To get immediate online assistance with data security issues, businesses in Durham North Carolina can find expert expertise from Progent's security engineers. Progent's online support consultants are available to provide fast and economical help with security problems that are impacting the viability of your IT network. Progent's accredited security engineers are certified to provide help for systems based on Microsoft, Linux, macOS and OS X, Sun, and popular derivatives of UNIX. Progent's broad array of services covers firewall technology, email security, secure network infrastructure, and business continuity planning. Progent's support staff has earned the world's top security accreditations including Certified Information Systems Auditor and Certified Information Systems Security Professional.
Progent offers remote security assistance on a per-minute basis with no minimum times and without extra fees for setup or after hours service. By billing by the minute and by providing top-level help, Progent's pricing structure keeps expenses low and eliminates scenarios where simple solutions result in big charges.
We've Been Hacked: What Should We Do?
In case your network is currently faced with a security emergency, go to Progent's Urgent Online Network Help to learn how to receive fast assistance. Progent has a team of veteran network security specialists who offer remote and on-premises support that includes containment, mitigation, restoration, forensics, and hardening of your security profile to guard against future exploits.
For businesses that have planned beforehand for being hacked, the step-by-step post-attack handling model promoted by GIAC (Global Information Assurance Certification) is Progent's approved method of reacting to a serious security penetration.
Overview of Security Support Services
Managing computer security as well as staying ready for restoring vital information and functions following an attack requires an on-going process involving a variety of tools and procedures. Progent's security engineers can support your organization at all levels in your attempt to safeguard your information network, ranging from security assessments to creating a complete security strategy. Key areas covered by Progent's security engineers include Security Planning and Prevention, Information Recovery and Security Forensics, and Managed Protection from Email-Borne Spam and Viruses.
Planning and Implementing Protected Environments
Every business should develop a carefully thought out security strategy that incorporates both proactive and reactive activity. The proactive plan is a collection of precautions that works to reduce vulnerabilities. The post-attack strategy specifies procedures to assist security personnel to assess the losses caused by an attack, remediate the damage, record the experience, and revive network activity as quickly as feasible. Progent can show you how to design protection into your company processes. Progent can set up auditing utilities, define and implement a secure computer architecture, and recommend procedures and policies to maximize the safety of your computing environment. Progent's security professionals are ready to help you to set up a firewall, design secure offsite access to email and data, and configure an effective virtual private network (VPN).
If you are looking for an economical option for outsourcing your security administration, Progent's Round-the-clock Monitoring Packages include non-stop remote network monitoring and fast response to emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to design, implement, manage and troubleshoot enterprise hybrid cloud solutions that combine physical and cloud-based infrastructure and that comply with regulatory security requirements. (Learn about Progent's Microsoft 365 Exchange Online integration solutions with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud planning and integration consulting.)
System Restoration and Failure Analysis
Progent has expertise in restoring systems and computers that have been compromised, are suspect, or have stopped working because of a security attack. Progent can show you how to assess the losses resulting from the attack, return your company to normal business operations, and retrieve data lost as a result of the event. Progent's certified engineers can also perform a comprehensive failure analysis by going over event logs and using other proven assessment techniques. Progent's experience with security issues reduces your downtime and allows Progent to propose effective strategies to avoid or contain new attacks.
Ransomware Cleanup and Restoration Services
Progent can provide the services of proven ransomware recovery consultants with the skills to restore an environment damaged by a ransomware virus like Ryuk, WannaCry, Hermes, or Locky. To find out more, visit ransomware removal and recovery consulting.
