Business IT networks inKansascan depend on prompt and affordable remote technical support from Progent's qualified network security professionals to assist with the toughest security problems. Rates are affordable, billing is by the minute, engagement is immediate, and service is unbeatable. Progent also offers help for long-term projects that requires the expertise of seasoned security consultants with high-level security certifications.
If yourKansasorganization is based away from larger metropolitan areas such asWichita, Overland Park, Kansas City, or Topeka, access to nearby qualified network security experts may be problematic during a crisis. This can cause lost income for your company, upset customers, unproductive employees, and defocused executives. By utilizing Progent's online services, you have access to a Certified security engineer ready to offer help whenever you need it to keep your information system operating and restore your data.
Progent can assist you in a variety of ways in your initiatives to protect your network with support services ranging from security audits to creating a comprehensive security plan. Progent provides economical service to help companies of any size to design and manage protected networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a first line of defense and blocks most threats from reaching your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper level of analysis for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also enable Exchange Server to monitor and protect internal email that stays inside your security perimeter.
Progent's security engineers are available online or on premises to provide a range of emergency or project-based IT security services including:
If your network has an urgent need for computer security support, refer to Progent's Emergency Remote Network Support.
- Run thorough security audits
- Recuperate rapidly after serious security breaches
- Configure and troubleshoot firewalls
- Configure secure methods for remote and mobile connectivity
- Deploy advanced utilities for automatic protection against spam and directory harvest attacks
- Develop a company-wide security plan with round-the-clock security monitoring
- Provide outsourced Call Center Services
- Develop an effective network backup and recovery solution built around Microsoft DPM backup/restore capability
Progent's engineers can deliver world-class support in key facets of computer security that include security assessment, firewall and VPN solutions, and advanced security consulting.
Progent's expert security consultants can assess the effectiveness of your current computer security systems by performing exhaustive remote automated analysis via advanced utilities and tested procedures. Progent's experience in administering this testing saves your company money and assures an objective picture of weaknesses. The knowledge your business is provided can form the basis of a network protection plan that will permit your network to operate dependably and react rapidly to new risks.
Automated Vulnerability Evaluation
Progent offers consulting in the application of security analysis software such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing checks to uncover possible security weaknesses. Progent has broad knowledge of other network auditing tools including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can show you how to design protection into your business operations, configure auditing applications, plan and deploy a protected system environment, and recommend procedures to optimize the security of your network. Progent's security engineers are ready to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Learn additional information about Progent's automated security evaluation.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory scanning packages designed to allow small companies to get an objective security evaluation from an accredited security specialist. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive examination of your network from beyond your firewalled perimeter to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a system scan from a secure computer inside your company firewall to assess your exposure to inside attacks. The two security inventory packages are set up and executed from a secured external location. The project is overseen by an engineer who has earned high-level security accreditations and who produces a report that details and interprets the information collected by the security scan and suggests practical remediation where appropriate.
Stealth Security Penetration Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive IT system security plan. Progentís security professionals can perform extensive penetration checks without the awareness of your company's in-house IT staff. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion incident warnings and event history monitoring are correctly set up and actively checked. Learn additional information about Progent's stealth penetration testing support services.
Firewall and Virtual Private Network Solutions
Progent's background in security technology includes extensive field work with major firewalls and VPN technology from multiple companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to manage your existing PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite access technology provide a full range of manageable security products to help protect your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Find out more information about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a comprehensive security strategy and choose appropriate products from a variety of vendors to achieve your security objectives while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior-based analysis tools to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by legacy signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to address the complete threat progression including protection, infiltration detection, containment, cleanup, and forensics. Top features include one-click rollback with Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, device control, and web filtering via cutting-edge tools incorporated within a single agent managed from a unified console. Progent's data protection and virtualization experts can assist you to plan and implement a ProSight ESP deployment that addresses your organization's unique requirements and that helps you prove compliance with legal and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent's consultants can also help your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly price, ProSight DPS automates your backup processes and enables fast restoration of critical data, apps and virtual machines that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced support to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPAA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top data security companies to deliver centralized control and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect information about your network infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Any company should develop a thoroughly thought out security program that incorporates both pre-attack procedures and reaction plans. The proactive plan is a collection of procedures that help to minimize security weaknesses. The reactive strategy assists your company's network security personnel to assess the damage caused by an attack, repair the network, document the event, and get business functions running as quickly as feasible.
Progent's certified IS security engineers can to help your business to perform a comprehensive vulnerability evaluation and define a computer security plan to establish security processes and controls to reduce future attacks and dangers.
CISM Qualified Information Security Support Expertise
The CISM organization defines the core competencies and worldwide standards of performance that IT security managers are required to learn. CISM provides business management the assurance that those who have qualified for their CISM certification possess the background and knowledge to provide efficient security administration and consulting services. Progent offers the services of CISM Premier security consultants to help businesses with:
Find out additional information concerning Progent's CISM Accredited Security Support Professionals.
- Information Security Processes
- Vulnerability Management
- Network Security Implementation Management
- IS Security Management
- Recovery Management
CISSP Certified Security Engineering Services
CISSP certification recognizes expertise with an international standard for network security. The American National Standards Institute has awarded the CISSP credential recognition in the area of information security defined by ISO 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security fields such as:
Find out additional information concerning Progent's CISSP-certified Network Security Support Services.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Management Systems and Processes
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Technology
- Telecom, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous examination and significant experience with network security design. The ISSAP credential indicates demonstrated skill in the most in-depth demands of information system security architecture bounded by the broader field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security including.
Learn more details about Progent's ISSAP Certified Secure Information System Architecture Engineering Expertise.
- Access Control Systems and Methodologies
- Telecom and Network Protection
- Encryption/Decryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified Security Auditing Consulting Services
The CISA accreditation is a recognized achievement that indicates mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive test administered by the ISACA international professional association. Progent's CISA network security audit consultants are available to assist your company with:
Get the details concerning Progent's CISA Certified IS Security Auditing Consulting Support.
- Information Systems Audit Services
- IT Administration
- Systems and Infrastructure Planned Useful Life
- Information Technology Support
- Safeguarding Information Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, implement, and support IS controls to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity strategy based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation consultants can provide a variety of risk evaluation services such as:
Learn additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and study documentation to identify major vulnerabilities
- Identify legal, regulatory, and business requirements and company standards related to your network to assess their potential influence on your business goals
- Identify potential vulnerabilities for your operational processes to assist in analyzing your enterprise risk
- Create a risk awareness initiative and provide seminars to ensure your organization understand IT risk so they can contribute to your risk management process
- Connect key risk vectors to related business processes to help assign risk ownership
- Validate risk appetite with executive leadership and major stakeholders to ensure they align
GIAC Certified Information System Security Consulting Support
Read additional information about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security experts. GIAC's mission is to make sure that a certified security consultant has the skills appropriate to deliver support in critical categories of network, data, and software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC information security audit engineers can assist your IT organization with:
Talk to a Certified Progent Security Expert
To see how you can contact a certified security consultant for remote or on-premises assistance in Kansas, call 1-800-993-9400 or go to Remote Network Support.