For immediate remote help with network security issues, companies in Edmonton Alberta have access to world-class troubleshooting from Progent's security engineers. Progent's remote service consultants are ready to offer efficient and low-cost help with security emergencies that threaten the productivity of your IT network. Progent's accredited engineers are certified to support environments powered by Microsoft Windows, Linux, Apple macOS and OS X, and popular versions of UNIX. Progent can provide advanced guidance for vital cybersecurity and restoration technologies including AI-based End Point Protection and Response, MDR (Managed Detection and Response), complete system restoration validation and testing, immutable backup, and off-premises backup. Progent's wide array of services addresses firewall configuration, email security, protected network design, and disaster recovery planning. Progent's support team has earned the world's top security accreditations including Certified Information Security Manager and Certified Information Systems Security Professional (CISSP).
Progent offers online security assistance on a by-the-minute basis without minimum times and no extra charges for setup or after hours service. By billing by the minute and by providing top-level help, Progent's pricing model keeps costs under control and eliminates scenarios where quick fixes entail major charges.
Ransomware Hot Line: 800-462-8800
Ransomware requires time to steal its way through a network. Because of this, ransomware assaults are commonly unleashed on weekends and at night, when support staff may be slower to recognize a break-in and are less able to mount a rapid and coordinated defense. The more lateral progress ransomware is able to achieve inside a target's network, the longer it will require to restore basic operations and scrambled files and the more information can be stolen and posted to the dark web. Progent's Ransomware Hot Line is designed to guide you to complete the urgent first steps in responding to a ransomware attack by stopping the bleeding. Progent's remote ransomware experts can help you to locate and quarantine breached servers and endpoints and protect undamaged assets from being compromised. If your system has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
Our System Has Been Hacked: What Are We Supposed to Do Now?
If your network is now faced with a security crisis other than ransomware, visit Progent's Emergency Online Technical Support to learn how to receive immediate aid. Progent has a team of veteran cybersecurity experts who can provide online and on-premises assistance that includes containment, mitigation, restoration, forensics, and enhancement of your security profile to protect against future exploits.
For organizations who have planned in advance for being hacked, the formal incident handling procedure promoted by GIAC is Progent's approved method of responding to a major security incident.
Overview of Progent's Security Expertise
Coordinating computer protection plus staying ready for recovering vital data and systems following a security breach demands a continual program involving a variety of tools and processes. Progent's security professionals can support your organization at whatever level in your attempt to guard your IT network, from security evaluation to designing a complete security strategy. Important areas covered by Progent's security consultants include Planning and Implementation, Data Recovery and Security Forensics, and Managed Filtering of Email-Based Attacks.
Planning and Implementing Protected Networks
Every business ought to develop a carefully considered security plan that includes both proactive and responsive activity. The proactive plan is a collection of steps that helps to reduce security gaps. The reactive strategy specifies activities to help security personnel to inventory the damage resulting from an attack, remediate the damage, document the experience, and restore network activity as quickly as feasible. Progent can show you how to incorporate security into your company processes. Progent can configure scanning software, define and implement a secure IT architecture, and propose processes and policies that will maximize the protection of your information system. Progent's security experts are available to assist you to configure a firewall, deploy protected offsite connectivity to e-mail and information, and configure an efficient virtual private network.
If your company is looking for an economical way for outsourcing your network security administration, Progent's Round-the-clock Monitoring Packages include automated remote server monitoring and immediate response to problems.
Hybrid Cloud Solutions
Progent can assist your IT team you to plan, implement, administer and repair enterprise hybrid cloud solutions that combine physical and cloud resources and that comply with government data security requirements. (Find out about Progent's Microsoft 365 Exchange Online integration solutions with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud Platform integration consulting.)
System Recovery and Security Forensics
Progent provides expertise in restoring networks and computers that have been compromised, are in question, or have stopped working following a security attack. Progent can help evaluate the damage caused by the assault, restore normal functions, and recover data compromised as a result of the breach. Progent's security specialists can also perform a thorough failure analysis by going over event logs and utilizing a variety of proven forensics techniques. Progent's experience with security consulting reduces your downtime and allows Progent to suggest efficient ways to prevent or mitigate new assaults.
Ransomware Removal and Recovery Services
Progent offers the services of seasoned ransomware recovery consultants with the skills to restore an IT network damaged by a ransomware virus like Ryuk, WannaCry, Hermes, or Locky. To learn more, visit ransomware cleanup and recovery consulting.
Work-from-Home (WFH) Cybersecurity Expertise
Work-from-Home (WFH) staff members typically use their own devices and usually operate in a poorly secured physical environment. This situation multiplies their susceptibility to malware threats and calls for judicious configuration of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, extensive user training, and the development of security policies based on leading practices. Progent's seasoned team of at-home workforce support experts can help your business to design, implement and manage an effective security solution that protects vital IT assets in networks that incorporate remote workers.
