Small business IT networks in Illinois can have quick and economical online technical support from Progent's accredited security consultants to assist with critical security problems. The cost is reasonable, charges are per minute, sign-up is fast, and support is unbeatable. Progent also provides assistance for complex projects that requires the services of senior security consultants with high-level security certifications.
In case your Illinois organization is located outside of more populated urban neighborhoods including Chicago, Aurora, Rockford, or Naperville, access to nearby certified network security experts may be problematic when you have an urgent situation. This can result in lost productivity for your company, angry customers, unproductive employees, and defocused management. By utilizing Progent's online services, you can get in touch with a Premier security consultant who can provide expertise whenever you require it to get your system operating and salvage your data.
Progent can assist you in a variety of ways in your initiatives to guard your network with support services that can range from security assessments to creating a company-wide security strategy. Progent offers economical service to assist businesses of all sizes to configure and maintain safe networks based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux operating systems plus BYOD users with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security platform that uses the technology of leading information security vendors to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also enable Exchange Server to monitor and protect internal email that stays within your corporate firewall.
Progent's security engineers are available online or on premises to offer a range of emergency or longer-term IT security services including:
If your network has an emergency requirement for IT security help, refer to Progent's Urgent Online Technical Help.
Progent's engineers offer world-class services in vital fields of computer security including analysis, firewalls and VPN, and high-level security planning.
System Security Audits
Progent's certified security engineers can assess the strength of your existing network protection implementation by performing comprehensive remote automated testing based on advanced software tools and proven techniques. Progent's skill in administering this service saves your company time and money and assures an objective picture of system vulnerability. The information your business gains can make up the basis of a security strategy that will permit your network to operate dependably and react quickly to new risks.
Automated Network Security Analysis
Progent provides expertise in the use of security auditing utilities including Microsoft's MBSA and GFI LANguard NSS for economically running a variety of automatic network testing scans to identify potential security weaknesses. Progent has broad experience with additional security auditing products such as NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can help you design security into your company processes, configure auditing software, define and implement a protected network environment, and recommend procedures to optimize the security of your IT system. Progent's security consultants are ready to assist you to configure a firewall, implement safe remote access to email and data, and integrate VPN. Find out additional information on Progent's network security assessment.
Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory service bundles designed to enable small companies to receive an impartial network security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your company firewall to uncover potential risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from a secure computer inside your firewall to assess vulnerabilities to internal assaults. Both security inventory services are configured and executed from a protected external location. The project is directed by a consultant with high-level security accreditations and who produces a report that details and analyzes the information collected by the scan and proposes practical remediation if appropriate.
Network Intrusion Analysis Consulting
Stealth penetration checking is a key part of any successful network security strategy. Progentís security experts can run thorough intrusion checks without the knowledge of your organization's in-house IT resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion detection alerts and event history monitoring are correctly set up and actively checked. Find out more concerning Progent's network penetration testing consulting.
Firewall and Virtual Private Network Expertise
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help your company to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and offsite access technology provide a complete range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Find out additional information about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.
Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate products from a variety of vendors to support your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily escape legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack progression including blocking, identification, containment, remediation, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge technologies packaged within one agent managed from a single console. Progent's data protection and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your company's specific requirements and that helps you prove compliance with legal and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require immediate attention. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed service for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates your backup processes and allows rapid restoration of vital files, apps and VMs that have become lost or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide world-class support to configure ProSight DPS to to comply with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security vendors to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to external threats and saves network bandwidth and storage. Email Guard's onsite security gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect information related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can save up to half of time spent searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any company ought to have a carefully thought out security program that incorporates both preventive processes and response plans. The proactive strategy is a set of steps that help to reduce security weaknesses. The post-attack strategy assists your IT security engineers to assess the damage resulting from an attack, fix the damage, document the experience, and get business functions operational as soon as possible.
Progent's expert information security engineers can to assist you to perform a comprehensive risk evaluation and create a network security plan to establish security processes and mechanisms to minimize future attacks and dangers.
CISM Accredited Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the core competencies and global standards of performance that IT security professionals are required to master. CISM provides executive management the assurance that those who have earned their CISM certification have the experience and knowledge to provide effective security management and consulting services. Progent offers the support of CISM Certified security consultants to help companies with:
Learn additional information concerning Progent's CISM Security Support Expertise.
- Information Security Processes
- Risk Analysis
- IS Security Program Management
- Information Security Administration
- Response Management
CISSP Accredited Security Engineering Support
The CISSP credential denotes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information security stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas including:
Find out more information concerning Progent's CISSP Information Security Consulting Expertise.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous examination and significant work with information security design. The ISSAP credential indicates proven skill in the more in-depth requirements of IS security architecture within the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all phases of secure network architecture such as.
Read more details concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Services.
- Access Management Systems and Techniques
- Phone System and System Infrastructure Protection
- Encryption/Decryption Options
- Requirements Analysis and Security Criteria
- Business Continuity Planning and DRP
- Physical Security
CISA Qualified IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that indicates expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an extensive test administered by the ISACA international professional group. Progent's CISA-certified information security audit specialists can assist your company with:
Read more details concerning Progent's CISA Accredited Network Security Auditing Consulting Services.
- IS Audit Process
- IT Enforcement
- Systems and Infrastructure Lifecycle
- IT Support
- Safeguarding Data Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's skills to design, implement, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and execute a business continuity plan that follows leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC IT risk mitigation experts offer a variety of risk assessment services including:
Learn the details about Progent's CRISC Risk Management Consultants.
- Collect information and review documentation to evaluate significant risk scenarios
- Inventory statutory, industry, and contractual requirements and company policies associated with your network to assess their potential impact on your business objectives
- Identify possible threats for your operational workflows to help in evaluating your corporate risk
- Develop a risk awareness program and provide seminars to ensure your stakeholders understand information system risk so they can assist with your risk management program
- Connect identified risk vectors to related business processes to help assign risk responsibility
- Validate risk tolerance with executive management and key stakeholders to ensure they align
GIAC Qualified IS Security Consulting Expertise
Learn more information about Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was established in 1999 to validate the knowledge of network security experts. GIAC's goal is to make sure that a certified security consultant possesses the knowledge necessary to provide services in critical areas of system, information, and software security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC security audit consultants are available to assist your company in the areas of:
Get in Touch with a Progent Security Expert
To find out how you can access a certified security engineer for online or onsite help in Illinois, call 1-800-993-9400 or go to Remote Computer Help.