Small business computer networks inIowacan depend on prompt and affordable remote help from Progent's qualified security engineers to resolve complex security problems. Rates are competitive, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also offers assistance for long-term projects that demand the services of seasoned security consultants with top security certifications.
If yourIowasmall business is located far from larger urban neighborhoods such asDes Moines, Cedar Rapids, Davenport, or Sioux City, contact with nearby accredited security support specialists could be limited when there's a crisis. This could mean lost revenue for your company, upset customers, unproductive employees, and defocused management. By utilizing Progent's remote support, you have access to a Premier security professional who can deliver assistance whenever you require it to keep your network operating and restore your information.
Progent can help you in all your initiatives to guard your information system with support ranging from network security checks to creating a company-wide security plan. Progent provides affordable support to assist small and midsize companies to configure and maintain protected networks powered by Windows and Cisco products and that may include computers based on UNIX or Linux operating systems as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide centralized control and comprehensive security for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a further layer of inspection for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.
Progent's certified experts are accessible remotely or on premises to provide a range of urgent or project-based computer security services which include:
If your network has an immediate requirement for computer security help, go to Progent's Urgent Online Network Help.
Progent's engineers can deliver world-class support in vital facets of network security that include security evaluation, firewall/VPN support, and advanced security consulting.
System Security Assessment
Progent's certified security engineers can evaluate the strength of your existing network protection environment by performing comprehensive remote automated analysis via advanced utilities and tested procedures. Progent's skill in this service saves you money and offers an objective picture of system vulnerability. The knowledge your IT organization is provided can be used as the foundation of a security plan that will allow your information system to operate safely and respond quickly to new threats.
Automated Security Audits
Progent provides consulting in the application of security analysis utilities such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a set of programmed network testing checks to uncover possible security gaps. Progent has extensive experience with other network auditing utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Hydra, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can show you how to design protection into your business operations, install scanning applications, define and deploy a secure system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are ready to help you configure a firewall, implement secure remote access to email and business applications, and install virtual private network. Find out more about Progent's automated security audits.
Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation packages intended to allow small businesses to receive an independent network security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive examination of your IT infrastructure from beyond your firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from a secure computer inside your firewall to assess your exposure to internal assaults. Both security inventory packages are set up and run from a secured remote site. The project is managed by an engineer with top security credentials and who produces a document that summarizes and analyzes the information captured by the scan and suggests practical remediation where appropriate.
Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important component of any serious network security strategy. Progentís security professionals can run thorough penetration tests without the awareness of your company's internal IT resources. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident alerts and event history analysis are correctly set up and consistently monitored. Find out more concerning Progent's stealth security penetration analysis support services.
Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security technology includes in-depth field work with leading firewalls and Virtual Private Network products offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Engineering Services
Cisco's network security and offsite access technology provide a complete line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Read more details about Progent's Consulting Services for Cisco Security Solutions and VPN Products.
Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security companies including WatchGuard, Juniper Networks, and SonicWall. Progent can help you design a comprehensive security plan and select appropriate products from multiple suppliers to achieve your security goals while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based analysis technology to guard endpoint devices and physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely escape legacy signature-based AV products. ProSight ASM safeguards local and cloud-based resources and offers a single platform to manage the entire malware attack lifecycle including protection, detection, mitigation, remediation, and forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge tools packaged within a single agent managed from a single control. Progent's data protection and virtualization experts can assist your business to design and implement a ProSight ESP environment that addresses your organization's specific needs and that helps you demonstrate compliance with government and industry information protection standards. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent action. Progent's consultants can also assist your company to install and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows rapid recovery of vital files, applications and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced support to configure ProSight DPS to to comply with regulatory requirements such as HIPAA, FINRA, and PCI and, when needed, can help you to restore your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security vendors to provide web-based control and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported immediately to a different hosting environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and safeguard data about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time spent trying to find critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Expert Security Planning
Every business should develop a thoroughly thought out security strategy that includes both proactive procedures and response planning. The proactive plan is a set of procedures that help to minimize security weaknesses. The post-attack strategy assists your company's security personnel to assess the damage resulting from a security penetration, repair the network, document the experience, and get the IT network running as soon as feasible.
Progent's certified information security engineers are available to assist your company to run a comprehensive vulnerability evaluation and define a network security plan to establish security processes and controls to minimize ongoing assaults and threats.
CISM Accredited Security Support Services
The Certified Information Security Manager (CISM) committee defines the core capabilities and global standards of skill that IT security managers are expected to learn. It provides business management the confidence that those who have qualified for their CISM certification possess the experience and knowledge to deliver efficient security administration and consulting services. Progent offers the expertise of CISM Premier security professionals to assist companies with:
Read more details concerning Progent's CISM Network Security Engineering Expertise.
- Information Security Processes
- Risk Management
- IS Security Program Management
- Information Security Management
- Recovery Planning
CISSP Qualified Security Engineering Support
CISSP recognizes expertise with a global standard for data security. The American National Standards Institute has awarded certification accreditation in the area of data security stipulated by ISO 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:
Find out additional details concerning Progent's CISSP Accredited Information Security Support Services.
- Security Administration Practices
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Premier IT architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most in-depth requirements of IS security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can help your business with all aspects of secure network architecture such as.
Find out additional details concerning Progent's ISSAP Accredited Secure Network Architecture Support Expertise.
- Access Control Mechanisms and Methodologies
- Telecom and System Infrastructure Security
- Cryptography Options
- Needs Evaluation and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified Information System Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive test given by the ISACA international professional group. Progent's CISA-certified information security audit consultants are available to help your business with:
Find out more information concerning Progent's CISA Certified Security Auditing Engineering Services.
- Information Systems Audit Services
- Information Technology Administration
- Network Assets and Architecture Lifecycle
- IT Support
- Protecting Data Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate an IT professional's ability to design, implement, and maintain IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation engineers can provide a variety of risk evaluation services such as:
Find out more details concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to evaluate significant risk scenarios
- Inventory statutory, industry, and business requirements and company policies associated with your information system to assess their potential impact on your strategic objectives
- Identify possible threats for your business processes to assist in evaluating your enterprise risk
- Create a risk awareness initiative and provide training to make sure your organization appreciate information system risk so they can contribute to your risk management program
- Match identified risk scenarios to your associated business procedures to help determine risk responsibility
- Validate risk appetite with your senior leadership and key stakeholders to make sure they match
GIAC Accredited IS Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to ensure that an accredited security consultant possesses the knowledge necessary to provide services in important categories of network, information, and application security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified security audit consultants can help your company in the areas of:
Learn more information concerning Progent's GIAC Information Assurance Expertise.
- Auditing Perimeters
- Security Incident Handling
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Get in Touch with a Progent Security Engineer
To find out how to get in touch with a security consultant for online or on-premises assistance in Iowa, call 1-800-993-9400 or go to Remote Computer Support.