Company computer networks in Iowa now have quick and economical online access to Progent's accredited network security engineers to resolve complex security issues. Rates are reasonable, billing is by the minute, sign-up is fast, and service is world class. Progent also provides help for complex projects that demand the services of senior security consultants with high-level industry credentials.
In case your Iowa business is located far from larger metropolitan neighborhoods including Des Moines, Cedar Rapids, Davenport, or Sioux City, access to local accredited network security engineers may be limited when there's an emergency. This can cause a drop in productivity for your company, upset clients, idle employees, and distracted management. By utilizing Progent's online services, you have access to a Certified security professional ready to deliver assistance whenever you have to have it to keep your system operating and restore your data.
Progent can help you in all your efforts to protect your IT environment with services that ranges from security audits to creating a comprehensive security plan. Progent offers economical support to assist companies of any size to design and maintain safe networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux operating systems as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to provide centralized control and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified experts are accessible remotely or on premises to offer a variety of urgent or longer-term network security services such as:
If your business has an urgent requirement for IT security support, refer to Progent's Urgent Online Network Help.
- Perform extensive security evaluations
- Recover rapidly after serious security breaches
- Install firewalls from multiple vendors
- Implement secure methods for offsite and mobile connectivity
- Install advanced software for automatic protection against viruses, spam and directory harvest attacks
- Develop a comprehensive security plan with 24x7 security monitoring
- Provide comprehensive Help Desk Services
- Develop an effective data backup and disaster recovery plan built around Data Protection Manager (DPM) automated backup technology
Progent's security experts provide world-class support in key fields of network security that include auditing, firewall/VPN support, and high-level security planning.
Progent's expert security engineers can evaluate the vulnerability of your current computer security systems by performing exhaustive remote automated analysis based on advanced software tools and proven techniques. Progent's skill in administering this testing saves your company time and money and offers an accurate portrayal of weaknesses. The knowledge your company gains can make up the basis of a network protection plan that will allow your network to operate safely and react quickly to new threats.
Automated Security Analysis
Progent offers consulting in the application of security analysis packages such as Microsoft's MBSA and GFI LANguard NSS for economically performing a set of programmed system auditing checks to uncover possible security vulnerabilities. Progent has extensive knowledge of other network analysis tools such as NMAP, AMAP Application Scanner, eEye, plus tools like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can show you how to design security into your company operations, install scanning tools, define and deploy a secure system environment, and recommend policies to optimize the security of your network. Progent's security professionals are available to assist you to configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information concerning Progent's network security audits.
Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles designed to enable small companies to get a professional network security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to uncover potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from a secure machine inside your firewall to evaluate vulnerabilities to inside assaults. Both security inventory services are configured and executed from a secured remote site. The project is managed by a consultant who has earned high-level security credentials and who generates a report that summarizes and analyzes the data collected by the scan and suggests cost-effective remediation if appropriate.
Stealth Security Penetration Analysis Consulting
Stealth intrusion checking is an important part of any serious network security strategy. Progentís security professionals can run thorough penetration tests without the knowledge of your company's in-house IT staff. Stealth penetration testing shows whether current security monitoring systems such as intrusion incident warnings and event log monitoring are properly configured and actively checked. Learn more about Progent's network security penetration testing support services.
Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important industry accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, optimize, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Consulting Expertise
Cisco's security and remote connection technology offer a complete line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Find out more information concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Products.
Consulting Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and select appropriate products from multiple suppliers to achieve your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to automate the complete malware attack lifecycle including blocking, detection, mitigation, cleanup, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device control, and web filtering through cutting-edge tools packaged within a single agent accessible from a unified control. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP environment that addresses your company's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require immediate action. Progent's consultants can also assist you to install and test a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup processes and allows rapid recovery of vital files, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR consultants can provide world-class expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security companies to deliver centralized management and world-class protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a further level of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Exchange Server to track and protect internal email that stays inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hosting environment without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard data about your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to 50% of time wasted searching for critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Consulting
Any business ought to develop a thoroughly thought out security strategy that includes both proactive processes and reaction planning. The proactive plan is a set of procedures designed to reduce vulnerabilities. The reactive plan assists your company's network security personnel to assess the damage caused by a security penetration, repair the damage, record the experience, and get the IT network running as rapidly as feasible.
Progent's certified IT security consultants are available to help you to perform a comprehensive vulnerability assessment and create a network security strategy to implement security policies and mechanisms to reduce future attacks and threats.
CISM Certified Network Security Engineering Assistance
The CISM committee defines the core competencies and worldwide standards of performance that information security managers are expected to master. CISM provides business management the confidence that consultants who have earned their CISM credential possess the background and capability to deliver effective security administration and support consulting. Progent offers the services of CISM Certified security professionals to assist companies with:
Learn additional details concerning Progent's CISM Accredited Network Security Consulting Professionals.
- Information Security Governance
- Risk Management
- IS Security Implementation Management
- Network Security Management
- Response Planning
CISSP Qualified Security Consulting Expertise
CISSP denotes mastery of a global standard for data security. The American National Standards Institute has granted certification recognition in the area of data security defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas including:
Read more details concerning Progent's CISSP Accredited Cybersecurity Support Services.
- Security Administration Procedures
- Security Architecture and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP status through thorough examination and extensive work with information security design. The ISSAP certification indicates demonstrated skill in the more complex requirements of information security architecture bounded by the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of secure network architecture including.
Read more details about Progent's ISSAP Accredited Secure System Architecture Engineering Expertise.
- Access Management Systems and Methodologies
- Phone System and System Infrastructure Security
- Cryptography Solutions
- Needs Evaluation and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security
CISA Certified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that signifies expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive test given by the ISACA international professional group. Progent's CISA information security audit experts can help your IT organization in the areas of:
Learn additional information concerning Progent's CISA Qualified Information System Security Auditing Consulting Assistance.
- IS Audit Process
- IT Enforcement
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Safeguarding Data Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to validate a consultant's ability to plan, deploy, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk management experts can provide a range of risk identification services including:
Learn more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to help identify major vulnerabilities
- Inventory legal, regulatory, and contractual mandates and company standards related to your information system to determine their possible influence on your business objectives
- Identify potential threats for your business processes to help in analyzing your corporate risk
- Develop a risk awareness initiative and provide training to make sure your organization appreciate information system risk so they can contribute to your risk management process
- Match identified risk scenarios to related operational procedures to help determine risk responsibility
- Determine risk appetite with executive management and major stakeholders to make sure they align
GIAC Qualified Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security experts. GIAC's goal is to make sure that a certified professional has the knowledge appropriate to provide support in vital categories of system, data, and program security. GIAC certifications are acknowledged by companies and institutions all over the world including and the United States NSA. Progent's GIAC information security audit consultants can assist your IT organization in the areas of:
Learn more details concerning Progent's GIAC Information Assurance Expertise.
- Auditing Perimeters
- Security Incident Response
- Intrusion Detection
- Web Services Security
- SIEM solutions
Contact a Certified Security Expert
To see how you can get in touch with a Progent security consultant for remote or onsite expertise in Iowa, phone 1-800-993-9400 or go to Remote Network Help.