Patch Management Services
Progent's managed services for software and firmware patch management provide businesses of all sizes a versatile and cost-effective alternative for assessing, testing, scheduling, applying, and documenting updates to your ever-evolving IT system. In addition to optimizing the protection and functionality of your IT network, Progent's patch management services permit your IT staff to focus on line-of-business projects and tasks that deliver maximum business value from your information network. Read more about Progent's software/firmware update management support services.
Extended Detection and Response (XDR) Powered by SentinelOne
SentinelOne's Singularity product family is a subscription-based, cloud-centered cyberthreat defense platform that features AI software and expert services to deliver enterprise-class endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's compact software agents can be loaded in a few minutes to guard endpoints against increasingly sophisticated threats such as ransomware, familiar and zero-day malware, trojans, hacking toolkits, RAM exploits, script misuse, destructive macros, and living-off-the-land (LotL) abuse. Progent is a certified SentinelOne Partner and reseller and manages thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is invariably the initial endpoint response software activated by Progent to gain control and visibility of a client's network in the first stages of a ransomware recovery. For more information, refer to Progent's SentinelOne-based Extended Detection and Response (XDR) expertise.
Support for Horizon3.ai's NodeZero Pentest Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that can deliver continuous, simultaneous, programmable assessment of your internal and perimeter network to help you identify, rank, remediate, and verify security weaknesses before threat actors can exploit them. Progent offers the skills of a NodeZero Certified Operator who can assist you to use NodeZero to carry out thorough pentests of your perimeter and your internal IT infrastructure so you can determine your current security posture. Progent's NodeZero experts can also help you to harden your network security and can assist you to design and deploy a cohesive cybersecurity ecosystem that simplifies management and delivers optimum cyber defense for on-prem, cloud-based, and perimeter IT resources. To learn more details about Progent's threat analysis solutions powered by on NodeZero's PEN test platform, visit Consulting Services for NodeZero's PEN Test Platform.
Stealth Penetration Security Testing Services
Stealth intrusion testing is an important component of any comprehensive network security plan. Progent's security experts can perform extensive penetration tests without the knowledge of your organization's internal IT staff. Unannounced penetration testing uncovers whether existing security monitoring systems such as intrusion detection warnings and event history monitoring are properly configured and actively monitored. Progent can provide continuous autonomous penetration testing to define your internal/external attack surface and to identify ways that vulnerabilities, unsafe configurations, compromised credentials, uninstalled patches, and dangerous product defaults can be chained together by hackers into the multi-front attacks typical of modern strains of ransomware. Get additional information about Progent's Stealth PEN Testing Services.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes SentinelOne's cutting edge behavior machine learning tools to defend endpoints and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily escape legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to manage the complete malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense based on SentinelOne technology.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge technologies packaged within one agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your organization's specific requirements and that helps you demonstrate compliance with government and industry information protection regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent can also assist your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
Progent has worked with advanced backup technology companies to create ProSight Data Protection Services (DPS), a selection of management offerings that provide backup-as-a-service. All ProSight DPS products manage and track your backup operations and allow transparent backup and rapid recovery of vital files, applications, system images, and virtual machines. ProSight DPS helps your business avoid data loss caused by equipment failures, natural calamities, fire, malware such as ransomware, human error, ill-intentioned employees, or software glitches. Managed services in the ProSight DPS selection include ProSight DPS Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup using Barracuda purpose-built storage, and ProSight MSP360 Cloud and On-prem Backup. Your Progent expert can assist you to determine which of these fully managed backup services are most appropriate for your IT environment.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security vendors to provide web-based control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of inspection for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email traffic that stays within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Duo MFA: Two-factor Authentication (2FA) Services
Progent's Duo MFA services utilize Cisco's Duo technology to protect against password theft through the use of two-factor authentication. Duo supports one-tap identity confirmation with iOS, Android, and other out-of-band devices. With Duo 2FA, when you log into a protected application and give your password you are requested to verify your identity on a unit that only you have and that is accessed using a different network channel. A broad selection of out-of-band devices can be utilized for this second form of authentication such as a smartphone or wearable, a hardware/software token, a landline telephone, etc. You may designate multiple verification devices. For details about ProSight Duo two-factor identity validation services, go to Duo MFA two-factor authentication services for remote workers.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hosting solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard information related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to 50% of time thrown away looking for critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether you're making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Specialized Security Expertise Offered by Progent
Progent's certified security consultants offer world-class expertise in key facets of computer protection including:
Vulnerability Evaluation and Security Compliance Assessment
Progent offers expertise with information risk evaluation software like Microsoft Baseline Security Analyzer and LANguard for performing a variety of comprehensive system tests to identify potential security problems. Progent has extensive skills with these and similar utilities and can assist your company to understand assessment reports and react appropriately. Progent's security engineers also offer web application testing and can conduct expert assessments of corporate-wide security to assess your company's compliance with important industry security specifications such as FISMA, NIST, and ISO. Also, Progent can evaluate the strength of your wireless protection including in-place wireless appliances plus portable handsets. Read additional information concerning Progent's Vulnerability Audits and Security Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wireless Consulting
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals can deliver world-class technical expertise for Cisco's entire family of protection and Virtual Private Network technologies including PIX Series Firewalls and ASA 5500 Firewalls, the Catalyst Firewall Services Module (FWSM), secure high-speed and integrated services routers, wireless access points and bridges, Cisco Meraki cloud-managed access points, and Catalyst switches. Read additional information concerning Cisco Security, Virtual Private Network and Wireless Consulting.
