Small business information networks in Kentucky can depend on quick and economical remote help from Progent's accredited security experts to fix the toughest security problems. The cost is competitive, charges are by the minute, engagement is immediate, and service is world class. Progent also provides help for long-term projects that requires the services of senior security consultants with top security certifications.
In case your Kentucky company is based away from more populated urban neighborhoods such as Louisville, Lexington, Owensboro, or Bowling Green, support from local certified network security engineers is often problematic when you have an urgent situation. This could mean a loss of income for your business, angry clients, unproductive employees, and distracted executives. By contacting Progent's remote support, you have access to a Premier security professional ready to offer help when you need it to keep your computer network running and salvage your data.
Progent can help you in your efforts to protect your IT environment with support services that ranges from network security assessments to creating a company-wide security strategy. Progent provides affordable support to assist businesses of all sizes to design and maintain secure networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security platform that uses the technology of leading data security companies to provide centralized control and world-class protection for your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall.
Progent's certified professionals are accessible remotely or on site to provide a variety of emergency or project-based IT security services such as:
If your network has an emergency need for IT security support, refer to Progent's Emergency Remote Technical Support.
Progent's support professionals provide advanced support in vital areas of computer protection including security assessment, firewall and VPN expertise, and advanced security planning.
System Security Assessment
Progent's expert security consultants can assess the vulnerability of your current computer protection implementation by performing exhaustive remote automated testing via sophisticated software tools and proven techniques. Progent's experience in administering this testing saves your company consulting fees and offers an objective picture of weaknesses. The knowledge your company gains can make up the basis of a network protection plan that can permit your network to operate safely and adapt quickly to future risks.
Automated Network Security Audits
Progent provides consulting in the use of security auditing products such as Microsoft's MBSA and LANguard from GFI for economically performing a variety of automatic system auditing checks to uncover potential security holes. Progent has extensive knowledge of other network auditing products including NMAP, AMAP, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can help you build security into your business processes, configure auditing applications, define and implement a protected system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are ready to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's automated security assessment.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to enable small businesses to get a professional security assessment from a qualified security consultant. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive test of your network from outside your firewalled perimeter to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from a secure machine within your company firewall to assess vulnerabilities to internal attacks. Both security inventory services are set up and run from a protected external site. The project is overseen by an engineer who has earned high-level security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and suggests cost-effective remediation where called for.
Stealth Intrusion Analysis Consulting
Stealth penetration checking is an important component of any successful network security plan. Progentís security experts can perform extensive penetration tests without the awareness of your company's in-house network support staff. Unannounced penetration checking uncovers whether current security monitoring tools such as intrusion detection warnings and event log monitoring are correctly set up and actively checked. Find out more concerning Progent's stealth penetration analysis support services.
Progent's background in network security technology includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Engineering Services
Cisco's security and remote access products provide a comprehensive range of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Read more details concerning Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Products.
Support Expertise for Other Firewall and VPN Technology
Progent provides small and medium size organizations expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select appropriate products from multiple vendors to achieve your security goals while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely escape traditional signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to automate the complete threat lifecycle including blocking, identification, containment, cleanup, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint management, and web filtering through leading-edge technologies incorporated within a single agent managed from a single control. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your company's unique needs and that allows you demonstrate compliance with government and industry information security regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for immediate action. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup processes and allows rapid recovery of critical data, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security companies to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further level of inspection for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email that stays inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported easily to a different hardware solution without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and safeguard data related to your network infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Learn more details about ProSight IT Asset Management service.
Certified Network Security Design
Every company should develop a thoroughly thought out security program that incorporates both pre-attack processes and response planning. The proactive strategy is a collection of procedures designed to reduce security weaknesses. The reactive strategy helps your IT security personnel to assess the impact resulting from a security penetration, repair the system, record the event, and get the IT network restored as rapidly as possible.
Progent's certified IT security engineers are available to assist your company to perform a comprehensive risk evaluation and define a company-wide security strategy to implement security policies and mechanisms to minimize ongoing assaults and threats.
CISM Qualified System Security Consulting Expertise
The CISM organization defines the core capabilities and worldwide standards of performance that information security managers are required to master. CISM gives executive management the assurance that consultants who have qualified for their CISM credential possess the background and knowledge to provide efficient security administration and support consulting. Progent can provide the expertise of CISM Premier security professionals to help companies with:
Read more details concerning Progent's CISM IS Security Support Expertise.
- Information Security Governance
- Risk Management
- Information Security Implementation Management
- IS Security Administration
- Response Planning
CISSP Certified Security Consulting Assistance
The CISSP credential denotes mastery of a worldwide standard for data security. The American National Standards Institute has granted certification accreditation in the field of information security stipulated by ISO 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a variety security areas such as:
Find out more information concerning Progent's CISSP-certified Cybersecurity Consulting Expertise.
- Security Management Practices
- Security Architecture and Paradigms
- Access Management Systems and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Consulting Services
Progent's CISSP-ISSAP Premier system architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and significant experience with network security design. The ISSAP credential represents demonstrated competence in the most challenging demands of information security architecture within the broader scope of information security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture such as.
Learn more details concerning Progent's ISSAP Certified Secure Information System Architecture Engineering Services.
- Access Control Mechanisms and Techniques
- Phone System and Network Infrastructure Security
- Encryption/Decryption Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning and DRP
- Hardware Security
CISA Certified IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is a prestigious achievement that indicates mastery in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination given by the ISACA professional association. Progent's CISA-qualified information security audit consultants are available to help your business with:
Read the details concerning Progent's CISA Accredited Security Auditing Consulting Support.
- Information Systems Audit Services
- IT Enforcement
- Systems and Infrastructure Lifecycle Planning
- IT Support
- Safeguarding Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to verify a consultant's skills to design, implement, and support IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers offer a range of risk evaluation services such as:
Find out additional information about Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to help identify major vulnerabilities
- Identify legal, regulatory, and contractual requirements and organizational standards related to your information system to assess their possible impact on your strategic objectives
- Identify potential vulnerabilities for your business processes to help in analyzing your enterprise risk
- Create a risk awareness initiative and conduct training to ensure your organization appreciate information system risk so they can assist with your risk management process
- Match key risk scenarios to related operational procedures to help assign risk ownership
- Determine risk tolerance with your senior management and major stakeholders to ensure they align
GIAC Accredited Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge appropriate to deliver support in key areas of system, information, and application program security. GIAC certifications are recognized by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC network security audit engineers can assist your business with:
Learn additional information about Progent's GIAC Information Assurance Expertise.
- Assessing IT Infrastructure
- Security Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Certified Security Engineer
To find out how to contact a certified Progent security engineer for online or onsite expertise in Kentucky, phone 1-800-993-9400 or go to Remote Computer Support.