Business computer networks in the state of Illinois now have prompt and affordable online help from Progent's certified network security experts to help with complex security problems. The cost is competitive, billing is per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex engagements that demand the services of senior security consultants with top security credentials.

In case your Illinois office is located far from major metropolitan neighborhoods like Chicago, Aurora, Rockford, or Naperville, help from local qualified security consultants may be limited during an urgent situation. This can cause a loss of productivity for your company, upset customers, idle workers, and defocused executives. By calling Progent's remote support, you have access to a Premier security professional ready to provide expertise whenever you need it to keep your computer network operating and salvage your information.

Progent can assist you at any level in your initiatives to protect your network with support that can range from network security assessments to creating a company-wide security strategy. Progent offers affordable support to help businesses of all sizes to set up and maintain safe IT environments powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the technology of leading data security vendors to deliver centralized management and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further level of inspection for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.

Progent's security professionals are accessible online or on site to offer a variety of emergency or longer-term network security services including:

  • Perform extensive security audits
  • Clean up promptly after attacks
  • Install and troubleshoot firewalls
  • Implement safe methods for offsite and mobile access
  • Deploy advanced solutions for defense against viruses, spam and DHAs
  • Develop a comprehensive security plan with 24x7 security monitoring
  • Provide outsourced Help Desk Services
  • Create an effective network backup and restore solution built around Microsoft DPM automated backup capability
If your business has an emergency requirement for IT security help, go to Progent's Urgent Remote Network Help.

Progent's support professionals can deliver world-class services in key facets of system security that include security evaluation, firewalls and VPN, and high-level security consulting.

System Security Evaluation
Progent's certified security consultants can evaluate the strength of your existing network protection systems through comprehensive remote automated testing via advanced software tools and proven techniques. Progent's experience in this service saves you time and money and assures an objective portrayal of gaps. The knowledge your IT organization is provided can make up the basis of a security plan that will allow your information system to operate safely and adapt rapidly to new risks.

Automated Network Vulnerability Assessment
Progent offers expertise in the use of security analysis products including Microsoft's MBSA and LANguard from GFI for affordably running a set of programmed network auditing scans to identify possible security weaknesses. Progent has broad experience with other security auditing tools including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can show you how to build security into your company processes, configure auditing tools, define and implement a protected system environment, and recommend policies to maximize the security of your IT system. Progent's security engineers are ready to assist you to configure a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out additional information about Progent's automated security analysis.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory service packages intended to enable small businesses to get a professional network security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your network from outside your company firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from an authorized computer inside your company firewall to assess the risk to internal attacks. Both security inventory packages are configured and run from a secured external location. The process is directed by a consultant with top security credentials and who generates a report that summarizes and interprets the data captured by the security scan and proposes cost-effective remediation if called for.

Stealth Security Penetration Analysis Support Services
Stealth intrusion testing is an important part of any serious network security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's in-house network support resources. Stealth penetration checking shows whether existing security defense tools such as intrusion incident alerts and event history analysis are correctly configured and actively monitored. Learn more about Progent's network penetration analysis consulting.

Firewalls and VPN Expertise
Progent's background in security technology includes extensive field work with major firewalls and VPN products from multiple companies such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Security and VPN Engineering Expertise
Cisco's security and offsite access products provide a comprehensive range of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco CCIE and CCNP qualifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company objectives. Read additional details concerning Progent's Support Services for Cisco Security Technology and VPN Appliances.

Consulting Services for Additional Firewall and VPN Solutions
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security plan and select the right technologies from a variety of vendors to support your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning technology to defend endpoint devices and physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to manage the complete threat progression including protection, identification, containment, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device management, and web filtering via leading-edge tools packaged within one agent accessible from a single console. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical data, apps and VMs that have become lost or damaged due to component failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security companies to provide web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host configured and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported easily to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard information about your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more details about ProSight IT Asset Management service.

Expert Network Security Consulting
Any business ought to have a thoroughly considered security strategy that includes both proactive processes and response plans. The proactive strategy is a set of procedures designed to minimize vulnerabilities. The post-attack strategy helps your security engineers to assess the damage caused by a security penetration, repair the system, document the experience, and get the IT network restored as soon as possible.

Progent's expert IT security engineers are available to assist you to run a comprehensive risk evaluation and define a network security strategy to establish security processes and mechanisms to minimize ongoing attacks and threats.

CISM Certified System Security Support Services
The CISM committee describes the core competencies and worldwide standards of skill that IT security professionals are required to master. CISM provides executive management the assurance that consultants who have qualified for their CISM certification possess the background and knowledge to deliver efficient security administration and consulting consulting. Progent can provide the services of CISM Certified security consultants to help companies with:

  • Information Security Governance
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Administration
  • Response Planning
Read additional information concerning Progent's CISM Certified IS Security Support Services.

CISSP Accredited Security Consulting Support
The CISSP credential denotes mastery of an international standard for data security. ANSI has awarded the CISSP credential accreditation in the field of data protection defined by ISO 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a variety security fields including:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Read more information about Progent's CISSP Qualified Cybersecurity Consulting Professionals.

CISSP-ISSAP Certified Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified network architecture engineers are experts who have earned ISSAP status as a result of thorough examination and extensive experience with network security design. The ISSAP certification represents proven competence in the more challenging demands of IS security architecture bounded by the broader scope of IS security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Options
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Find out more details concerning Progent's ISSAP Accredited Secure Information System Architecture Support Expertise.

CISA Certified Security Auditing Consulting Assistance
The CISA accreditation is a recognized achievement that indicates mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates pass a comprehensive examination given by the ISACA international professional group. Progent's CISA security audit experts are available to assist your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get more information concerning Progent's CISA Qualified IS Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to validate an IT professional's skills to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to develop and carry out a business continuity strategy that follows industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a variety of risk evaluation services including:

  • Gather information and study documentation to help identify significant risk scenarios
  • Identify statutory, industry, and business mandates and organizational policies related to your information system to assess their possible influence on your business objectives
  • Identify possible threats for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to ensure your organization understand IS risk so they can assist with your risk management process
  • Match key risk scenarios to related operational processes to help determine risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to make sure they match
Get more details about Progent's CRISC Risk Management Experts.

GIAC Qualified Network Security Engineering Services
Global Information Assurance Certification was established in 1999 to validate the skill of IT security engineers. GIAC's goal is to ensure that an accredited security consultant has the skills needed to provide services in critical areas of network, data, and application software security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States NSA. Progent's GIAC IS security audit consultants can assist your company with:

Read additional details about Progent's GIAC Information Assurance Expertise.

Contact a Security Engineer
To see how you can contact a Progent security engineer for remote or onsite support in Illinois, phone 1-800-993-9400 or visit Online Network Support.