Small business information networks in the state of Indiana can have fast and affordable online help from Progent's qualified security consultants to help with urgent security problems. Rates are affordable, charges are per minute, engagement is fast, and service is world class. Progent also offers assistance for complex engagements that demand the knowledge of senior security engineers with high-level industry certifications.
If your Indiana business is some distance from more populated urban neighborhoods such as Fort Wayne, Gary, Evansville, or South Bend, support from local qualified network security experts could be problematic during a crisis. This can result in a loss of income for your business, upset customers, unproductive workers, and defocused management. By calling Progent's online services, you have access to a Certified security professional ready to offer assistance whenever you require it to get your network operating and restore your data.
Progent can help you in a variety of ways in your initiatives to guard your network with support that can range from network security assessments to developing a comprehensive security strategy. Progent offers affordable service to assist businesses of all sizes to configure and manage protected IT environments based on Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security vendors to deliver web-based control and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a deeper level of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.
Progent's certified consultants are available online or on site to offer a range of emergency or longer-term network security services which include:
If your network has an urgent requirement for computer security help, refer to Progent's Emergency Remote Technical Support.
- Run comprehensive security audits
- Clean up quickly after attacks
- Set up firewalls from multiple vendors
- Implement safe solutions for remote and mobile connectivity
- Install advanced software for automatic protection against viruses, spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 security monitoring
- Offer outsourced Call Center Services
- Create an effective data backup and recovery solution built around Data Protection Manager backup technology
Progent's support professionals provide world-class support in key fields of network protection including security assessment, firewalls and VPN, and high-level security planning.
System Security Assessment
Progent's expert security engineers can assess the vulnerability of your current computer protection implementation by performing comprehensive remote automated analysis based on sophisticated software tools and proven techniques. Progent's experience in administering this testing saves your company consulting fees and offers an objective picture of system vulnerability. The information your IT organization gains can be used as the foundation of a security plan that can allow your information system to run safely and react rapidly to new risks.
Automated Network Security Assessment
Progent provides consulting in the use of security evaluation packages such as MBSA and GFI LANguard Network Security Scanner for affordably running a variety of automatic network testing checks to identify potential security gaps. Progent has extensive knowledge of additional network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can help you design protection into your company processes, configure auditing tools, define and deploy a secure network architecture, and recommend policies to optimize the security of your network. Progent's security engineers are available to help you configure a firewall, implement secure remote connectivity to email and data, and install virtual private network. Learn additional information about Progent's network security assessment.
Security Inventory Scanning Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles designed to enable small companies to get an impartial network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized computer within your company firewall to determine your exposure to inside threats. The two security inventory packages are set up and run from a secured external location. The project is overseen by an engineer with top security accreditations and who generates a document that summarizes and analyzes the data collected by the scan and suggests practical remediation if called for.
Stealth Security Penetration Analysis Consulting
Stealth penetration checking is a key part of any comprehensive network security strategy. Progentís security professionals can run thorough penetration tests without the knowledge of your company's internal network support staff. Unannounced penetration testing shows whether existing security defense systems such as intrusion detection alerts and event log analysis are correctly set up and consistently checked. Find out more concerning Progent's network security penetration analysis consulting.
Firewall and Virtual Private Network Support
Progent's expertise in security solutions includes extensive familiarity with major firewalls and Virtual Private Network technology from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote connection products offer a comprehensive line of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Learn additional information concerning Progent's Engineering Services for Cisco Security Solutions and VPN Products.
Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies such as Check Point Software, Juniper, and SonicWALL. Progent can help you create a detailed security plan and choose the right products from multiple vendors to support your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior analysis technology to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily get by legacy signature-matching AV tools. ProSight ASM safeguards local and cloud-based resources and offers a unified platform to address the entire malware attack lifecycle including filtering, detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge technologies packaged within one agent accessible from a unified control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP environment that meets your company's unique needs and that helps you prove compliance with legal and industry information protection regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for immediate attention. Progent's consultants can also help you to set up and test a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup processes and enables rapid restoration of vital files, apps and virtual machines that have become unavailable or corrupted as a result of component failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced expertise to set up ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical data. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security companies to provide centralized management and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage space. Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and safeguard data related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT infrastructure documentation, you can save as much as 50% of time wasted looking for vital information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Network Security Consulting
Every business ought to develop a carefully thought out security strategy that incorporates both proactive procedures and reaction plans. The proactive plan is a set of steps intended to minimize security weaknesses. The post-attack plan helps your company's security personnel to evaluate the impact resulting from a security penetration, repair the network, record the experience, and get the IT network running as rapidly as feasible.
Progent's certified IT security consultants are available to help your business to run a comprehensive vulnerability evaluation and create a computer security plan to establish security processes and controls to mitigate ongoing attacks and threats.
CISM Certified Information Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the basic competencies and global standards of skill that IT security managers are required to master. CISM provides business management the assurance that consultants who have qualified for their CISM certification have the background and knowledge to deliver efficient security management and support consulting. Progent can provide the services of CISM Certified security professionals to assist businesses with:
Find out additional information about Progent's CISM Network Security Consulting Expertise.
- IS Security Governance
- Risk Management
- Network Security Implementation Management
- Network Security Management
- Recovery Planning
CISSP Qualified Security Engineering Services
CISSP denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of information protection stipulated by ISO 17024. Progent can provide access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security areas including:
Read more details concerning Progent's CISSP Accredited Information Security Support Professionals.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Certified IT architecture professionals are experts who have earned ISSAP Certification through rigorous testing and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the more complex requirements of IS security architecture within the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture such as.
Read more information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Services.
- Access Control Systems and Techniques
- Phone System and Network Security
- Data Encryption Options
- Needs Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Certified Information System Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that signifies mastery in network security auditing. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive test administered by the ISACA international professional group. Progent's CISA-qualified information security audit engineers are available to assist your IT organization in the areas of:
Find out more information about Progent's CISA Certified Information System Security Auditing Engineering Support.
- Information Systems Audit Process
- Information Technology Administration
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Service Delivery
- Protecting Data Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, deploy, and support IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk management experts offer a range of risk assessment services such as:
Get the details concerning Progent's CRISC Risk Management Experts.
- Collect data and review documentation to evaluate major risk scenarios
- Inventory statutory, industry, and business requirements and company policies associated with your information system to assess their possible influence on your business goals
- Point out potential threats for your business processes to help in analyzing your enterprise risk
- Create a risk awareness initiative and provide training to ensure your organization understand information system risk so they can contribute to your risk control process
- Connect identified risk vectors to your associated business processes to help determine risk responsibility
- Validate risk appetite with your senior leadership and major stakeholders to ensure they match
GIAC Qualified Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to ensure that a certified professional possesses the knowledge necessary to deliver support in key areas of network, data, and application program security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. NSA. Progent's GIAC-qualified security audit experts are available to assist your company with:
Find out additional information about Progent's GIAC Information Assurance Services.
- Assessing Networks
- Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Progent Security Expert
To find out how you can get in touch with a security consultant for remote or on-premises help in Indiana, phone 1-800-993-9400 or visit Remote Computer Support.