Small business computer networks in the state of Indiana now have prompt and economical online technical support from Progent's accredited network security engineers to fix critical security problems. The cost is reasonable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex engagements that demand the knowledge of senior security consultants with high-level security certifications.
In case your Indiana business is located far from major urban neighborhoods including Fort Wayne, Gary, Evansville, or South Bend, the availability of nearby certified network security experts is often problematic during a security disaster. This can cause lost revenue for your company, upset clients, unproductive employees, and distracted executives. By calling Progent's online services, you can get in touch with a Certified security engineer who can provide help when you require it to keep your network operating and salvage your data.
Progent can assist you in your efforts to protect your network with support services ranging from security checks to creating a company-wide security strategy. Progent provides affordable support to help companies of any size to configure and manage protected IT environments powered by Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver centralized control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a deeper layer of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, DLP, and encryption. The onsite gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.
Progent's certified experts are accessible remotely or in person to provide a variety of urgent or project-based IT security services including:
If your network has an emergency requirement for computer security support, go to Progent's Urgent Remote Network Help.
- Run thorough network security evaluations
- Recover rapidly after virus and worm attacks
- Configure firewalls from multiple vendors
- Configure secure methods for remote and mobile connectivity
- Deploy advanced utilities for automatic protection against viruses, spam and directory harvest attacks
- Develop a company-wide security strategy with 24x7 monitoring
- Provide outsourced Help Desk Call Center Services
- Help Develop a practical network backup and disaster recovery solution based on System Center Data Protection Manager backup/restore capability
Progent's consultants provide world-class services in key areas of network security including analysis, firewalls and VPN, and high-level security planning.
System Security Audits
Progent's expert security engineers can evaluate the vulnerability of your existing network protection implementation through comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's experience in administering this service saves you consulting fees and offers a detailed picture of gaps. The information your business is provided can be used as the foundation of a security plan that can allow your network to run safely and adapt quickly to new threats.
Automated Network Vulnerability Assessment
Progent offers expertise in the use of security analysis products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically running a variety of automatic network testing scans to uncover possible security weaknesses. Progent has broad experience with additional security analysis utilities such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand audit reports and respond effectively.
Progent can help you design protection into your company operations, configure scanning tools, plan and deploy a secure network architecture, and suggest policies to optimize the security of your network. Progent's security professionals are available to assist you to set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn additional information on Progent's automated security analysis.
Security Inventory Scanning Packages for Small Businesses
Progent offers two low-cost security inventory scanning packages designed to allow small companies to receive a professional network security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your network from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from a secure computer within your firewall to determine the risk to inside attacks. The two security inventory services are configured and run from a secured external location. The project is directed by an engineer with top security accreditations and who generates a report that summarizes and analyzes the data captured by the security scan and suggests cost-effective improvements where called for.
Stealth Security Penetration Testing Consulting
Stealth penetration testing is a key part of any successful network security plan. Progentís security professionals can perform thorough penetration tests without the awareness of your company's internal IT staff. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident alerts and event log analysis are correctly set up and consistently monitored. Find out additional information about Progent's stealth penetration testing consulting.
Progent's expertise in network security solutions encompasses extensive field work with major firewalls and VPN products offered by multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and remote connection technology represent a complete line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Learn more information about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Products.
Consulting Services for Additional Firewall and VPN Products
Progent offers small and medium size companies expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security plan and choose appropriate technologies from a variety of suppliers to support your security goals while sticking within your spending restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a unified platform to manage the entire malware attack progression including blocking, detection, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection services deliver economical multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and implement a ProSight ESP deployment that meets your company's specific requirements and that allows you demonstrate compliance with government and industry data security standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent's consultants can also assist you to install and verify a backup and restore solution like ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical data, apps and VMs that have become lost or corrupted as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security vendors to deliver centralized management and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Every business should have a carefully considered security program that incorporates both proactive processes and reaction plans. The proactive plan is a collection of steps that help to minimize vulnerabilities. The post-attack plan helps your network security personnel to assess the damage resulting from an attack, repair the damage, record the event, and get business functions restored as rapidly as possible.
Progent's certified IT security engineers are available to assist your company to perform a comprehensive vulnerability assessment and define a company-wide security strategy to implement security processes and controls to reduce future assaults and dangers.
CISM Qualified System Security Engineering Services
The CISM organization describes the core competencies and worldwide standards of performance that IT security professionals are required to master. CISM provides business management the confidence that those who have earned their CISM credential have the background and capability to provide efficient security administration and support consulting. Progent can provide the services of CISM Certified security professionals to assist businesses with:
Find out more details about Progent's CISM Certified IS Security Engineering Services.
- Network Security Strategies
- Risk Analysis
- Network Security Program Management
- IS Security Administration
- Response Planning
CISSP Certified Security Engineering Assistance
The CISSP credential recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information security defined by ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields such as:
Learn more details concerning Progent's CISSP-certified Information Security Support Expertise.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Technology
- Telecommunications, LAN and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Premier system architecture engineers are experts who have earned ISSAP Certification through rigorous examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven mastery in the most challenging demands of IS security architecture bounded by the wider scope of information security expertise required for CISSP certification. Progent's ISSAP-premier security experts can assist your company with all phases of architecture security such as.
Learn more information concerning Progent's ISSAP Certified Secure IT Architecture Consulting Services.
- Access Control Systems and Methodologies
- Telecom and System Infrastructure Security
- Cryptography Options
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that indicates expertise in network security auditing. Certified by ANSI, the CISA credential requires that candidates pass a comprehensive test given by the ISACA international professional group. Progent's CISA-certified information security audit engineers are available to assist your company with:
Read the details concerning Progent's CISA Qualified Network Security Auditing Consulting Assistance.
- IS Audit Process
- IT Administration
- Network Assets and Architecture Lifecycle Planning
- Information Technology Service Delivery
- Safeguarding Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's ability to plan, implement, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation consultants offer a range of risk evaluation services such as:
Learn additional details about Progent's CRISC Risk Management Consultants.
- Collect data and study documentation to identify major risk scenarios
- Identify statutory, regulatory, and business mandates and organizational standards associated with your information system to assess their potential influence on your business goals
- Point out possible vulnerabilities for your operational workflows to assist in analyzing your corporate risk
- Create a risk awareness program and provide seminars to ensure your organization understand IT risk so they can contribute to your risk control process
- Match identified risk vectors to related operational processes to help assign risk responsibility
- Validate risk appetite with your senior leadership and key stakeholders to make sure they match
GIAC Certified IS Security Engineering Services
Read more details about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to verify that a certified professional has the skills appropriate to provide services in vital areas of system, information, and application security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified information security audit experts can help your IT organization with:
Contact a Progent Security Expert
To see how to access a certified Progent security consultant for remote or on-premises help in Indiana, call 1-800-993-9400 or visit Online Network Help.