Small business computer networks in the state ofIowacan now get quick and affordable remote help from Progent's certified network security engineers to help with complex security problems. The cost is reasonable, billing is by the minute, sign-up is quick, and service is unbeatable. Progent also offers assistance for complex engagements that demand the expertise of senior security consultants with high-level industry certifications.
In case yourIowabusiness is outside of more populated urban neighborhoods such asDes Moines, Cedar Rapids, Davenport, or Sioux City, the availability of local qualified network security professionals may be problematic during a crisis. This can result in a drop in income for your business, upset clients, unproductive workers, and distracted management. By utilizing Progent's remote support, you have access to a Certified security engineer who can provide help when you have to have it to get your network running and salvage your information.
Progent can assist you at any level in your efforts to protect your IT environment with services that ranges from network security audits to creating a comprehensive security plan. Progent provides economical support to assist small and midsize companies to configure and maintain secure IT environments powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security vendors to provide web-based control and comprehensive protection for your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also enable Exchange Server to monitor and protect internal email that stays within your corporate firewall.
Progent's certified professionals are accessible online or on premises to provide a variety of urgent or longer-term computer security services which include:
If your business has an immediate requirement for IT security help, refer to Progent's Urgent Remote Network Support.
Progent's support professionals provide world-class services in vital areas of network security including security evaluation, firewall and VPN expertise, and advanced security planning.
Progent's certified security engineers can assess the effectiveness of your existing computer security environment through exhaustive remote automated testing via advanced utilities and proven techniques. Progent's experience in this testing saves you consulting fees and offers an accurate picture of system vulnerability. The information your business is provided can be used as the foundation of a security strategy that will allow your network to run dependably and react quickly to future threats.
Automated Security Analysis
Progent offers expertise in the application of security analysis utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically performing a set of programmed network auditing checks to uncover potential security gaps. Progent has extensive knowledge of other security analysis tools such as NMAP, AMAP Application Scanner, eEye, plus utilities such as SolarWinds, Netcat, and Nikto. Progent can help you to understand audit reports and respond appropriately.
Progent can help you design security into your company processes, install scanning applications, define and deploy a secure network architecture, and suggest procedures to optimize the safety of your network. Progent's security professionals are able to help you configure a firewall, implement safe remote access to email and business applications, and install VPN. Find out additional information about Progent's automated security assessment.
Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory service packages designed to enable small businesses to get a professional network security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, a security expert administers a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer within your company firewall to determine your exposure to internal assaults. The two security inventory packages are configured and run from a protected external location. The project is directed by an engineer who has earned high-level security credentials and who generates a report that details and interprets the data captured by the scan and proposes practical remediation if appropriate.
Stealth Penetration Analysis Support Services
Stealth penetration testing is a key component of any successful network security strategy. Progentís security experts can perform thorough intrusion tests without the knowledge of your organization's internal network support resources. Stealth penetration checking shows whether current security defense systems such as intrusion detection warnings and event history monitoring are properly configured and consistently monitored. Learn additional information concerning Progent's stealth security penetration testing consulting.
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants with important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access products represent a comprehensive range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Find out more details concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Appliances.
Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security plan and select the right products from multiple vendors to support your security objectives while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-based AV products. ProSight ASM protects local and cloud resources and provides a single platform to address the entire threat progression including blocking, identification, containment, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that allows you demonstrate compliance with legal and industry information security regulations. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent attention. Progent can also help your company to install and test a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of critical files, apps and VMs that have become unavailable or corrupted due to hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPAA, FIRPA, and PCI and, when necessary, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security companies to deliver web-based management and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of analysis for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, DLP, and email encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Because the system is virtualized, it can be ported easily to a different hardware solution without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect data related to your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Security Design
Any company should develop a thoroughly thought out security program that incorporates both proactive processes and response planning. The pre-attack strategy is a set of mechanisms designed to minimize vulnerabilities. The reactive plan helps your company's security engineers to assess the damage resulting from an attack, fix the damage, document the experience, and get business functions restored as soon as possible.
Progent's certified IT security engineers are available to assist your company to run a comprehensive vulnerability assessment and create a company-wide security plan to establish security processes and controls to minimize ongoing attacks and dangers.
CISM Qualified Information Security Engineering Services
The CISM organization describes the core competencies and worldwide standards of skill that IT security professionals are expected to master. CISM provides business management the assurance that consultants who have qualified for their CISM credential possess the experience and capability to provide efficient security administration and consulting consulting. Progent can provide the support of CISM Premier security professionals to assist companies with:
Find out additional information concerning Progent's CISM Qualified Security Engineering Professionals.
- Network Security Strategies
- Vulnerability Management
- Information Security Implementation Management
- IS Security Management
- Response Management
CISSP Accredited Security Consulting Expertise
CISSP denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted certification recognition in the area of information security under ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas such as:
Find out more information about Progent's CISSP Security Support Expertise.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure System Architecture Consulting Support
Progent's CISSP-ISSAP Certified system architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous examination and extensive work with information security architecture. The ISSAP certification indicates demonstrated skill in the more challenging demands of information system security architecture within the wider field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all aspects of secure network architecture such as.
Find out more information about Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.
- Access Management Systems and Methodologies
- Telecom and Network Infrastructure Protection
- Encryption/Decryption Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified IS Security Auditing Consulting Expertise
The CISA credential is a prestigious achievement that represents expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified security audit consultants are available to assist your business with:
Learn additional details concerning Progent's CISA Certified IS Security Auditing Consulting Expertise.
- IS Audit Services
- IT Administration
- Systems and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Information Resources
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's ability to plan, deploy, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation experts can provide a range of risk assessment services such as:
Get additional information about Progent's CRISC Risk Management Consultants.
- Collect data and study documentation to evaluate major risk scenarios
- Inventory statutory, regulatory, and business mandates and organizational policies associated with your information system to determine their possible influence on your strategic objectives
- Identify potential vulnerabilities for your business workflows to help in analyzing your corporate risk
- Develop a risk awareness program and conduct training to make sure your stakeholders understand information system risk so they can assist with your risk control process
- Connect key risk scenarios to related business processes to help determine risk responsibility
- Validate risk tolerance with your senior management and key stakeholders to make sure they are in agreement
GIAC Certified IS Security Engineering Expertise
GIAC was established in 1999 to certify the knowledge of network security professionals. GIAC's goal is to assure that a certified professional possesses the knowledge appropriate to provide services in vital categories of system, information, and software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC-certified network security audit consultants can assist your business with:
Learn more information concerning Progent's GIAC Information Assurance Expertise.
- Assessing IT Infrastructure
- Incident Response
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Talk to a Certified Security Specialist
To learn how you can contact a certified Progent security engineer for online or on-premises help in Iowa, phone 1-800-993-9400 or visit Remote Computer Support.