Business information networks in Iowa can now get quick and affordable remote technical support from Progent's certified security support specialists to help with critical security problems. Rates are reasonable, charges are per minute, engagement is quick, and service is world class. Progent also offers assistance for long-term engagements that demand the knowledge of seasoned security consultants with top security credentials.
In case your Iowa network is located away from major metropolitan areas like Des Moines, Cedar Rapids, Davenport, or Sioux City, help from nearby accredited network security professionals may be problematic during an urgent situation. This could mean lost productivity for your company, angry customers, idle employees, and distracted executives. By utilizing Progent's remote support, you can get in touch with a Certified security consultant who can offer help whenever you have to have it to get your computer network operating and recover your data.
Progent can assist you in all your initiatives to defend your network with support services that ranges from network security checks to developing a company-wide security plan. Progent provides affordable support to assist businesses of all sizes to set up and maintain protected networks based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security companies to provide web-based control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email that stays inside your security perimeter.
Progent's security consultants are accessible online or in person to provide a variety of urgent or project-based computer security services which include:
If your business has an emergency requirement for IT security support, go to Progent's Urgent Online Network Help.
- Perform comprehensive network security evaluations
- Clean up promptly after virus and worm attacks
- Configure and troubleshoot firewalls
- Implement safe techniques for remote and mobile connectivity
- Install effective solutions for automatic defense against viruses, spam and directory harvest attacks
- Help create a company-wide security plan with 24x7 security monitoring
- Offer comprehensive Help Desk Support
- Help Create a practical backup and restore solution centered on Data Protection Manager (DPM) backup technology
Progent's security experts can deliver advanced services in vital facets of network protection including auditing, firewalls and VPN, and advanced security planning.
System Security Audits
Progent's expert security engineers can assess the strength of your existing computer protection implementation by performing exhaustive remote automated analysis based on sophisticated software tools and proven procedures. Progent's skill in this testing saves your company money and assures an accurate picture of weaknesses. The knowledge your company gains can form the foundation of a security plan that can permit your information system to operate safely and respond quickly to new risks.
Automated Network Vulnerability Analysis
Progent provides consulting in the use of security analysis utilities including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a variety of programmed network testing checks to identify potential security gaps. Progent has broad experience with additional security auditing utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and respond appropriately.
Progent can help you design protection into your company processes, install auditing applications, plan and implement a protected network environment, and suggest policies to optimize the security of your IT system. Progent's security consultants are able to help you configure a firewall, design secure remote access to email and business applications, and integrate VPN. Learn more concerning Progent's automated security evaluation.
Security Inventory Scanning Packages for Small Companies
Progent has put together two low-cost security inventory scanning bundles designed to allow small companies to get a professional security assessment from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security expert runs an extensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from a secure computer within your company firewall to determine the risk to internal assaults. The two security inventory packages are configured and run from a secured external site. The process is directed by an engineer with top security credentials and who generates a report that summarizes and analyzes the data captured by the scan and proposes cost-effective improvements if called for.
Stealth Intrusion Testing Support Services
Stealth intrusion testing is a key part of any successful network security strategy. Progentís security professionals can run extensive intrusion checks without the awareness of your company's internal network support staff. Unannounced penetration testing shows whether existing security monitoring systems such as intrusion detection alerts and event history monitoring are properly set up and consistently monitored. Find out additional information about Progent's network security penetration testing consulting.
Progent's background in security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your existing PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.
Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and remote connection technology provide a full line of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and CCNP qualifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Find out additional details about Progent's Support Services for Cisco Security Technology and VPN Products.
Engineering Services for Other Firewall and VPN Products
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWall. Progent can show you how to design a comprehensive security plan and select appropriate technologies from a variety of suppliers to achieve your security goals while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior analysis technology to guard endpoint devices and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the entire threat lifecycle including blocking, infiltration detection, containment, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP deployment that addresses your organization's specific requirements and that helps you demonstrate compliance with government and industry information protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and enables fast recovery of vital files, apps and virtual machines that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top information security companies to provide centralized control and comprehensive security for all your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of inspection for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs or domains. By updating and organizing your network documentation, you can save up to 50% of time spent trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Design
Every company should have a thoroughly thought out security strategy that incorporates both proactive procedures and reaction plans. The proactive strategy is a set of procedures designed to reduce security weaknesses. The reactive strategy assists your company's IT security personnel to evaluate the damage resulting from a security penetration, fix the system, record the experience, and get the IT network running as quickly as possible.
Progent's certified IS security engineers can to assist you to perform a full risk evaluation and define a network security plan to establish security processes and mechanisms to mitigate ongoing attacks and dangers.
CISM Qualified System Security Engineering Services
The CISM committee defines the core competencies and global standards of performance that IT security professionals are required to learn. CISM provides business management the assurance that those who have qualified for their CISM credential possess the experience and knowledge to provide effective security management and consulting consulting. Progent can provide the services of CISM Certified security consultants to help businesses with:
Learn more information concerning Progent's CISM Certified IS Security Consulting Services.
- IS Security Governance
- Risk Management
- Information Security Implementation Management
- IS Security Management
- Response Management
CISSP Certified Security Engineering Support
CISSP recognizes expertise with a global standard for network security. ANSI has granted the CISSP credential accreditation in the area of data protection defined by ISO 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:
Find out more details concerning Progent's CISSP Network Security Support Services.
- Security Administration Practices
- Security Infrastructure and Models
- Access Management Systems and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have been awarded ISSAP Certification through rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more in-depth demands of information system security architecture within the broader field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.
Learn additional details about Progent's ISSAP Accredited Secure IT Architecture Support Expertise.
- Access Control Systems and Techniques
- Telecommunications and Network Infrastructure Security
- Encryption/Decryption Solutions
- Requirements Analysis and Security Standards
- BCP and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a prestigious achievement that signifies expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass an extensive test given by the ISACA international professional group. Progent's CISA-qualified security audit experts can assist your IT organization in the areas of:
Find out more information concerning Progent's CISA Accredited Information System Security Auditing Engineering Services.
- IS Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle Planning
- Information Technology Support
- Safeguarding Information Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and execute a business continuity plan based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation engineers offer a variety of risk assessment services such as:
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to evaluate major vulnerabilities
- Identify statutory, industry, and contractual mandates and company policies related to your information system to assess their potential impact on your strategic objectives
- Identify potential vulnerabilities for your operational workflows to help in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to ensure your organization appreciate information system risk so they can assist with your risk control process
- Match identified risk vectors to your associated operational procedures to help assign risk responsibility
- Determine risk tolerance with executive management and major stakeholders to ensure they are in agreement
GIAC Accredited Network Security Engineering Expertise
Global Information Assurance Certification was founded in 1999 to certify the skill of computer security engineers. GIAC's goal is to verify that an accredited security consultant has the skills needed to provide services in vital areas of network, data, and application software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States National Security Agency. Progent's GIAC-certified security audit engineers are available to help your business with:
Learn more details about Progent's GIAC Information Assurance Services.
- Assessing IT Infrastructure
- Incident Handling
- Intrusion Detection
- Web Services Security
- SIEM solutions
Get in Touch with a Progent Security Expert
To see how you can access a security engineer for remote or onsite support in Iowa, phone 1-800-993-9400 or visit Online Network Support.