Small business IT networks in Iowa can have fast and affordable online technical support from Progent's accredited security engineers to help with urgent security problems. The cost is reasonable, charges are per minute, engagement is fast, and service is world class. Progent also offers help for long-term engagements that demand the knowledge of seasoned security engineers with top security certifications.

If your Iowa office is based far from more populated urban areas including Des Moines, Cedar Rapids, Davenport, or Sioux City, access to local accredited network security engineers may be limited when you have an urgent situation. This can result in a drop in revenue for your business, upset clients, unproductive employees, and defocused executives. By calling Progent, you have access to a Certified security consultant ready to offer assistance when you need it to get your system operating and recover your information.

Progent can assist you in a variety of ways in your initiatives to defend your network with support services that ranges from security checks to developing a company-wide security strategy. Progent offers economical service to help businesses of all sizes to configure and manage secure networks powered by Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the technology of leading data security companies to deliver centralized control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a deeper layer of inspection for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's security professionals are available online or on premises to provide a variety of urgent or longer-term computer security services such as:

  • Run comprehensive security audits
  • Clean up rapidly after serious security breaches
  • Configure hardware and software firewalls
  • Configure safe methods for offsite and mobile connectivity
  • Deploy advanced applications for defense against spam and DHAs
  • Develop a comprehensive security strategy with round-the-clock monitoring
  • Provide outsourced Help Desk Services
  • Create an effective data backup and restore solution built around Microsoft DPM backup/restore technology
If your business has an urgent need for computer security help, go to Progent's Urgent Online Technical Support.

Progent's engineers provide world-class services in key fields of system security that include security assessment, firewalls and VPN, and high-level security planning.

System Security Assessment
Progent's certified security consultants can assess the strength of your existing network protection implementation by performing comprehensive remote automated testing based on sophisticated software tools and tested techniques. Progent's experience in administering this testing saves your company time and money and assures an objective picture of gaps. The knowledge your IT organization is provided can form the foundation of a network protection plan that will allow your information system to operate safely and respond quickly to future risks.

Automated Security Analysis
Progent offers expertise in the use of security analysis products including Microsoft's MBSA and LANguard from GFI for economically running a variety of automatic network testing scans to uncover possible security weaknesses. Progent has extensive knowledge of additional network auditing tools such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can show you how to build security into your company operations, install auditing applications, plan and implement a secure network architecture, and suggest procedures to optimize the safety of your IT system. Progent's security professionals are ready to help you set up a firewall, implement secure remote connectivity to email and business applications, and integrate virtual private network. Find out additional information concerning Progent's automated security audits.

Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory bundles intended to allow small businesses to get an impartial network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs an extensive examination of your network from beyond your firewall to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from a secure machine inside your firewall to assess the risk to internal threats. The two security inventory services are configured and executed from a secured external location. The project is directed by a consultant who has earned top security credentials and who produces a document that details and analyzes the information collected by the scan and suggests practical remediation if appropriate.

Network Intrusion Testing Consulting
Stealth intrusion testing is a key component of any comprehensive IT system security strategy. Progentís security professionals can perform extensive penetration tests without the knowledge of your organization's internal network support staff. Unannounced penetration testing shows whether current security defense systems such as intrusion detection warnings and event log analysis are properly set up and actively monitored. Find out more on Progent's network penetration analysis consulting.

Firewalls and VPN Expertise
Progent's background in network security technology includes in-depth field work with major firewalls and Virtual Private Network products from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned key networking certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Network Security and VPN Support Expertise
Cisco's security and offsite connection technology represent a full range of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Read more information concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Consulting Services for Additional Firewall and VPN Technology
Progent offers small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right technologies from multiple suppliers to achieve your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis technology to defend endpoints as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to manage the complete threat lifecycle including blocking, identification, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device management, and web filtering via cutting-edge technologies packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can help your business to plan and configure a ProSight ESP deployment that addresses your company's unique requirements and that allows you prove compliance with legal and industry information security standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent action. Progent's consultants can also help your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized organizations an affordable and fully managed service for reliable backup/disaster recovery. For a low monthly rate, ProSight DPS automates and monitors your backup activities and enables rapid restoration of vital files, apps and virtual machines that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can help you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top data security vendors to deliver web-based management and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more information, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can save as much as 50% of time spent looking for critical information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre making enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Network Security Planning
Every company ought to develop a thoroughly considered security strategy that incorporates both pre-attack procedures and reaction plans. The pre-attack strategy is a collection of steps that help to reduce vulnerabilities. The reactive strategy helps your company's network security personnel to evaluate the impact resulting from an attack, repair the network, record the experience, and get the IT network running as quickly as feasible.

Progent's expert IT security consultants can to help you to perform a complete vulnerability assessment and define a computer security plan to establish security policies and controls to mitigate ongoing attacks and threats.

CISM Qualified System Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of performance that IT security professionals are expected to learn. It provides business management the assurance that consultants who have qualified for their CISM certification possess the experience and capability to deliver efficient security management and support consulting. Progent offers the services of CISM Premier security professionals to help businesses with:

  • Information Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • Information Security Administration
  • Response Planning
Find out additional information about Progent's CISM Accredited Network Security Engineering Expertise.

CISSP Qualified Security Engineering Support
CISSP denotes mastery of an international standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information protection stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISSP Accredited Information Security Consulting Services.

CISSP-ISSAP Certified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have been awarded ISSAP status through rigorous examination and extensive work with information security design. The ISSAP certification indicates demonstrated mastery in the most complex requirements of information security architecture within the broader scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Read more details about Progent's ISSAP Accredited Secure Information System Architecture Consulting Professionals.

CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is an important achievement that represents expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA international professional group. Progent's CISA-certified network security audit specialists can assist your company in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISA Accredited Information System Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to design, deploy, and support IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC network risk management experts offer a range of risk identification services such as:

  • Gather information and study documentation to evaluate major vulnerabilities
  • Inventory legal, industry, and contractual mandates and organizational policies related to your information system to determine their potential influence on your strategic objectives
  • Point out possible vulnerabilities for your business workflows to assist in evaluating your enterprise risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders understand IS risk so they can assist with your risk control process
  • Connect key risk vectors to your associated business processes to help determine risk responsibility
  • Determine risk appetite with executive management and major stakeholders to make sure they match
Find out additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Support
GIAC was established in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to make sure that a certified security consultant possesses the knowledge appropriate to provide services in vital categories of system, information, and application software security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the United States National Security Agency. Progent's GIAC security audit experts can help your IT organization with:

  • Assessing Networks
  • Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Engineer
To learn how you can access a certified security engineer for remote or onsite assistance in Iowa, call 1-800-993-9400 or go to Remote Computer Support.