Company computer networks inHawaiinow have fast and economical remote technical support from Progent's certified network security experts to help with complex security issues. The cost is reasonable, billing is by the minute, engagement is quick, and support is unbeatable. Progent also offers assistance for long-term projects that demand the expertise of senior security engineers with high-level industry certifications.
If yourHawaiibusiness is based outside of larger metropolitan neighborhoods includingHonolulu, help from local qualified security engineers may be limited when you have a crisis. This can result in lost income for your company, upset customers, unproductive workers, and distracted executives. By utilizing Progent, you have access to a Premier security consultant ready to offer expertise when you require it to keep your network on line and recover your data.
Progent can help you in a variety of ways in your efforts to defend your IT environment with support ranging from security audits to developing a comprehensive security plan. Progent offers affordable service to assist companies of any size to design and maintain protected networks powered by Windows and Cisco products and that can include computers based on UNIX or Linux platforms as well as BYOD clients with Apple handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security vendors to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further layer of inspection for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.
Progent's certified experts are accessible online or on site to provide a range of urgent or longer-term IT security services such as:
If your network has an emergency requirement for IT security support, refer to Progent's Urgent Online Technical Help.
Progent's security experts provide world-class support in vital fields of system protection including analysis, firewall/VPN support, and high-level security consulting.
System Security Assessment
Progent's certified security consultants can assess the strength of your existing computer protection environment by performing comprehensive remote automated testing via advanced software tools and proven procedures. Progent's skill in administering this service saves your company money and offers a detailed portrayal of weaknesses. The information your company gains can form the foundation of a network protection strategy that can permit your network to operate safely and respond quickly to new threats.
Automated Security Audits
Progent offers expertise in the application of security analysis utilities including Microsoft's MBSA and GFI LANguard NSS for affordably performing a variety of automatic network testing checks to uncover potential security vulnerabilities. Progent has broad knowledge of additional network analysis products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can help you build protection into your business operations, configure auditing software, define and implement a protected system environment, and recommend policies to optimize the security of your IT system. Progent's security engineers are ready to assist you to set up a firewall, design safe remote access to email and data, and install virtual private network. Learn more on Progent's network security analysis.
Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles intended to enable small companies to get an impartial security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive examination of your network from beyond your firewalled perimeter to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert runs a system scan from a secure computer inside your company firewall to uncover your exposure to internal attacks. Both security inventory packages are configured and run from a secured external location. The project is directed by a consultant with top security accreditations and who generates a document that summarizes and interprets the data captured by the security scan and suggests cost-effective improvements where called for.
Stealth Security Penetration Analysis Consulting
Stealth penetration testing is a key part of any comprehensive network security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your organization's internal IT staff. Stealth penetration checking shows whether current security monitoring systems such as intrusion detection warnings and event log monitoring are correctly set up and actively checked. Find out additional information concerning Progent's network security penetration analysis support services.
Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses in-depth familiarity with major firewalls and VPN technology from a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services integration and debugging support.
Cisco Network Security and Virtual Private Network Support Services
Cisco's security and offsite access products provide a comprehensive line of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Learn more details about Progent's Consulting Services for Cisco Security Solutions and VPN Products.
Consulting Services for Additional Firewall and VPN Technology
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWall. Progent can help you design a detailed security plan and select appropriate products from multiple vendors to achieve your security goals while sticking within your budget limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior-based machine learning technology to guard endpoint devices as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which easily evade legacy signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and offers a single platform to automate the complete malware attack progression including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, device control, and web filtering through leading-edge tools packaged within one agent accessible from a unified console. Progent's security and virtualization consultants can help you to design and implement a ProSight ESP deployment that addresses your company's specific requirements and that allows you demonstrate compliance with legal and industry data security standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate action. Progent can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of vital data, applications and VMs that have become lost or damaged due to component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPAA, FINRA, and PCI and, when needed, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide centralized management and world-class protection for your email traffic. The powerful architecture of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Since the system is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or domains. By updating and organizing your network documentation, you can save as much as half of time wasted searching for critical information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Any company should develop a carefully thought out security program that includes both proactive processes and reaction planning. The pre-attack strategy is a set of mechanisms that help to minimize vulnerabilities. The reactive strategy assists your network security engineers to assess the impact caused by an attack, repair the damage, document the event, and get the IT network restored as quickly as feasible.
Progent's certified IS security consultants are available to assist you to run a comprehensive vulnerability evaluation and define a company-wide security strategy to establish security processes and mechanisms to reduce ongoing assaults and threats.
CISM Qualified Security Consulting Assistance
The CISM committee describes the core capabilities and global standards of skill that information security professionals are required to master. CISM gives executive management the confidence that those who have qualified for their CISM credential possess the experience and capability to provide effective security administration and support services. Progent can provide the services of CISM Certified security professionals to assist companies with:
Learn additional information about Progent's CISM Certified Security Consulting Expertise.
- Network Security Governance
- Risk Management
- IS Security Implementation Management
- IS Security Administration
- Recovery Management
CISSP Accredited Security Engineering Support
CISSP recognizes expertise with a global standard for information security. The American National Standards Institute has granted certification accreditation in the area of information protection stipulated by ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields such as:
Find out additional details about Progent's CISSP Network Security Support Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecommunications, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP Premier system architecture engineers are consultants who have earned ISSAP Certification as a result of thorough examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the more in-depth demands of information system security architecture bounded by the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-premier security experts can assist your business with all phases of architecture security such as.
Read more details about Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.
- Access Management Mechanisms and Methodologies
- Telecom and Network Infrastructure Security
- Data Encryption Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is an important qualification that indicates mastery in network security auditing. Accredited by ANSI, the CISA accreditation requires that consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-certified security audit consultants can help your business in the areas of:
Read additional details about Progent's CISA Qualified Network Security Auditing Engineering Expertise.
- IS Audit Services
- IT Enforcement
- Systems and Infrastructure Lifecycle
- IT Service Delivery
- Protecting Data Resources
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's skills to design, implement, and support information system controls to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists offer a variety of risk identification services such as:
Learn more details concerning Progent's CRISC Risk Management Experts.
- Collect information and study documentation to help identify significant vulnerabilities
- Inventory statutory, industry, and contractual mandates and company standards associated with your network to determine their possible influence on your strategic objectives
- Point out possible vulnerabilities for your operational processes to assist in evaluating your corporate risk
- Create a risk awareness initiative and provide training to make sure your organization understand IT risk so they can contribute to your risk control process
- Match identified risk scenarios to your associated business procedures to help assign risk responsibility
- Determine risk appetite with your senior management and key stakeholders to ensure they are in agreement
GIAC Qualified IS Security Consulting Services
Read more information concerning Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge appropriate to provide services in key areas of system, information, and application security. GIAC certifications are recognized by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC network security audit experts are available to assist your business with:
Talk to a Security Specialist
To see how to get in touch with a certified security consultant for remote or on-premises expertise in Hawaii, call 1-800-993-9400 or visit Remote Network Support.