Company networks inIowanow have quick and affordable online access to Progent's qualified security professionals to assist with critical security problems. The cost is competitive, billing is by the minute, sign-up is quick, and support is world class. Progent also offers assistance for long-term projects that demand the expertise of senior security engineers with high-level industry credentials.
In case yourIowasmall business is situated far from major urban areas includingDes Moines, Cedar Rapids, Davenport, or Sioux City, help from local qualified security consultants could be problematic when there's an emergency. This can cause a drop in income for your business, angry customers, unproductive workers, and distracted executives. By calling Progent's remote support, you have access to a Premier security professional who can offer help when you require it to get your network running and restore your data.
Progent can help you in your initiatives to protect your IT environment with support that ranges from network security assessments to developing a company-wide security plan. Progent provides economical support to assist businesses of all sizes to configure and maintain secure networks based on Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to deliver centralized management and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter.
Progent's security consultants are available online or on site to provide a range of urgent or longer-term network security services such as:
If your company has an emergency need for IT security help, go to Progent's Emergency Online Network Support.
- Perform automated security evaluations
- Recuperate quickly after virus and worm attacks
- Install firewalls from multiple vendors
- Implement secure solutions for remote and mobile access
- Deploy advanced software for defense against spam and directory harvest attacks
- Develop a company-wide security plan with 24x7 monitoring
- Offer comprehensive Help Desk Call Center Support
- Help Develop an effective backup and disaster recovery solution built around Data Protection Manager backup/restore technology
Progent's security experts can deliver advanced support in key areas of network security including analysis, firewalls and VPN, and advanced security consulting.
Progent's expert security engineers can evaluate the strength of your current network protection environment through comprehensive remote automated testing via advanced utilities and tested techniques. Progent's skill in administering this service saves your company money and assures an objective picture of weaknesses. The information your IT organization is provided can make up the foundation of a security strategy that will permit your information system to operate safely and react quickly to future risks.
Automated Network Vulnerability Audits
Progent provides expertise in the application of security testing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically running a set of automatic system auditing scans to uncover potential security vulnerabilities. Progent has broad experience with other security analysis tools such as NMAP, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.
Progent can show you how to build security into your business operations, configure auditing software, define and implement a protected network architecture, and recommend policies to optimize the security of your IT system. Progent's security consultants are able to show you how to set up a firewall, implement secure remote connectivity to email and data, and install virtual private network. Find out additional information on Progent's automated security evaluation.
Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory service packages designed to allow small companies to receive an objective security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from outside your firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from a secure machine inside your company firewall to determine vulnerabilities to inside assaults. Both security inventory packages are set up and run from a secured remote site. The process is overseen by an engineer with high-level security credentials and who generates a report that summarizes and interprets the data collected by the scan and proposes cost-effective improvements where called for.
Network Penetration Testing Support Services
Stealth intrusion testing is an important component of any comprehensive network security strategy. Progentís security experts can run extensive intrusion checks without the awareness of your organization's internal network support staff. Stealth penetration checking uncovers whether current security defense tools such as intrusion incident warnings and event history monitoring are properly configured and consistently monitored. Learn additional information concerning Progent's stealth penetration analysis consulting.
Firewalls and VPN Support
Progent's background in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned important industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower Services configuration and debugging services.
Cisco Network Security and VPN Engineering Services
Cisco's security and remote access technology offer a complete range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business goals. Find out more details concerning Progent's Consulting Services for Cisco Security and VPN Products.
Consulting Services for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size organizations expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and choose appropriate products from multiple suppliers to support your security objectives while staying within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning tools to defend endpoints as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to manage the entire threat progression including filtering, identification, mitigation, remediation, and forensics. Key capabilities include one-click rollback with Windows VSS and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge tools packaged within a single agent managed from a unified console. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP deployment that addresses your company's unique requirements and that allows you demonstrate compliance with legal and industry information security standards. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent's consultants can also help you to install and test a backup and restore solution such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup activities and allows rapid recovery of vital data, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight DPS to be compliant with regulatory standards like HIPAA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security vendors to provide web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper level of inspection for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect data related to your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By updating and organizing your IT documentation, you can save as much as 50% of time thrown away trying to find critical information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any company should have a carefully considered security program that incorporates both pre-attack procedures and response planning. The proactive strategy is a collection of steps intended to minimize security weaknesses. The post-attack strategy helps your network security engineers to evaluate the damage resulting from a security penetration, fix the system, document the event, and get the IT network operational as quickly as possible.
Progent's expert IT security engineers can to help your company to perform a complete risk assessment and create a company-wide security plan to implement security processes and mechanisms to mitigate ongoing attacks and dangers.
CISM Certified Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the basic capabilities and worldwide standards of skill that information security managers are expected to master. CISM gives business management the confidence that those who have qualified for their CISM credential possess the background and knowledge to deliver efficient security administration and support consulting. Progent can provide the expertise of CISM Premier security professionals to assist businesses with:
Learn additional details about Progent's CISM Qualified Information Security Engineering Services.
- IS Security Strategies
- Risk Management
- Network Security Implementation Management
- IS Security Administration
- Response Management
CISSP Certified Security Engineering Services
CISSP certification denotes expertise with a global standard for data security. ANSI has awarded certification accreditation in the area of data security defined by ISO 17024. Progent offers the services of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields including:
Read more details about Progent's CISSP-certified Network Security Support Expertise.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Control Solutions and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecom, Network and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Certified system architecture engineers are experts who have been awarded ISSAP Certification through rigorous examination and significant experience with information security design. The ISSAP certification indicates proven skill in the most in-depth demands of IS security architecture bounded by the broader field of information security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture including.
Find out more information concerning Progent's ISSAP Accredited Secure System Architecture Support Expertise.
- Access Management Mechanisms and Techniques
- Telecommunications and System Infrastructure Protection
- Data Encryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is an important qualification that indicates expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive test administered by the ISACA professional association. Progent's CISA network security audit consultants can assist your company with:
Read more details about Progent's CISA Certified Security Auditing Consulting Support.
- Information Systems Audit Services
- IT Administration
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Support
- Protecting Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain IS controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and execute a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC network risk management specialists can provide a range of risk assessment services including:
Find out more information concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to evaluate significant vulnerabilities
- Inventory legal, industry, and business mandates and company policies associated with your network to determine their potential influence on your strategic objectives
- Point out potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
- Create a risk awareness initiative and provide training to ensure your organization understand IT risk so they can assist with your risk control process
- Match key risk scenarios to your associated operational procedures to help assign risk ownership
- Validate risk tolerance with executive management and major stakeholders to make sure they match
GIAC Accredited Network Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to assure that an accredited professional possesses the skills appropriate to provide support in key areas of network, information, and software security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the U.S. NSA. Progent's GIAC-certified information security audit consultants are available to assist your IT organization in the areas of:
Learn more details about Progent's GIAC Information Assurance Support.
- Assessing Security Systems
- Security Incident Response
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Contact a Security Engineer
To learn how to contact a certified security consultant for online or on-premises assistance in Iowa, phone 1-800-993-9400 or go to Remote Network Support.