Company computer networks inKentuckycan depend on quick and economical remote technical support from Progent's qualified security experts to resolve complex security issues. The cost is affordable, charges are by the minute, engagement is fast, and support is world class. Progent also provides help for complex projects that demand the services of senior security engineers with top security certifications.
In case yourKentuckynetwork is based far from more populated urban neighborhoods includingLouisville, Lexington, Owensboro, or Bowling Green, support from local qualified network security experts may be limited when there's an urgent situation. This can cause a drop in productivity for your company, upset customers, unproductive workers, and distracted management. By utilizing Progent's online services, you can get in touch with a Certified security engineer ready to offer expertise whenever you need it to get your computer network running and recover your information.
Progent can help you at any level in your initiatives to protect your information system with support services that can range from network security audits to creating a company-wide security plan. Progent offers affordable support to help small and midsize companies to design and manage protected networks based on Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security companies to deliver centralized control and world-class protection for all your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a further level of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.
Progent's certified engineers are available online or in person to provide a range of emergency or project-based computer security services which include:
If your business has an urgent need for IT security support, refer to Progent's Urgent Online Network Support.
Progent's security experts provide world-class services in vital facets of system protection including auditing, firewalls and VPN, and advanced security consulting.
Progent's certified security engineers can assess the effectiveness of your existing network protection systems through comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's experience in administering this testing saves you consulting fees and offers an accurate picture of system vulnerability. The knowledge your business gains can make up the foundation of a network protection strategy that will permit your network to operate safely and respond rapidly to future threats.
Automated Security Analysis
Progent provides consulting in the application of security auditing products including MBSA and GFI LANguard NSS for economically performing a variety of automatic network auditing checks to identify possible security vulnerabilities. Progent has broad knowledge of additional security analysis tools including NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.
Progent can help you build security into your business processes, install scanning applications, plan and deploy a protected network environment, and suggest policies to maximize the security of your IT system. Progent's security engineers are ready to help you set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Find out more about Progent's network security assessment.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two ultra-affordable security inventory bundles designed to allow small businesses to receive an independent network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your network from beyond your firewall to determine potential risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from a secure machine within your company firewall to uncover vulnerabilities to inside threats. Both security inventory packages are set up and executed from a secured external site. The project is overseen by an engineer with high-level security accreditations and who produces a report that details and analyzes the information captured by the security scan and proposes cost-effective remediation where called for.
Network Intrusion Testing Consulting
Stealth intrusion testing is a key component of any comprehensive IT system security strategy. Progentís security experts can run extensive penetration checks without the knowledge of your company's in-house IT resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion incident alerts and event log analysis are correctly set up and consistently checked. Learn additional information about Progent's stealth security penetration testing support services.
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and VPN technology offered by a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants with important industry accreditations such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your existing PIX or Cisco ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and remote access products offer a full line of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Find out additional details concerning Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Products.
Support Expertise for Other Firewall and VPN Solutions
Progent provides small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security plan and choose the right products from a variety of vendors to achieve your security objectives while sticking within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior machine learning tools to guard endpoint devices as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching AV products. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to manage the entire malware attack lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP deployment that addresses your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry data protection standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent action. Progent's consultants can also help you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of vital files, apps and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPAA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security companies to provide centralized control and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT infrastructure documentation, you can save as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every company ought to have a thoroughly thought out security strategy that includes both preventive procedures and reaction planning. The pre-attack strategy is a set of mechanisms that help to minimize security weaknesses. The post-attack plan assists your security personnel to assess the impact caused by a security penetration, repair the network, record the experience, and get the IT network running as rapidly as feasible.
Progent's expert IT security engineers can to assist your business to perform a full risk assessment and define a computer security strategy to implement security policies and mechanisms to reduce future assaults and dangers.
CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the core capabilities and global standards of skill that IT security professionals are required to learn. It provides executive management the assurance that those who have earned their CISM credential have the experience and knowledge to provide effective security administration and support consulting. Progent offers the support of CISM Premier security consultants to assist companies with:
Find out more details concerning Progent's CISM Qualified Information Security Consulting Expertise.
- Information Security Processes
- Vulnerability Management
- Network Security Program Management
- Information Security Management
- Response Planning
CISSP Qualified Security Consulting Services
CISSP certification recognizes mastery of an international standard for network security. The American National Standards Institute has awarded certification accreditation in the field of information protection under ISO 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security fields such as:
Find out more details concerning Progent's CISSP Information Security Support Professionals.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous testing and extensive work with information security architecture. The ISSAP credential represents demonstrated mastery in the most challenging requirements of IS security architecture bounded by the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security including.
Find out more information concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Services.
- Access Management Systems and Techniques
- Phone System and Network Infrastructure Protection
- Cryptography Options
- Needs Evaluation and Security Standards
- BCP and DRP
- Physical Security
CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies mastery in information system security audit and control. Certified by ANSI, the CISA accreditation has candidates undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified security audit consultants can assist your company in the areas of:
Read additional information about Progent's CISA Qualified IS Security Auditing Consulting Assistance.
- Information Systems Audit Process
- Information Technology Enforcement
- Network Assets and Architecture Lifecycle Planning
- IT Support
- Protecting Information Resources
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and maintain information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and carry out a business continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation consultants offer a variety of risk identification services including:
Find out the details about Progent's CRISC Risk Management Consultants.
- Collect data and study documentation to identify major vulnerabilities
- Identify statutory, industry, and contractual requirements and organizational standards associated with your network to determine their potential impact on your business objectives
- Identify possible vulnerabilities for your business workflows to help in evaluating your enterprise risk
- Create a risk awareness initiative and provide training to ensure your organization appreciate IS risk so they can assist with your risk control program
- Match identified risk vectors to your associated business procedures to help determine risk responsibility
- Determine risk tolerance with executive leadership and major stakeholders to ensure they align
GIAC Accredited Information System Security Engineering Expertise
GIAC was founded in 1999 to certify the skill of computer security professionals. GIAC's mission is to assure that an accredited professional possesses the skills necessary to provide services in key categories of network, data, and application security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC IS security audit specialists can assist your company with:
Learn more information about Progent's GIAC Information Assurance Services.
- Assessing Perimeters
- Security Incident Response
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Get in Touch with a Certified Security Engineer
To see how you can get in touch with a security engineer for remote or on-premises assistance in Kentucky, call 1-800-993-9400 or go to Online Network Support.