Business computer networks in the state of Illinois can depend on quick and economical online help from Progent's certified network security professionals to fix the toughest security problems. The cost is reasonable, billing is by the minute, engagement is immediate, and service is world class. Progent also provides assistance for long-term projects that requires the expertise of seasoned security engineers with high-level industry certifications.
If your Illinois office is far from larger urban areas such as Chicago, Aurora, Rockford, or Naperville, access to local accredited network security professionals could be limited when there's an urgent situation. This could mean a drop in productivity for your company, angry customers, unproductive employees, and distracted executives. By utilizing Progent's remote support, you have access to a Certified security professional ready to offer assistance when you need it to keep your system operating and restore your data.
Progent can help you in a variety of ways in your initiatives to guard your IT environment with services that can range from network security audits to creating a comprehensive security plan. Progent offers affordable service to assist businesses of all sizes to design and manage safe IT environments powered by Windows and Cisco technology and that may include computers running UNIX or Linux platforms as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to provide web-based management and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, DLP, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter.
Progent's certified experts are available remotely or on site to provide a variety of urgent or longer-term IT security services such as:
If your business has an immediate need for computer security help, refer to Progent's Urgent Online Network Support.
Progent's support professionals can deliver world-class services in vital areas of system security that include security assessment, firewall and VPN solutions, and high-level security planning.
Progent's certified security consultants can assess the strength of your existing network protection environment by performing exhaustive remote automated testing via sophisticated software tools and proven techniques. Progent's experience in this service saves your company time and money and assures a detailed portrayal of system vulnerability. The knowledge your IT organization is provided can be used as the foundation of a security plan that will permit your network to run safely and respond rapidly to future threats.
Automated Network Security Assessment
Progent offers expertise in the application of security evaluation packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably performing a variety of programmed network auditing checks to identify possible security weaknesses. Progent has broad knowledge of additional security analysis products including NMAP, AMAP, eEye, as well as tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond effectively.
Progent can show you how to build security into your company processes, configure scanning applications, define and deploy a protected network architecture, and suggest policies to optimize the safety of your network. Progent's security engineers are ready to show you how to set up a firewall, design safe remote access to email and business applications, and integrate VPN. Learn more about Progent's network security audits.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages intended to allow small businesses to receive an objective network security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from beyond your firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from an authorized machine inside your company firewall to determine the risk to inside threats. The two security inventory packages are set up and run from a protected remote site. The project is overseen by an engineer who has earned top security accreditations and who produces a document that details and analyzes the information collected by the security scan and proposes practical improvements where appropriate.
Stealth Security Penetration Analysis Consulting
Stealth intrusion testing is a key part of any serious network security strategy. Progentís security experts can run extensive intrusion checks without the knowledge of your organization's in-house network support resources. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event history analysis are properly set up and actively monitored. Learn more about Progent's network security penetration analysis consulting.
Progent's expertise in security solutions includes in-depth field work with major firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and remote connection products offer a comprehensive range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Find out additional information about Progent's Engineering Services for Cisco Security and VPN Appliances.
Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security strategy and choose appropriate technologies from a variety of vendors to achieve your security goals while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis tools to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-based AV tools. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the entire threat progression including blocking, infiltration detection, containment, cleanup, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge technologies incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that helps you demonstrate compliance with government and industry information protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital files, applications and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your critical information. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to external attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway device provides a further level of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved easily to a different hosting environment without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can save up to half of time spent looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every business should develop a thoroughly thought out security strategy that includes both pre-attack procedures and reaction plans. The proactive plan is a collection of steps intended to minimize security weaknesses. The post-attack strategy helps your network security engineers to evaluate the damage resulting from an attack, repair the system, record the event, and get the IT network restored as soon as possible.
Progent's certified IT security engineers can to assist your business to perform a comprehensive vulnerability evaluation and create a computer security plan to establish security policies and mechanisms to reduce ongoing assaults and threats.
CISM Certified Security Support Assistance
The Certified Information Security Manager (CISM) committee defines the core competencies and global standards of performance that IT security managers are required to learn. It gives executive management the assurance that those who have qualified for their CISM credential possess the background and capability to provide effective security administration and consulting services. Progent offers the support of CISM Premier security consultants to help companies with:
Read additional information about Progent's CISM Accredited Network Security Support Professionals.
- Information Security Processes
- Risk Analysis
- IS Security Program Management
- IS Security Administration
- Recovery Planning
CISSP Certified Security Consulting Services
CISSP recognizes expertise with an international standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the area of data security under ISO 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security fields including:
Find out more details about Progent's CISSP-certified Security Support Professionals.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Premier network architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough testing and significant work with information security design. The ISSAP certification indicates proven skill in the most complex requirements of information security architecture within the broader field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.
Read more details concerning Progent's ISSAP Certified Secure System Architecture Support Expertise.
- Access Control Mechanisms and Techniques
- Phone System and Network Security
- Encryption/Decryption Solutions
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified Network Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that indicates mastery in IS security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass a comprehensive examination administered by the ISACA international professional association. Progent's CISA IS security audit consultants are available to assist your business with:
Get additional details about Progent's CISA Qualified Information System Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle
- IT Service Delivery
- Protecting Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify a consultant's skills to design, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation engineers can provide a range of risk assessment services such as:
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and review documentation to help identify major vulnerabilities
- Inventory statutory, regulatory, and contractual mandates and organizational policies related to your network to assess their possible influence on your business goals
- Identify potential vulnerabilities for your operational processes to assist in analyzing your corporate risk
- Create a risk awareness program and conduct training to make sure your organization understand information system risk so they can assist with your risk control program
- Connect identified risk vectors to related operational procedures to help determine risk responsibility
- Validate risk tolerance with executive management and key stakeholders to make sure they match
GIAC Certified Information System Security Consulting Services
Learn more details about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to ensure that a certified security consultant possesses the knowledge appropriate to deliver support in important categories of network, information, and application security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. NSA. Progent's GIAC network security audit specialists are available to assist your IT organization with:
Get in Touch with a Certified Progent Security Engineer
To learn how you can get in touch with a Progent security consultant for online or on-premises expertise in Illinois, phone 1-800-993-9400 or visit Online Computer Support.