Company IT networks in the state of Kentucky now have fast and affordable online access to Progent's qualified network security professionals to help with critical security problems. The cost is competitive, billing is by the minute, engagement is fast, and service is unbeatable. Progent also offers help for complex engagements that demand the services of senior security consultants with high-level industry certifications.

In case your Kentucky small business is situated outside of more populated urban areas including Louisville, Lexington, Owensboro, or Bowling Green, help from local accredited network security engineers may be problematic when there's an emergency. This could mean a drop in revenue for your business, upset customers, idle workers, and defocused executives. By utilizing Progent's remote support, you can get in touch with a Certified security engineer ready to offer assistance whenever you have to have it to keep your information system running and salvage your information.

Progent can help you in all your efforts to guard your network with services ranging from security checks to creating a company-wide security strategy. Progent provides economical support to assist small and midsize companies to set up and manage protected IT environments powered by Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems plus BYOD users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security vendors to provide web-based management and comprehensive security for all your email traffic. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a further layer of analysis for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's security consultants are accessible online or on site to provide a range of urgent or longer-term network security services which include:

If your network has an urgent need for computer security support, refer to Progent's Emergency Remote Network Support.

Progent's security experts offer world-class support in key fields of computer security including auditing, firewalls and VPN, and advanced security consulting.

System Security Audits
Progent's expert security consultants can evaluate the strength of your current network security implementation through comprehensive remote automated analysis via advanced utilities and proven techniques. Progent's experience in administering this service saves you money and offers an objective picture of security holes. The knowledge your business gains can form the foundation of a security strategy that can allow your information system to operate dependably and respond quickly to new risks.

Automated Vulnerability Evaluation
Progent offers expertise in the application of security analysis software such as Microsoft's MBSA and GFI LANguard NSS for economically running a variety of programmed system testing scans to identify possible security weaknesses. Progent has extensive knowledge of other network analysis utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can help you design protection into your company operations, install auditing applications, define and deploy a protected network architecture, and recommend procedures to maximize the security of your IT system. Progent's security engineers are available to assist you to configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Learn more on Progent's network security audits.

Security Inventory Service Bundles for Small Companies
Progent offers two low-cost security inventory scanning packages designed to allow small businesses to get an objective security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive examination of your IT infrastructure from beyond your firewall to determine potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from a secure machine within your firewall to determine your exposure to internal threats. The two security inventory packages are set up and executed from a protected remote location. The project is directed by a consultant with high-level security accreditations and who generates a document that details and interprets the data captured by the scan and proposes cost-effective improvements if appropriate.

Network Penetration Testing Support Services
Stealth intrusion checking is an important part of any serious IT system security plan. Progentís security experts can perform thorough penetration tests without the awareness of your company's in-house IT staff. Stealth penetration checking shows whether existing security defense systems such as intrusion detection alerts and event log monitoring are properly set up and consistently monitored. Find out more concerning Progent's stealth security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network technology offered by multiple companies such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your existing PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and offsite access products offer a comprehensive range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and CCNP certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Learn more details concerning Progent's Engineering Expertise for Cisco Security and Virtual Private Network Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and choose the right technologies from multiple vendors to achieve your security goals while staying within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior machine learning technology to guard endpoints as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a unified platform to automate the complete threat lifecycle including blocking, infiltration detection, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering via leading-edge tools incorporated within one agent accessible from a unified control. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP deployment that meets your company's unique needs and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also help your company to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and enables fast recovery of vital data, apps and virtual machines that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top information security vendors to provide web-based control and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more details about ProSight IT Asset Management service.

Expert Network Security Design
Every business should have a carefully considered security program that incorporates both pre-attack processes and response planning. The proactive plan is a set of steps intended to reduce security weaknesses. The reactive strategy helps your company's IT security personnel to assess the damage resulting from a security penetration, fix the system, record the event, and get the IT network restored as rapidly as feasible.

Progent's expert IS security consultants can to assist your company to run a full vulnerability assessment and create a company-wide security strategy to implement security processes and controls to minimize future assaults and dangers.

CISM Accredited System Security Engineering Services
The CISM committee defines the basic capabilities and worldwide standards of skill that information security managers are expected to master. It gives business management the assurance that consultants who have earned their CISM credential possess the experience and knowledge to deliver effective security management and consulting consulting. Progent can provide the services of CISM Premier security professionals to help businesses with:

  • IS Security Strategies
  • Risk Management
  • Network Security Program Management
  • Information Security Administration
  • Recovery Management
Read additional information concerning Progent's CISM Accredited Information Security Support Expertise.

CISSP Qualified Security Engineering Support
CISSP denotes mastery of a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Learn additional information concerning Progent's CISSP Qualified Cybersecurity Support Expertise.

CISSP-ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier IT architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most in-depth demands of IS security architecture bounded by the broader scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-premier security experts can assist your company with all aspects of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Learn more information about Progent's ISSAP Certified Secure IT Architecture Support Expertise.

CISA Certified Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is an important achievement that indicates expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an extensive test administered by the ISACA international professional association. Progent's CISA-certified information security audit specialists are available to help your IT organization with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Preparedness
Read more details concerning Progent's CISA Certified Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to validate a consultant's skills to plan, deploy, and support IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists can provide a variety of risk identification services such as:

  • Gather data and review documentation to identify significant risk scenarios
  • Identify legal, industry, and contractual mandates and company policies associated with your information system to determine their possible impact on your strategic goals
  • Point out potential threats for your business workflows to assist in evaluating your enterprise risk
  • Create a risk awareness program and provide seminars to make sure your organization appreciate information system risk so they can assist with your risk control process
  • Match identified risk scenarios to related operational procedures to help determine risk responsibility
  • Determine risk appetite with your senior leadership and key stakeholders to ensure they align
Find out more details about Progent's CRISC Risk Management Consultants.

GIAC Qualified Information System Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security professionals. GIAC's goal is to ensure that an accredited security consultant possesses the skills necessary to deliver support in important areas of network, data, and program security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC network security audit experts are available to help your IT organization in the areas of:

Read additional details about Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Expert
To find out how you can access a Progent security engineer for online or onsite support in Kentucky, call 1-800-993-9400 or visit Online Computer Help.