For fast online help with computer security issues, companies in Edmonton Alberta have access to expert expertise from Progent's security professionals. Progent's online support consultants are ready to offer fast and economical assistance with security crises that are impacting the productivity of your network. Progent's security engineers are premier to provide help for environments based on Microsoft, Linux, macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's wide selection of consulting services covers firewall expertise, email filtering and encryption, secure system design, and disaster recovery preparedness. Progent's technical support staff has been awarded the world's top security credentials including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional.
Progent provides remote security help on a per-minute model without minimum call duration and no additional fees for sign-up or after hours service. By billing per minute and by providing top-level expertise, Progent's billing model keeps costs under control and avoids situations where simple solutions result in major expenses.
We've Been Hacked: What Are We Supposed to Do Now?
In case your network is now fighting a network security crisis, go to Progent's Emergency Online Network Support to learn how to receive immediate assistance. Progent has a pool of certified network security experts who offer online and on-premises support that includes threat containment, mitigation, restoration, forensics, and enhancement of your security defense to guard against future exploits.
For organizations who have planned beforehand for a security breech, the formal post-attack handling model outlined by GIAC is Progent's approved method of responding to a major security incident.
Introduction to Security Expertise
Coordinating network security as well as preparation for recovering vital data and systems after a security breach demands an on-going program that entails a variety of technologies and processes. Progent's certified security professionals can help your organization at whatever level in your efforts to guard your IT system, ranging from security assessments to designing a comprehensive security program. Important technologies supported by Progent's experts include Security Planning and Prevention, Information Restoration and Security Failure Analysis, and Managed Protection from Email-Borne Attacks.
Planning and Implementing Secure Environments
Every organization should develop a carefully thought out security plan that incorporates both proactive and responsive elements. The pre-attack plan is a collection of steps that works to reduce vulnerabilities. The reactive strategy specifies activities to help IT personnel to inventory the losses resulting from an attack, repair the damage, document the experience, and restore business functions as soon as possible. Progent can advise you how to incorporate protection into your business operations. Progent can install scanning software, define and execute a safe computer architecture, and recommend procedures and policies that will maximize the protection of your network. Progent's security professionals are available to assist you to set up a firewall, deploy safe offsite connectivity to e-mail and information, and install an effective virtual private network.
If your company is looking for an affordable way for outsourcing your network security management, Progent's 24x7 Network Support Packages include continual remote system tracking and quick resolution of emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, manage and repair enterprise hybrid cloud solutions that combine local and cloud-based infrastructure and that comply with regulatory data security requirements. (Find out about Progent's Microsoft 365 integration solutions with on-premises installations of Exchange, Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud Platform (GCP) integration expertise.)
Data Recovery and Failure Analysis
Progent has skill in restoring networks and computers that have been hacked, are quarantined, or have ceased to function because of a security breakdown. Progent can show you how to determine the losses resulting from the assault, return your company to ordinary functions, and retrieve information lost as a result of the attack. Progent's security specialists can also oversee a comprehensive failure analysis by examining activity logs and utilizing other advanced assessment tools. Progent's experience with security consulting reduces your business disruption and allows Progent to recommend effective strategies to avoid or contain new attacks.
Ransomware Removal and Restoration Expertise
Progent offers the help of proven ransomware recovery experts with the knowledge to reconstruct an environment victimized by a ransomware cryptoworm such as Ryuk, Dharma, NotPetya, or Locky. To learn more, visit ransomware cleanup and recovery consulting.
Work-from-Home Cybersecurity Solutions
Work-from-Home staff members commonly use their personal computing devices and often operate in a unsecured physical space. This situation multiplies their susceptibility to cyber threats and requires judicious deployment of corporate firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, thorough end-user training, and the creation of security policies built on leading practices. Progent's veteran group of Work-from-home support experts can assist you to plan, deploy and maintain an effective security solution that guards critical information resources in networks that incorporate an at-home workforce.
Patch Management Services
Progent's support services for software and firmware patch management offer businesses of all sizes a flexible and affordable alternative for evaluating, validating, scheduling, implementing, and tracking software and firmware updates to your ever-evolving IT network. In addition to optimizing the security and functionality of your IT network, Progent's patch management services permit your in-house IT staff to concentrate on line-of-business projects and tasks that deliver maximum business value from your information network. Read more about Progent's patch management services.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes SentinelOne's cutting edge behavior-based analysis technology to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to automate the entire malware attack progression including protection, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery powered by SentinelOne technology.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint control, and web filtering through leading-edge technologies packaged within one agent accessible from a single control. Progent's data protection and virtualization consultants can help your business to plan and implement a ProSight ESP environment that meets your company's unique requirements and that allows you prove compliance with government and industry data security standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent can also help your company to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
Progent has partnered with leading backup/restore product companies to create ProSight Data Protection Services (DPS), a selection of subscription-based management offerings that provide backup-as-a-service. All ProSight DPS services automate and monitor your data backup operations and enable transparent backup and fast restoration of important files, apps, system images, and Hyper-V and VMware virtual machines. ProSight DPS helps you recover from data loss caused by equipment failures, natural calamities, fire, cyber attacks like ransomware, user error, ill-intentioned insiders, or application bugs. Managed services available in the ProSight DPS portfolio include ProSight Ataro VM Backup, ProSight Ataro Office 365 Backup, ProSight ECHO Backup using Barracuda purpose-built hardware, and ProSight DPS MSP360 Hybrid Backup. Your Progent consultant can help you to determine which of these fully managed services are most appropriate for your IT environment.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top data security companies to deliver centralized control and world-class security for your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Duo MFA: Two-factor Authentication (2FA) Services
Progent's Duo authentication managed services utilize Cisco's Duo technology to defend against compromised passwords by using two-factor authentication (2FA). Duo enables single-tap identity verification on Apple iOS, Android, and other out-of-band devices. Using 2FA, whenever you sign into a protected online account and give your password you are asked to verify your identity on a device that only you possess and that is accessed using a different network channel. A wide selection of devices can be used as this second form of authentication such as a smartphone or watch, a hardware token, a landline phone, etc. You can designate several verification devices. To find out more about ProSight Duo identity validation services, go to Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported easily to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSLs or domains and warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate up to 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you're planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more about ProSight IT Asset Management service.
