Small business networks in Hawaii can depend on prompt and economical online technical support from Progent's accredited security engineers to resolve complex security issues. The cost is competitive, billing is per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the services of senior security consultants with high-level security credentials.
If your Hawaii office is located far from larger urban neighborhoods including Honolulu, support from local certified security professionals could be limited during an emergency. This can cause a loss of revenue for your company, upset clients, idle workers, and defocused management. By calling Progent's online services, you have access to a Certified security professional who can offer expertise whenever you require it to get your system running and restore your information.
Progent can assist you in a variety of ways in your efforts to defend your information system with support ranging from security audits to creating a company-wide security strategy. Progent provides affordable support to assist companies of any size to configure and manage protected IT environments based on Windows and Cisco products and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email security platform that uses the technology of top data security companies to deliver centralized management and comprehensive security for all your email traffic. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from reaching your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.
Progent's security professionals are accessible remotely or on site to offer a range of urgent or project-based IT security services including:
If your company has an emergency requirement for computer security help, refer to Progent's Emergency Online Technical Help.
- Perform comprehensive network security audits
- Recuperate quickly after virus and worm attacks
- Configure effective firewalls
- Implement secure methods for offsite and mobile access
- Install advanced solutions for protection against spam and directory harvest attacks
- Help create a comprehensive security strategy with 24x7 monitoring
- Offer outsourced Call Center Support
- Create a practical data backup and recovery solution built around Data Protection Manager backup technology
Progent's engineers offer world-class support in vital areas of computer security that include auditing, firewall and VPN solutions, and advanced security planning.
Progent's expert security consultants can evaluate the vulnerability of your existing computer security implementation through exhaustive remote automated testing based on sophisticated software tools and tested techniques. Progent's experience in this testing saves your company consulting fees and offers an objective portrayal of weaknesses. The information your company is provided can make up the foundation of a network protection plan that will permit your network to run dependably and react quickly to future risks.
Automated Vulnerability Assessment
Progent provides expertise in the use of security evaluation utilities including Microsoft's MBSA and GFI LANguard for affordably running a variety of automatic system auditing checks to identify possible security gaps. Progent has extensive knowledge of additional network analysis utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.
Progent can help you design protection into your business operations, configure scanning software, plan and deploy a secure system architecture, and recommend procedures to maximize the safety of your IT system. Progent's security engineers are ready to help you set up a firewall, design secure remote access to email and business applications, and install virtual private network. Find out additional information on Progent's network security analysis.
Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to allow small companies to get an independent security assessment from a qualified security expert. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your network from outside your firewalled perimeter to determine possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized computer inside your company firewall to evaluate vulnerabilities to inside threats. Both security inventory services are set up and run from a protected external location. The process is directed by a consultant who has earned top security accreditations and who produces a document that summarizes and interprets the data captured by the security scan and suggests cost-effective remediation if appropriate.
Stealth Penetration Analysis Support Services
Stealth penetration checking is an important component of any successful network security strategy. Progentís security experts can perform thorough penetration checks without the knowledge of your company's internal network support resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident alerts and event log analysis are properly set up and actively monitored. Find out more concerning Progent's network security penetration analysis support services.
Progent's expertise in security solutions encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your existing PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services integration and debugging services.
Cisco Security and VPN Engineering Expertise
Cisco's security and offsite connection products represent a complete line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Find out additional information concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Appliances.
Consulting Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and choose the right products from a variety of vendors to achieve your security goals while staying within your spending restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior analysis tools to guard endpoints and servers and VMs against new malware attacks like ransomware and email phishing, which easily evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within one agent accessible from a single console. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP environment that addresses your organization's unique needs and that allows you prove compliance with government and industry data protection regulations. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent's consultants can also assist your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup activities and allows rapid recovery of critical files, apps and virtual machines that have become lost or damaged as a result of component failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security vendors to provide centralized management and comprehensive security for all your email traffic. The powerful architecture of Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can eliminate up to half of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Network Security Design
Every business should have a thoroughly considered security program that incorporates both pre-attack processes and reaction planning. The pre-attack plan is a collection of procedures designed to reduce vulnerabilities. The reactive strategy helps your company's network security engineers to evaluate the damage caused by a security penetration, repair the system, record the event, and get the IT network restored as soon as possible.
Progent's certified information security engineers are available to help your business to run a complete vulnerability assessment and define a computer security plan to establish security policies and mechanisms to mitigate future attacks and dangers.
CISM Qualified Network Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the basic competencies and global standards of performance that IT security professionals are expected to learn. It provides executive management the confidence that those who have qualified for their CISM credential possess the background and knowledge to deliver efficient security management and consulting consulting. Progent offers the services of CISM Premier security consultants to assist companies with:
Find out additional details concerning Progent's CISM Information Security Consulting Professionals.
- Information Security Strategies
- Vulnerability Management
- Network Security Implementation Management
- IS Security Management
- Recovery Planning
CISSP Qualified Security Engineering Assistance
CISSP recognizes mastery of a worldwide standard for network security. The American National Standards Institute has awarded certification recognition in the field of data protection stipulated by ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a broad range of security areas including:
Learn additional details about Progent's CISSP Accredited Information Security Consulting Professionals.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecom, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier IT architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous testing and extensive experience with network security design. The ISSAP certification indicates proven skill in the most complex demands of information security architecture within the broader scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all aspects of secure network architecture including.
Read more information concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Expertise.
- Access Management Mechanisms and Methodologies
- Telecommunications and Network Security
- Encryption/Decryption Options
- Needs Evaluation and Security Standards
- BCP and DRP
- Physical Security
CISA Qualified IS Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a prestigious qualification that represents expertise in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants undergo an extensive examination administered by the ISACA professional association. Progent's CISA network security audit specialists can assist your company in the areas of:
Get the details concerning Progent's CISA Accredited Information System Security Auditing Consulting Expertise.
- Information Systems Audit Process
- Information Technology Administration
- Systems and Architecture Lifecycle Planning
- Information Technology Support
- Protecting Information Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to verify an IT professional's skills to design, deploy, and maintain IS controls to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and execute a business continuity plan that follows leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk management engineers offer a range of risk evaluation services including:
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to help identify significant vulnerabilities
- Identify legal, regulatory, and contractual mandates and organizational standards associated with your information system to assess their possible impact on your strategic objectives
- Point out potential vulnerabilities for your business processes to assist in evaluating your corporate risk
- Create a risk awareness initiative and provide training to make sure your organization appreciate IT risk so they can assist with your risk control process
- Connect key risk vectors to your associated business procedures to help determine risk ownership
- Determine risk appetite with executive management and major stakeholders to make sure they match
GIAC Qualified Network Security Engineering Assistance
GIAC was founded in 1999 to certify the skill of IT security engineers. GIAC's mission is to verify that a certified professional possesses the knowledge appropriate to provide services in vital areas of network, information, and application program security. GIAC certifications are recognized by businesses and government organizations all over the world including and the United States NSA. Progent's GIAC-certified network security audit engineers can assist your company in the areas of:
Read more information about Progent's GIAC Information Assurance Support.
- Auditing Networks
- Incident Handling
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Get in Touch with a Progent Security Specialist
To find out how to access a certified Progent security consultant for online or on-premises help in Hawaii, call 1-800-993-9400 or go to Online Computer Support.