Ransomware Hot Line: 800-462-8800
Ransomware needs time to steal its way through a target network. For this reason, ransomware attacks are typically unleashed on weekends and at night, when support personnel may be slower to become aware of a breach and are least able to organize a rapid and forceful response. The more lateral movement ransomware is able to manage within a target's network, the longer it takes to restore core operations and damaged files and the more data can be exfiltrated to the dark web. Progent's Ransomware Hot Line is designed to assist organizations to take the urgent first phase in mitigating a ransomware attack by containing the malware. Progent's remote ransomware engineers can assist businesses to identify and isolate infected devices and protect clean resources from being compromised. If your network has been penetrated by any version of ransomware, act fast. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
Work-from-Home Security Consulting
Work-from-Home employees commonly utilize their own computing devices and often operate in a unsecured physical environment. This increases their vulnerability to malware attacks and requires careful deployment of firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, extensive user education, and the creation of policies built on best practices. Progent's veteran roster of telecommuter support consultants can help you to plan, implement and manage a compliant security solution that guards critical IT resources in networks that incorporate an at-home workforce.
Software/Firmware Update Management Services
Progent's support services for patch management offer organizations of any size a versatile and affordable alternative for evaluating, validating, scheduling, applying, and tracking software and firmware updates to your ever-evolving IT system. In addition to optimizing the security and functionality of your IT environment, Progent's software/firmware update management services allow your in-house IT staff to concentrate on line-of-business initiatives and activities that derive the highest business value from your network. Find out more about Progent's software/firmware update management services.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that utilizes SentinelOne's cutting edge behavior-based analysis technology to guard endpoints as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely get by traditional signature-based anti-virus tools. ProSight ASM safeguards local and cloud resources and offers a single platform to automate the complete threat progression including filtering, identification, mitigation, remediation, and forensics. Key capabilities include one-click rollback using Windows VSS and real-time system-wide immunization against newly discovered attacks. Progent is a certified SentinelOne Partner. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense based on SentinelOne technology.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable multi-layer security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device control, and web filtering via leading-edge technologies incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that meets your company's unique requirements and that helps you prove compliance with legal and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent attention. Progent can also help your company to install and verify a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
Progent has partnered with leading backup/restore technology companies to create ProSight Data Protection Services, a selection of subscription-based management offerings that deliver backup-as-a-service. All ProSight DPS products automate and track your data backup processes and enable transparent backup and fast restoration of critical files/folders, applications, system images, and Hyper-V and VMware virtual machines. ProSight DPS lets your business recover from data loss caused by equipment breakdown, natural calamities, fire, malware such as ransomware, human mistakes, malicious employees, or application bugs. Managed backup services in the ProSight Data Protection portfolio include ProSight Altaro VM Backup, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup based on Barracuda purpose-built hardware, and ProSight MSP360 Cloud and On-prem Backup. Your Progent service representative can help you to determine which of these managed services are most appropriate for your network.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top information security vendors to deliver centralized management and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Duo MFA: Two-factor Authentication (2FA) Services
Progent's Duo authentication managed services utilize Cisco's Duo cloud technology to protect against password theft by using two-factor authentication (2FA). Duo supports one-tap identity confirmation with iOS, Android, and other out-of-band devices. With 2FA, when you sign into a protected online account and enter your password you are requested to verify who you are on a device that only you have and that is accessed using a different network channel. A wide selection of devices can be used for this second form of authentication such as an iPhone or Android or watch, a hardware token, a landline phone, etc. You may designate multiple validation devices. For details about ProSight Duo two-factor identity validation services, see Cisco Duo MFA two-factor authentication services for at-home workers.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host configured and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard data about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to half of time spent trying to find critical information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you're planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Special Security Services Available from Progent
Progent's security engineers can provide unique support in vital facets of IT protection such as:
Vulnerability Evaluation and Compliance Assessment
Progent offers expertise with information risk auditing utilities like Microsoft Baseline Security Analyzer and LANguard from GFI for performing a variety of comprehensive network scans to identify possible security holes. Progent has extensive experience with testing utilities and can help your company to analyze audit results and react appropriately. Progent's security consultants also provide web software testing and can perform thorough evaluation of enterprise-wide security to determine your company's compliance with key worldwide security specifications including FISMA, PCI, and ISO 17799. In addition, Progent can evaluate the strength of your wireless security covering stationary wireless appliances as well as portable handsets. Learn additional details concerning Progent's Security Vulnerability Audits and Compliance Assessment.
