Business networks in Hawaii can depend on quick and affordable remote technical support from Progent's qualified security support specialists to resolve critical security issues. The cost is competitive, charges are per minute, engagement is quick, and service is world class. Progent also provides help for long-term engagements that requires the expertise of senior security engineers with top industry credentials.
If your Hawaii office is located some distance from major metropolitan neighborhoods including Honolulu, access to local qualified network security experts could be problematic during a crisis. This can cause lost revenue for your company, angry customers, idle workers, and distracted executives. By contacting Progent's online services, you have access to a Premier security engineer who can deliver assistance when you have to have it to get your system operating and salvage your information.
Progent can assist you in all your initiatives to protect your network with support services that ranges from network security assessments to creating a comprehensive security plan. Progent provides economical service to help businesses of all sizes to configure and maintain safe IT environments powered by Windows and Cisco technology and that may include computers running UNIX or Linux operating systems as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to provide centralized management and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper layer of analysis for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and encryption. The on-premises security gateway can also enable Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified engineers are available online or on premises to offer a range of emergency or longer-term IT security services including:
If your network has an immediate requirement for computer security support, refer to Progent's Urgent Online Technical Help.
Progent's engineers offer world-class services in vital fields of system security including analysis, firewalls and VPN, and advanced security planning.
Progent's certified security consultants can assess the strength of your current computer security environment by performing comprehensive remote automated analysis based on sophisticated utilities and tested procedures. Progent's experience in this service saves your company time and money and assures an accurate portrayal of system vulnerability. The knowledge your business gains can form the basis of a network protection strategy that can permit your network to operate dependably and react quickly to future threats.
Automated Network Security Audits
Progent offers consulting in the use of security testing software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a set of programmed system auditing checks to uncover potential security vulnerabilities. Progent has broad knowledge of other network auditing products such as NMAP, AMAP Application Scanner, eEye, as well as utilities such as SolarWinds, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.
Progent can help you design security into your business operations, install scanning software, define and implement a protected system environment, and recommend policies to maximize the safety of your IT system. Progent's security engineers are ready to assist you to set up a firewall, design safe remote access to email and business applications, and install VPN. Find out more concerning Progent's automated security evaluation.
Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles designed to allow small businesses to get an objective security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Checkup, a security expert administers a comprehensive examination of your network from beyond your firewalled perimeter to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from a secure machine inside your company firewall to determine your exposure to inside threats. Both security inventory services are set up and run from a protected remote site. The project is overseen by an engineer who has earned high-level security credentials and who produces a report that summarizes and interprets the data collected by the security scan and proposes cost-effective remediation if called for.
Stealth Security Penetration Analysis Consulting
Stealth penetration testing is a key component of any comprehensive network security strategy. Progentís security professionals can perform thorough intrusion tests without the awareness of your company's in-house network support staff. Unannounced penetration checking shows whether current security monitoring systems such as intrusion incident alerts and event log monitoring are correctly configured and consistently checked. Find out more on Progent's stealth penetration analysis consulting.
Firewalls and VPN Support
Progent's background in network security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) products offered by a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants with important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The new ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your current PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and VPN Consulting Services
Cisco's security and offsite access technology provide a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Find out more details concerning Progent's Consulting Services for Cisco Security Solutions and VPN Appliances.
Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and choose the right products from multiple vendors to achieve your security objectives while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight series of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily evade legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to automate the complete threat progression including filtering, identification, containment, cleanup, and forensics. Key features include single-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, penetration alerts, device management, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single console. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your organization's specific requirements and that allows you prove compliance with legal and industry information protection regulations. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent can also assist you to set up and verify a backup and restore system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical data, apps and virtual machines that have become lost or damaged as a result of component failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can help you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading information security vendors to deliver web-based control and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved easily to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Planning
Any company should have a thoroughly thought out security program that includes both pre-attack procedures and reaction plans. The proactive plan is a set of steps that help to minimize security weaknesses. The post-attack plan helps your company's IT security engineers to assess the damage caused by an attack, fix the system, record the event, and get business functions restored as rapidly as possible.
Progent's expert information security engineers can to assist your business to run a complete vulnerability evaluation and define a company-wide security strategy to implement security policies and controls to mitigate future assaults and dangers.
CISM Qualified System Security Support Services
The CISM organization defines the core competencies and international standards of performance that IT security professionals are expected to master. CISM provides executive management the assurance that those who have earned their CISM certification possess the background and capability to provide efficient security administration and support consulting. Progent can provide the support of CISM Premier security professionals to assist businesses with:
Find out additional details concerning Progent's CISM Qualified Security Engineering Expertise.
- Information Security Strategies
- Risk Analysis
- Information Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Qualified Security Engineering Support
CISSP recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data security defined by ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security areas including:
Read additional information concerning Progent's CISSP-certified Network Security Support Services.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Solutions and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Cryptography Technology
- Telecom, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Certified information system architecture professionals are experts who have been awarded ISSAP Certification through thorough examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the most complex demands of IS security architecture bounded by the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-premier security specialists can help your company with all aspects of architecture security such as.
Read additional information concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Services.
- Access Management Mechanisms and Methodologies
- Phone System and Network Infrastructure Security
- Cryptography Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Hardware Security
CISA Certified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that signifies expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive test administered by the ISACA international professional group. Progent's CISA network security audit experts are available to assist your company with:
Learn more details concerning Progent's CISA Qualified Security Auditing Engineering Support.
- Information Systems Audit Services
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle
- Information Technology Support
- Protecting Data Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to validate an IT professional's ability to plan, deploy, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists can provide a range of risk evaluation services including:
Read additional information concerning Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to identify major risk scenarios
- Inventory legal, regulatory, and business mandates and company standards related to your information system to determine their possible influence on your business goals
- Point out potential threats for your business workflows to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct training to ensure your stakeholders understand IS risk so they can assist with your risk management program
- Connect identified risk vectors to your associated business processes to help assign risk responsibility
- Validate risk tolerance with executive leadership and key stakeholders to ensure they align
GIAC Accredited IS Security Engineering Support
Find out additional information concerning Progent's GIAC Information Assurance Expertise.
Global Information Assurance Certification was established in 1999 to certify the skill of network security engineers. GIAC's goal is to ensure that an accredited professional has the skills necessary to deliver services in critical areas of system, data, and application program security. GIAC accreditations are acknowledged by companies and institutions around the world including and the United States NSA. Progent's GIAC-certified IS security audit consultants are available to assist your business with:
Contact a Certified Progent Security Engineer
To learn how you can get in touch with a certified Progent security consultant for online or onsite assistance in Hawaii, phone 1-800-993-9400 or go to Remote Network Support.