Additional Firewall and VPN Consulting Services
CISM Security Support Expertise
In addition to supporting a broad array of security solutions from Microsoft and Cisco, Progent offers businesses of all sizes top-level support for technologies from other major firewall and Virtual Private Network (VPN) vendors. Progent's consultants offer:
Certified Information Security Manager defines the fundamental competencies and international standards of service that information technology security professionals are expected to master. It offers business management the confidence that consultants who have been awarded their accreditation possess the experience and skill to provide efficient security management and engineering support. Progent can offer a CISM expert to help your enterprise in vital security areas such as data security governance, vulnerability assessment, data protection process management, and crisis response support.
Learn more information about Progent's Certified Information Security Manager (CISM) Security Support Services.
Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP consultants are security specialists who have been awarded CISSP status as a result of demonstrated professional work, rigorous study, and exhaustive examination. CISSP Certification indicates expertise in a worldwide standard for IT security. ANSI has given the CISSP credential accreditation in the field of IT security under ISO/IEC 17024. Areas of knowledge included within CISSP include cybersecurity administration practices, security design and models, connection control systems, software development security, operations security, physical security, encryption, telecommunications, Internet security, and business continuity planning.
Learn additional details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Premier Consultants for Secure Network Architecture
Progent's ISSAP Certified security experts are specialists who have earned ISSAP status as a result of rigorous examination and extensive hands-on work with network security architecture. ISSAP security experts have acquired in-depth knowledge of access management mechanisms and techniques, telecommunications and network security, cryptography, needs evaluation, BCP and disaster recovery, and physical security. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security.
Read additional details concerning Progent's ISSAP Accredited Protected IT Architecture Engineering Support.
CISSP-ISSEP Certified Security Engineering Experts
Network Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide large organizations with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent can provide the support of a certified CISSP-ISSEP network security expert to assist your organization to utilize modern system security engineering principles and techniques in system development, review system security designs based on cybersecurity engineering leading practices, produce viable system designs that include compliant security features for all critical system functions, develop efficient design strategies to deliver operational security, perform in-depth risk analysis, and propose realistic security models that balance your operational requirements with your company's risk tolerance.
Learn more about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.
CISA Security Auditor Consulting Services
The CISA accreditation is a recognized qualification that signifies expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass a comprehensive test administered by the ISACA international professional group. Progent offers the expertise of a CISA-Certified security audit engineer able to assist businesses in the fields of IS audit process, information technology enforcement, network assets and infrastructure planned useful life, IT service delivery, protecting information assets, and business continuity planning.
Get additional details about Progent's Certified Information Systems Auditor (CISA) Consulting Services.
CRISC-certified Risk Mitigation Consultants
The CRISC certification program was established by ISACA to validate an IT professional's skills to design, implement, and maintain IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to help you to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's network risk mitigation expertise is complementary to the support provided by Progent's CISA-Certified security engineers for objectively evaluating your IS control mechanisms and with the services of Progent's CISM-certified consultants for defining security policies and procedures.
Get additional information concerning Progent's CRISC Network Risk Management Services.
Global Information Assurance Certification Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to verify that a certified security consultant possesses the knowledge necessary to deliver services in critical areas of system, data, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including United States National Security Agency. Progent offers the expertise of GIAC certified consultants for all of the network security capabilities covered under GIAC certification programs including auditing IT infrastructure, incident response, traffic analysis, web-based application security, and SIEM solutions.
Find out additional details about Progent's GIAC Information Assurance Services.
Contact Progent for Network Security Consulting Services
If your company is situated in Edmonton Alberta and you're trying to find network security support services, call Progent at 800-993-9400 or see Contact Progent.
Edmonton Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the Edmonton metro area.
Progent locations in Edmonton Metro