Small business computer networks in Indiana can have quick and economical remote technical support from Progent's qualified network security support specialists to fix the toughest security issues. The cost is reasonable, charges are per minute, sign-up is immediate, and support is world class. Progent also offers assistance for complex engagements that requires the expertise of seasoned security consultants with high-level security credentials.
In case your Indiana organization is based far from larger metropolitan areas including Fort Wayne, Gary, Evansville, or South Bend, help from local certified security professionals may be limited when there's an emergency. This can cause lost income for your company, upset customers, idle employees, and defocused executives. By utilizing Progent's online services, you can get in touch with a Certified security consultant who can deliver expertise when you have to have it to keep your network on line and salvage your data.
Progent can help you in all your efforts to guard your IT environment with services ranging from network security audits to creating a company-wide security strategy. Progent provides economical support to assist small and midsize companies to configure and maintain safe networks based on Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security solution that incorporates the technology of top information security companies to deliver web-based control and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your network firewall. This decreases your exposure to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a further level of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.
Progent's certified engineers are accessible online or on premises to offer a range of urgent or longer-term IT security services which include:
If your network has an immediate requirement for computer security support, go to Progent's Urgent Online Technical Help.
Progent's consultants offer advanced support in vital areas of computer security including security evaluation, firewall and VPN solutions, and high-level security consulting.
Progent's expert security consultants can assess the effectiveness of your current network protection implementation by performing comprehensive remote automated testing based on advanced utilities and proven procedures. Progent's experience in administering this service saves your company consulting fees and offers an accurate picture of security holes. The information your IT organization is provided can be used as the foundation of a security strategy that will allow your network to run safely and react quickly to new threats.
Automated Vulnerability Assessment
Progent offers expertise in the application of security testing software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably running a variety of automatic system auditing checks to identify potential security gaps. Progent has broad knowledge of additional security analysis products including NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of testing reports and react appropriately.
Progent can help you design security into your company operations, configure scanning tools, define and deploy a protected network architecture, and recommend procedures to maximize the security of your network. Progent's security consultants are ready to help you configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information about Progent's network security assessment.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service bundles intended to enable small companies to receive an objective network security assessment from a qualified security engineer. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a network scan from an authorized machine inside your company firewall to assess your exposure to inside assaults. The two security inventory services are configured and executed from a secured external site. The process is overseen by a consultant with high-level security accreditations and who generates a report that summarizes and interprets the data collected by the scan and suggests cost-effective remediation where called for.
Network Intrusion Analysis Consulting
Stealth intrusion checking is a key part of any successful network security strategy. Progentís security experts can perform thorough intrusion checks without the awareness of your organization's internal IT resources. Stealth penetration testing shows whether current security defense systems such as intrusion detection alerts and event log analysis are properly set up and actively checked. Learn additional information on Progent's stealth penetration testing consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network products offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned important networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your existing PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access products represent a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Find out more details about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and VPN Products
Progent offers small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and choose appropriate products from a variety of vendors to support your security goals while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to automate the complete threat progression including blocking, detection, containment, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your organization's unique needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations an affordable and fully managed service for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of critical data, applications and virtual machines that have become unavailable or corrupted as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can provide advanced support to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security companies to deliver web-based control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hosting environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can save up to 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Certified Security Consulting
Every company should have a thoroughly considered security strategy that incorporates both pre-attack procedures and reaction planning. The pre-attack plan is a set of procedures designed to minimize vulnerabilities. The post-attack plan assists your company's security personnel to evaluate the impact caused by a security penetration, repair the system, document the experience, and get the IT network restored as soon as feasible.
Progent's certified IT security consultants can to assist your business to run a complete risk evaluation and create a company-wide security strategy to implement security policies and mechanisms to minimize future attacks and threats.
CISM Qualified System Security Consulting Services
The CISM committee describes the basic competencies and global standards of skill that information security professionals are expected to master. CISM gives business management the confidence that consultants who have qualified for their CISM certification have the background and capability to deliver efficient security management and consulting services. Progent offers the services of CISM Certified security consultants to help businesses with:
Find out additional details about Progent's CISM Security Support Professionals.
- Information Security Processes
- Risk Management
- Information Security Implementation Management
- Information Security Management
- Recovery Planning
CISSP Qualified Security Consulting Support
CISSP certification denotes expertise with an international standard for network security. ANSI has awarded certification accreditation in the area of data security defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security areas such as:
Find out additional information concerning Progent's CISSP Qualified Information Security Consulting Professionals.
- Security Administration Practices
- Security Architecture and Models
- Access Management Systems and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption Technology
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Certified IT architecture engineers are consultants who have been awarded ISSAP Certification through thorough examination and significant experience with network security design. The ISSAP certification indicates proven mastery in the more in-depth requirements of information system security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-premier security consultants can assist your business with all aspects of architecture security such as.
Read more details about Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.
- Access Control Mechanisms and Methodologies
- Telecom and System Infrastructure Protection
- Cryptography Solutions
- Requirements Analysis and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Site Security
CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA international professional group. Progent's CISA-certified security audit engineers can help your business in the areas of:
Learn the details about Progent's CISA Qualified Network Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Enforcement
- Network Assets and Infrastructure Planned Useful Life
- IT Service Delivery
- Safeguarding Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate an IT professional's skills to design, deploy, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and execute a business continuity plan based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts offer a variety of risk identification services including:
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and review documentation to help identify significant risk scenarios
- Identify statutory, regulatory, and contractual requirements and company policies related to your information system to assess their possible influence on your business goals
- Identify possible vulnerabilities for your business processes to assist in analyzing your corporate risk
- Develop a risk awareness program and provide seminars to make sure your organization understand IT risk so they can contribute to your risk control process
- Match key risk scenarios to related business procedures to help determine risk ownership
- Determine risk tolerance with executive leadership and key stakeholders to make sure they are in agreement
GIAC Qualified IS Security Consulting Assistance
GIAC was founded in 1999 to certify the knowledge of network security engineers. GIAC's goal is to make sure that an accredited professional has the knowledge needed to deliver support in critical areas of system, information, and application security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-certified network security audit consultants can assist your business with:
Learn additional information about Progent's GIAC Information Assurance Support.
- Auditing Security Systems
- Security Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Contact a Progent Security Specialist
To find out how to get in touch with a certified Progent security engineer for online or onsite support in Indiana, call 1-800-993-9400 or go to Online Network Support.