Cisco Network Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Support
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can deliver in-depth consulting expertise for Cisco's complete family of protection and Virtual Private Network (VPN) products including PIX 500 Firewalls and ASA 5500 Firewalls, Catalyst FWSM, secure high-speed and integrated services (IS) routers, Aironet wireless access points, Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Read the details concerning Cisco Security, Virtual Private Network (VPN) and Aironet Wireless Expertise.
Other Firewall and Virtual Private Network (VPN) Solutions
Stealth Penetration Testing Services
In addition to supporting a wide array of network security solutions from Microsoft and Cisco, Progent can provide companies of all sizes top-level support for solutions from other major firewall and Virtual Private Network suppliers. Progent's engineers can provide:
Unannounced penetration checking is a key method for allowing organizations to find out how susceptible their networks are to real-world attacks by showing how effectively network security policies and technologies stand up against authorized but unpublicized intrusion attempts instigated by veteran security engineers using advanced hacking techniques. Learn more information concerning Progent's Penetration Testing Services.
Certified Information Security Manager Security Support Expertise
CISM defines the fundamental competencies and worldwide benchmarks of performance that computer security professionals are required to master. CISM offers executive management the assurance that those who have been awarded their certification have the experience and skill to offer efficient security administration and engineering support. Progent can provide a CISM support professional to assist your organization in critical security disciplines including data security governance, risk assessment, information security process management, and incident response support.
Learn more details concerning Progent's CISM Security Support Expertise.
CISSP Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification as a result of demonstrated professional work, rigorous study, and formal testing. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include cybersecurity management practices, security architecture and models, connection permission systems, software development security, business processes security, hardware security, cryptography, communications, network security, and disaster recovery planning.
Learn more details concerning Progent's CISSP Consulting Expertise.
CISSP-ISSAP Certified Experts for Secure System Architecture
Progent's ISSAP Premier cybersecurity consultants have earned ISSAP certification as a result of thorough testing and substantial hands-on work with network security design. ISSAP consultants have acquired in-depth knowledge of access control systems and methodologies, phone system and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-premier security specialists can assist your company with all aspects of architecture security.
Find out more information about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.
CISSP-ISSEP Certified Cybersecurity Engineering Experts
Network Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide enterprises with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP cybersecurity expert to help your organization to utilize current system security engineering theory and processes in system development, evaluate system security designs according to security engineering best practices, create viable system designs that include compliant cybersecurity features for all key system functions, define effective design and configuration strategies to deliver protection for operations, perform in-depth risk analysis, and propose realistic security models that balance your operational goals with your company's risk tolerance.
Learn more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
Certified Information Systems Auditor (CISA) Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo an extensive examination overseen by the ISACA professional association. Progent offers the expertise of a CISA-Premier security audit consultant trained to assist companies in the areas of IS audit services, information technology enforcement, systems and architecture lifecycle, IT service delivery, safeguarding data assets, and disaster recovery planning.
Get additional information concerning Progent's Certified Information Systems Auditor Consulting Expertise.
CRISC Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's ability to design, implement, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and execute a business continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's network risk management expertise is a good fit the services provided by Progent's CISA-Premier security engineers for objectively evaluating your IS management design and with the expertise of Progent's CISM consultants for implementing company-wide security policies and procedures.
Learn additional information about Progent's CRISC Risk Mitigation Consulting.
GIAC (Global Information Assurance Certification) Support Expertise
GIAC was established in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to make sure that a certified security consultant possesses the skills needed to provide support in key categories of network, data, and software security. GIAC certifications are acknowledged by companies and government organizations all over the world including U.S. National Security Agency. Progent offers the support of certified security engineers for any of the network security disciplines covered under GIAC certification programs such as assessing security systems, incident response, traffic analysis, web-based application security, and security information and event management (SIEM) solutions.
Read more information about Progent's GIAC Information Assurance Expertise.
Get in Touch with Progent for Computer Security Help
If your business is situated in Durham North Carolina and you want network security engineering help, phone Progent at 800-993-9400 or see Contact Progent.
North Carolina State Contact Information:
Progent offers consulting services and onsite technical support throughout North Carolina.
Progent locations in North Carolina State