Company computer networks in Iowa can depend on prompt and economical remote help from Progent's qualified security professionals to assist with complex security issues. The cost is competitive, charges are by the minute, engagement is quick, and support is world class. Progent also provides help for complex projects that demand the services of senior security consultants with top industry credentials.
If your Iowa office is located far from more populated urban areas like Des Moines, Cedar Rapids, Davenport, or Sioux City, help from nearby qualified network security consultants is often limited during an emergency. This can result in a loss of revenue for your company, upset clients, idle employees, and defocused executives. By contacting Progent's remote support, you have access to a Premier security engineer ready to provide expertise whenever you require it to get your information system on line and restore your data.
Progent can assist you at any level in your initiatives to guard your information system with services that can range from network security checks to developing a comprehensive security strategy. Progent provides economical service to help businesses of all sizes to design and manage protected networks based on Windows and Cisco products and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to provide centralized control and world-class security for your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a first line of defense and blocks most threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a further layer of inspection for incoming email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.
Progent's certified professionals are accessible remotely or in person to offer a variety of urgent or longer-term network security services such as:
If your network has an urgent need for IT security help, go to Progent's Urgent Remote Technical Support.
Progent's security experts offer advanced support in vital facets of network security including auditing, firewall and VPN expertise, and advanced security consulting.
Progent's expert security consultants can assess the effectiveness of your current computer protection environment through exhaustive remote automated analysis via advanced software tools and tested procedures. Progent's experience in this testing saves your company money and offers an objective picture of security holes. The knowledge your company is provided can form the foundation of a security plan that can allow your information system to run safely and react quickly to new threats.
Automated Vulnerability Audits
Progent offers expertise in the use of security evaluation packages such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically performing a set of programmed network auditing checks to identify potential security gaps. Progent has extensive experience with other network auditing utilities such as NMAP, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react appropriately.
Progent can help you design protection into your business operations, configure auditing applications, plan and implement a secure network architecture, and suggest procedures to optimize the safety of your IT system. Progent's security consultants are able to assist you to configure a firewall, design safe remote access to email and business applications, and integrate VPN. Learn additional information concerning Progent's automated security analysis.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory packages designed to enable small companies to get a professional security evaluation from a certified security expert. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from beyond your firewalled perimeter to determine possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from an authorized machine inside your firewall to assess the risk to inside threats. Both security inventory services are configured and run from a secured external site. The project is overseen by an engineer with top security accreditations and who produces a report that details and analyzes the information captured by the security scan and suggests cost-effective remediation where appropriate.
Network Security Penetration Testing Support Services
Stealth penetration checking is a key component of any successful network security strategy. Progentís security professionals can perform extensive intrusion checks without the awareness of your organization's internal network support staff. Unannounced penetration testing uncovers whether current security defense systems such as intrusion detection warnings and event history analysis are correctly set up and consistently monitored. Learn additional information on Progent's stealth penetration testing consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses extensive field work with leading firewalls and VPN products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to manage your legacy PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and offsite connection products provide a complete line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Find out more information about Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Products.
Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and choose the right technologies from a variety of suppliers to support your security objectives while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to guard endpoints and physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely evade traditional signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to manage the complete malware attack progression including protection, identification, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver ultra-affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools incorporated within one agent accessible from a unified control. Progent's security and virtualization consultants can help you to design and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you prove compliance with government and industry information security standards. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require urgent attention. Progent can also help you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup processes and allows fast restoration of critical data, apps and VMs that have become unavailable or corrupted due to component failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can help you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top information security companies to provide centralized control and world-class protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of inspection for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can save up to half of time spent trying to find vital information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Any business ought to have a thoroughly thought out security program that includes both preventive processes and response plans. The proactive plan is a collection of steps that help to minimize security weaknesses. The post-attack plan helps your company's IT security engineers to assess the impact resulting from an attack, repair the system, record the event, and get business functions running as rapidly as possible.
Progent's certified information security engineers can to help your business to run a complete risk assessment and define a computer security plan to implement security processes and mechanisms to minimize ongoing attacks and dangers.
CISM Accredited Information Security Consulting Expertise
The Certified Information Security Manager (CISM) organization describes the core competencies and international standards of performance that IT security professionals are required to learn. It provides business management the confidence that consultants who have qualified for their CISM certification have the background and capability to provide effective security management and support consulting. Progent can provide the expertise of CISM Certified security consultants to help businesses with:
Find out more information concerning Progent's CISM Certified IS Security Consulting Professionals.
- IS Security Governance
- Vulnerability Management
- Network Security Implementation Management
- Network Security Management
- Recovery Management
CISSP Accredited Security Consulting Support
CISSP denotes expertise with a worldwide standard for data security. The American National Standards Institute has granted certification accreditation in the area of data security defined by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your business in a variety security areas such as:
Read additional information about Progent's CISSP Accredited Cybersecurity Consulting Expertise.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Control Systems and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have earned ISSAP status through rigorous testing and significant experience with information security architecture. The ISSAP credential indicates proven competence in the most in-depth requirements of information system security architecture bounded by the broader scope of IS security expertise required for CISSP certification. Progent's ISSAP-premier security experts can help your business with all aspects of secure network architecture such as.
Find out more details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Infrastructure Protection
- Encryption/Decryption Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified IS Security Auditing Consulting Assistance
The CISA accreditation is a globally recognized qualification that represents expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass a comprehensive test administered by the ISACA international professional group. Progent's CISA information security audit consultants are available to assist your IT organization with:
Learn the details concerning Progent's CISA Accredited Network Security Auditing Engineering Services.
- IS Audit Process
- IT Enforcement
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Protecting Information Assets
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain IS controls to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation consultants offer a variety of risk assessment services including:
Read the details about Progent's CRISC Risk Management Consultants.
- Gather data and study documentation to evaluate major risk scenarios
- Identify legal, regulatory, and contractual requirements and organizational policies related to your information system to determine their possible impact on your strategic goals
- Identify possible threats for your business processes to help in evaluating your corporate risk
- Develop a risk awareness program and conduct training to ensure your organization understand information system risk so they can assist with your risk control program
- Connect identified risk scenarios to your associated operational procedures to help assign risk ownership
- Validate risk tolerance with your senior management and key stakeholders to ensure they are in agreement
GIAC Qualified Security Consulting Expertise
GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's mission is to make sure that a certified security consultant has the knowledge appropriate to provide services in vital categories of system, data, and application security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified IS security audit experts are available to assist your company with:
Read additional details about Progent's GIAC Information Assurance Services.
- Auditing Perimeters
- Incident Handling
- Traffic Analysis
- Web Application Security
- SIEM solutions
Contact a Security Engineer
To find out how to access a security engineer for remote or onsite help in Iowa, call 1-800-993-9400 or go to Remote Computer Help.