Business computer networks in the state of Iowa can have prompt and affordable remote help from Progent's qualified network security engineers to resolve complex security issues. Rates are reasonable, billing is per minute, engagement is quick, and support is world class. Progent also offers help for long-term projects that demand the expertise of senior security engineers with top security certifications.
If your Iowa company is based far from major urban areas like Des Moines, Cedar Rapids, Davenport, or Sioux City, support from local certified security consultants is often problematic when there's an emergency. This can cause a loss of productivity for your company, angry customers, unproductive employees, and distracted executives. By calling Progent's remote support, you have access to a Certified security professional ready to offer help whenever you require it to keep your network running and recover your data.
Progent can help you in all your efforts to defend your network with support ranging from network security assessments to developing a comprehensive security plan. Progent provides affordable service to help businesses of all sizes to set up and maintain secure networks based on Microsoft Windows and Cisco products and that can include computers running UNIX or Linux platforms as well as mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security vendors to provide web-based control and world-class security for your email traffic. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.
Progent's security consultants are available online or in person to offer a variety of urgent or longer-term computer security services which include:
If your business has an urgent requirement for IT security help, refer to Progent's Urgent Online Technical Support.
- Perform automated network security evaluations
- Recover rapidly after virus and worm attacks
- Configure and troubleshoot firewalls
- Configure secure solutions for remote and mobile access
- Install advanced applications for defense against spam and directory harvest attacks
- Help create a company-wide security plan with 24x7 monitoring
- Offer comprehensive Call Center Support
- Create a practical network backup and recovery solution built around Data Protection Manager automated backup technology
Progent's engineers can deliver advanced services in key areas of system security that include security assessment, firewall/VPN support, and advanced security consulting.
System Security Evaluation
Progent's certified security engineers can assess the vulnerability of your existing network protection systems by performing exhaustive remote automated testing based on advanced utilities and proven techniques. Progent's skill in this service saves your company money and assures an accurate picture of system vulnerability. The information your business is provided can form the basis of a security plan that will allow your information system to run safely and respond quickly to future risks.
Automated Network Security Evaluation
Progent provides expertise in the application of security auditing products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a set of automatic network auditing checks to identify possible security gaps. Progent has extensive experience with other security analysis tools including NMAP, AMAP, eEye, as well as tools like Metasploit, Netcat, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can help you design security into your business operations, install scanning tools, define and deploy a secure system environment, and suggest policies to optimize the security of your network. Progent's security professionals are able to help you set up a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Learn more about Progent's network security analysis.
Security Inventory Bundles for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles designed to enable small companies to receive an independent network security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from outside your firewalled perimeter to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your company firewall to evaluate vulnerabilities to inside threats. The two security inventory services are set up and executed from a protected remote location. The process is overseen by an engineer who has earned top security credentials and who generates a document that details and interprets the information captured by the scan and proposes cost-effective improvements where called for.
Stealth Intrusion Analysis Support Services
Stealth penetration checking is an important part of any successful IT system security plan. Progentís security professionals can run extensive intrusion checks without the awareness of your organization's in-house network support staff. Stealth penetration testing shows whether existing security monitoring systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently monitored. Learn additional information concerning Progent's network penetration testing consulting.
Progent's expertise in network security technology includes extensive familiarity with leading firewalls and Virtual Private Network products offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned key networking accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, optimize, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access products provide a comprehensive range of manageable security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Read more information about Progent's Support Expertise for Cisco Security Solutions and VPN Products.
Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right products from multiple suppliers to achieve your security goals while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior analysis tools to guard endpoint devices and servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to manage the entire threat progression including filtering, identification, mitigation, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device management, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single control. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data security standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent action. Progent can also assist you to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid restoration of critical files, apps and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading information security vendors to provide web-based management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be moved easily to a different hosting solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every company ought to develop a thoroughly thought out security strategy that includes both proactive procedures and response plans. The pre-attack strategy is a collection of mechanisms that help to minimize security weaknesses. The reactive strategy assists your IT security personnel to evaluate the damage resulting from a security penetration, fix the damage, document the experience, and get the IT network restored as soon as possible.
Progent's expert IT security engineers are available to assist you to perform a complete vulnerability assessment and define a company-wide security strategy to implement security policies and controls to mitigate future assaults and threats.
CISM Certified Security Support Assistance
The CISM organization defines the core competencies and worldwide standards of skill that IT security managers are required to master. CISM gives business management the confidence that consultants who have qualified for their CISM credential have the experience and capability to provide efficient security management and consulting consulting. Progent offers the support of CISM Certified security professionals to help businesses with:
Learn more details about Progent's CISM Certified IS Security Consulting Services.
- IS Security Strategies
- Vulnerability Analysis
- Network Security Implementation Management
- IS Security Management
- Response Planning
CISSP Accredited Security Consulting Support
CISSP recognizes expertise with a global standard for network security. ANSI has awarded certification recognition in the area of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields such as:
Learn more details about Progent's CISSP-certified Security Consulting Expertise.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, LAN and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the more complex demands of information security architecture within the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-premier security specialists can help your business with all phases of architecture security including.
Read additional information about Progent's ISSAP Qualified Secure System Architecture Engineering Expertise.
- Access Management Systems and Methodologies
- Phone System and System Infrastructure Security
- Data Encryption Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Network Security Auditing Consulting Support
The CISA accreditation is a globally recognized achievement that signifies mastery in information system security auditing. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive test given by the ISACA international professional group. Progent's CISA-certified security audit specialists are available to assist your company in the areas of:
Learn more details concerning Progent's CISA Accredited Security Auditing Consulting Expertise.
- Information Systems Audit Services
- IT Administration
- Systems and Infrastructure Lifecycle
- IT Support
- Safeguarding Information Resources
- Disaster Recovery Preparedness
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, implement, and support information system controls to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation experts can provide a range of risk evaluation services such as:
Learn more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and review documentation to help identify significant vulnerabilities
- Inventory statutory, regulatory, and business requirements and organizational policies related to your network to assess their possible impact on your strategic goals
- Point out potential vulnerabilities for your business processes to help in evaluating your corporate risk
- Create a risk awareness program and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk control process
- Match key risk vectors to your associated business processes to help assign risk ownership
- Validate risk appetite with executive leadership and major stakeholders to ensure they align
GIAC Certified Security Engineering Services
Read additional details concerning Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's mission is to verify that a certified professional possesses the skills appropriate to deliver services in critical areas of network, information, and application program security. GIAC accreditations are recognized by companies and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit consultants can assist your IT organization with:
Contact a Progent Security Engineer
To see how you can get in touch with a security consultant for remote or on-premises help in Iowa, call 1-800-993-9400 or go to Online Network Help.