways to avoid or contain new attacks.
Ransomware Cleanup and Restoration Consulting
Progent can provide the services of experienced ransomware recovery consultants with the knowledge to restore a network that has suffered an attack by a ransomware cryptoworm like Ryuk, WannaCry, NotPetya, or Locky. To learn more, see ransomware removal and recovery expertise.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning tools to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily escape legacy signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the complete malware attack lifecycle including filtering, identification, containment, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services offer economical multi-layer security for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, device management, and web filtering through cutting-edge tools incorporated within one agent managed from a unified control. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP deployment that meets your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent can also help your company to install and verify a backup and restore solution such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of critical files, apps and virtual machines that have become unavailable or corrupted as a result of component failures, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's BDR specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPAA, FINRA, and PCI and, whenever necessary, can help you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security companies to provide web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hardware solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as half of time wasted searching for vital information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more details about ProSight IT Asset Management service.
Specialized Security Services Available from Progent
Progent's certified security engineers can provide unique specialized help in vital facets of computer protection such as:
Information Risk Audits and Security Compliance Assessment
Progent provides experience with information risk evaluation utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of comprehensive network tests to reveal possible security gaps. Progent has broad skills with these tools and can help your company to understand audit results and respond efficiently. Progent's certified security engineers also provide web application testing and can conduct thorough evaluation of corporate-wide security to determine your organization's compliance with key global security standards such as FISMA, NIST, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless security covering stationary wireless appliances plus mobile devices. Learn additional details concerning Progent's Information Risk Evaluation and Compliance Testing.
Cisco Network Security, PIX and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco CCNP experts can deliver world-class consulting expertise for Cisco's entire range of security and Virtual Private Network solutions including PIX 500 Series Firewalls and ASA Series Firewalls, Catalyst Firewall Services Module (FWSM), secure broadband and integrated services (IS) routers, Aironet wireless access points and bridges, Meraki cloud-managed Wi-Fi access points, and Catalyst family switches. Learn more details concerning Cisco Protection, Virtual Private Network (VPN) and Aironet Wireless Help.
Additional Firewall and Virtual Private Network (VPN) Technologies
Unannounced Intrusion Testing Consulting
In addition to supporting a broad array of security solutions available from Microsoft and Cisco, Progent can provide organizations of all sizes expert support for technologies from other important firewall and Virtual Private Network (VPN) vendors. Progent's engineers offer:
Stealth penetration checking is a key method for helping organizations to understand how exposed their IT environments are to real-world threats by testing how effectively network protection processes and mechanisms stand up to authorized but unpublicized intrusion attempts instigated by seasoned security engineers utilizing advanced intrusion techniques. Read more information about Progent's Penetration Testing Services.
CISM Security Support Expertise
CISM identifies the fundamental skills and worldwide standards of performance that information technology security managers are required to achieve. CISM provides executive management the assurance that those who have earned their accreditation possess the experience and skill to provide effective security administration and engineering services. Progent can provide a CISM-certified expert to help your organization in key security disciplines including information protection governance, risk assessment, information protection program control, and crisis response management.
Learn more information about Progent's Certified Information Security Manager (CISM) Security Support Assistance.
CISSP Security Consulting Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP status through verified professional work, extensive study, and formal examination. CISSP Certification indicates expertise in a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Fields of knowledge covered under CISSP include security management procedures, security architecture and models, access permission methodology, applications development security, operations security, hardware security, encryption, telecommunications, network security, and disaster recovery planning.
Find out more information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
CISSP-ISSAP Certified Consultants for Secure Network Infrastructure
Progent's ISSAP Certified cybersecurity consultants are specialists who have been awarded ISSAP certification following rigorous testing and extensive experience. field experience with network security architecture. ISSAP security experts have acquired comprehensive understanding of access management systems and techniques, telecommunications and network security, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture.
Find out the details about Progent's ISSAP Accredited Protected IT Architecture Engineering Services.
CISSP-ISSEP Premier Security Engineering Experts
Cybersecurity consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide enterprises with the services associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the skills of a certified CISSP-ISSEP cybersecurity consultant to assist your enterprise to follow modern system security engineering principles and techniques in system development, review system security designs based on cybersecurity engineering best practices, create viable system designs that include compliant security features for all critical system functions, define efficient design strategies to deliver operational security, perform in-depth risk analysis, and recommend realistic security models that balance your operational requirements with your organization's risk tolerance.
Find out the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
Certified Information Systems Auditor Support Services
The Certified Information Systems Auditor credential is a recognized achievement that signifies expertise in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that consultants pass a comprehensive test overseen by the ISACA professional group. Progent offers the expertise of a CISA-Premier security engineer trained to help businesses in the fields of information systems audit services, information technology governance, network assets and architecture lifecycle, IT support, safeguarding information resources, and disaster recovery preparedness.
Learn the details about Progent's CISA Consulting Services.
CRISC-certified IT Risk Mitigation Consultants
The CRISC program was initiated by ISACA to verify an IT professional's ability to design, implement, and maintain information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's risk mitigation expertise is complementary to the support provided by Progent's CISA-Premier security engineers for impartially assessing your IT management mechanisms and also with the services of Progent's CISM support professionals for designing company-wide security policies and procedures.
Read the details about Progent's CRISC Risk Management Expertise.
GIAC (Global Information Assurance Certification) Professional Expertise
GIAC was established in 1999 to validate the knowledge of computer security engineers. GIAC's mission is to verify that a certified professional possesses the skills needed to deliver services in key areas of system, information, and application software security. GIAC accreditations are acknowledged by businesses and institutions around the world including U.S. National Security Agency (NSA). Progent can provide the assistance of certified professionals for all of the security disciplines covered within GIAC accreditation topics such as assessing IT infrastructure, incident handling, traffic analysis, web-based application security, and SIEM solutions.
Read more information concerning Progent's GIAC Information Assurance Services.
Get in Touch with Progent for Network Security Support
If your company is situated in Columbus Ohio and you want cybersecurity expertise, phone Progent at 800-993-9400 or visit Contact Progent.
Columbus region Contact Information:
Progent offers consulting services and onsite technical support throughout Columbus and the surrounding metro areas.
Progent locations in Columbus region
||1717 Brittain Rd
Akron, OH 44310
||Akron Network Support Services
||250 East 5th Street, 15th Floor
Cincinnati, OH 45202
||Cincinnati Network Support Services
||2515 Jay Ave.
Cleveland, OH 44113
||Cleveland Network Support Services
||20 S 3rd St, Suite 210
Columbus, OH 43215
||Columbus Network Support Services
||301 W 1st St, Suite 200
Dayton, OH 45402
||Dayton Network Support Services
||535 Griswold St
Detroit, MI 48226
||Detroit Network Support Services
||921 E Dupont Rd
Fort Wayne, IN 46825
||Fort Wayne Network Support Services
|| 3960 Southeastern Avenue
Indianapolis, IN 46204
||Indianapolis Network Support Services
||Lexington Main Street Suites, 710 E. Main Street
Lexington, KY 40502
||Lexington-Fayette Network Support Services
||1229 S Shelby St
Louisville, KY 40203
||Louisville Network Support Services
||606 Liberty Ave
Pittsburgh, PA 15222
||Pittsburgh Network Support Services
||19785 W 12 Mile Rd
Southfield, MI 48076
||Southfield Network Support Services
||5533 Southwyck Boulevard, Suite 101
Toledo, OH 43614
||Toledo Network Support Services