Specialized Security Services Offered by Progent
Progent's veteran engineers offer unique expertise in vital facets of computer protection such as:
Vulnerability Evaluation and Security Compliance Testing
Progent offers experience with security evaluation software like Microsoft Baseline Security Analyzer and LANguard for conducting a variety of comprehensive network tests to reveal possible security gaps. Progent has broad skills with these tools and can assist you to analyze audit reports and respond efficiently. Progent's security engineers also can perform web software validation and can perform expert assessments of enterprise-wide security to determine your organization's compliance with key worldwide security specifications including FISMA, NIST, and ISO. In addition, Progent can assess the strength of your wireless protection including in-place wireless equipment as well as mobile handsets. Get additional details about Progent's Vulnerability Evaluation and Compliance Testing.
Cisco Security, PIX and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals can provide in-depth technical expertise for Cisco's complete range of security and Virtual Private Network products such as PIX Series Firewalls and ASA 5500 Series Firewalls, Catalyst Firewall Services Module, secure high-speed and IS routers, wireless access points, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Get more information about Cisco Protection, Virtual Private Network (VPN) and Aironet Wireless Expertise.
Other Firewall and Virtual Private Network (VPN) Technologies
Unannounced Penetration Checking Consulting
As well as being expert in a broad range of network security technologies available from Microsoft and Cisco, Progent offers companies of all sizes expert support for solutions from other important firewall and VPN suppliers. Progent's consultants offer:
Unannounced intrusion checking is a vital method for helping organizations to find out how exposed their IT systems are to real-world attacks by testing how thoroughly corporate protection policies and technologies stand up to authorized but unannounced penetration efforts launched by veteran security specialists utilizing advanced hacking techniques. Get additional details concerning Progent's Penetration Testing Services.
Certified Information Security Manager Security Support Services
CISM defines the fundamental skills and worldwide benchmarks of performance that information technology security managers are required to achieve. It offers business management the assurance that consultants who have earned their CISM possess the experience and skill to offer efficient security management and engineering support. Progent can offer a CISM-certified consultant to help your enterprise in vital security disciplines such as data protection governance, vulnerability management, information protection process control, and incident response management.
Find out more details about Progent's CISM Security Support Assistance.
CISSP Security Support Expertise
Progent's CISSP experts are security specialists who have earned CISSP accreditation as a result of verified professional work, rigorous study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for IT security. ANSI has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security administration procedures, security architecture and models, connection permission systems, applications development security, operations security, hardware security, encryption, communications, network security, and business continuity planning.
Learn additional information about Progent's CISSP Support Services.
CISSP-ISSAP Certified Experts for Secure System Infrastructure
Progent's ISSAP Premier security experts are specialists who have earned ISSAP status following rigorous examination and substantial experience. field experience with network security design. ISSAP consultants have acquired in-depth understanding of access management systems and techniques, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security specialists can assist your business with all aspects of architecture security.
Get additional information concerning Progent's ISSAP Accredited Secure System Architecture Engineering Services.
CISSP-ISSEP Premier Security Engineering Experts
Network Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide large organizations with the services associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent can provide the support of a certified CISSP-ISSEP network security consultant to help your organization to follow modern system security engineering principles and techniques in system development, evaluate system security designs based on cybersecurity engineering best practices, create viable system designs that incorporate compliant cybersecurity mechanisms for all key system functions, define effective configuration strategies to deliver operational security, perform in-depth risk analysis, and recommend practical security solutions that balance your operational requirements with your company's tolerance for risk.
Learn more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
Certified Information Systems Auditor Support Services
The CISA accreditation is a recognized qualification that represents expertise in network security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants pass an exhaustive test administered by the ISACA professional group. Progent offers the expertise of a CISA-Certified security engineer trained to help businesses in the fields of information systems audit services, IT enforcement, systems and architecture lifecycle, information technology support, protecting information resources, and business continuity planning.
Learn more details about Progent's CISA Support Expertise.
CRISC Network Risk Mitigation Experts
The CRISC program was initiated by ISACA to verify a consultant's ability to design, deploy, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity strategy that follows industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's risk management expertise is a good fit the services available from Progent's CISA-Premier consultants for impartially assessing your IT management design and also with the expertise of Progent's CISM support professionals for defining security policies and procedures.
Get more details concerning Progent's CRISC IT Risk Management Services.
Global Information Assurance Certification Professional Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security experts. GIAC's goal is to verify that a certified professional possesses the skills needed to deliver services in important areas of system, information, and application security. GIAC certifications are recognized by businesses and institutions throughout the world including U.S. National Security Agency. Progent can provide the support of certified security engineers for any of the network security services addressed within GIAC certification programs such as auditing perimeters, incident response, traffic analysis, web-based application security, and security information and event management (SIEM) solutions.
Learn additional information about Progent's GIAC Information Assurance Support.
Depend on Progent for Computer Security Support
If your company is located in Edmonton Alberta and you want computer security engineering help, call Progent at 800-993-9400 or see Contact Progent.
Edmonton Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the Edmonton metro area.
Progent locations in Edmonton Metro