Business IT networks in the state of Kentucky can now get prompt and economical online help from Progent's certified network security experts to help with critical security problems. Rates are reasonable, billing is per minute, sign-up is immediate, and service is unbeatable. Progent also provides help for long-term engagements that requires the expertise of seasoned security consultants with high-level industry credentials.
In case your Kentucky organization is based away from larger metropolitan areas like Louisville, Lexington, Owensboro, or Bowling Green, contact with nearby certified security engineers is often problematic during an urgent situation. This can cause lost productivity for your company, upset customers, idle workers, and defocused management. By contacting Progent's online services, you have access to a Premier security professional ready to offer assistance whenever you have to have it to keep your computer network on line and recover your information.
Progent can help you in all your initiatives to defend your network with services ranging from network security checks to creating a company-wide security plan. Progent offers economical support to help companies of any size to configure and maintain safe networks powered by Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile clients with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security vendors to provide web-based control and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified consultants are accessible remotely or on site to provide a variety of urgent or longer-term IT security services which include:
If your network has an emergency requirement for computer security support, refer to Progent's Urgent Remote Network Help.
Progent's consultants offer advanced services in vital facets of computer protection including security evaluation, firewalls and VPN, and high-level security consulting.
Progent's certified security consultants can evaluate the strength of your existing computer protection systems by performing exhaustive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in administering this service saves your company consulting fees and assures an accurate picture of security holes. The knowledge your company gains can make up the basis of a security plan that can allow your network to operate dependably and adapt rapidly to future threats.
Automated Vulnerability Assessment
Progent provides expertise in the application of security auditing products such as Microsoft's MBSA and LANguard from GFI for affordably running a variety of programmed network auditing checks to identify possible security holes. Progent has broad experience with other network auditing utilities such as NMAP, AMAP application mapper, eEye, plus utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react appropriately.
Progent can show you how to design security into your business processes, configure scanning applications, define and deploy a protected system environment, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are ready to show you how to configure a firewall, implement safe remote connectivity to email and data, and install VPN. Learn additional information on Progent's automated security evaluation.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two low-cost security inventory scanning packages intended to allow small companies to get an objective network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from an authorized computer within your firewall to uncover the risk to inside threats. The two security inventory packages are configured and executed from a protected external location. The process is overseen by an engineer with top security accreditations and who generates a report that details and analyzes the information captured by the scan and proposes cost-effective remediation where appropriate.
Network Intrusion Analysis Consulting
Stealth intrusion testing is an important part of any comprehensive network security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's internal IT staff. Unannounced penetration checking uncovers whether existing security monitoring systems such as intrusion incident warnings and event history monitoring are properly configured and actively checked. Find out additional information concerning Progent's network security penetration analysis consulting.
Progent's expertise in network security technology includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and remote access technology represent a comprehensive line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP certifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Learn more details about Progent's Support Expertise for Cisco Security Technology and VPN Appliances.
Engineering Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose appropriate technologies from multiple suppliers to achieve your security goals while sticking within your spending restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior analysis tools to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to manage the complete threat lifecycle including protection, detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows VSS and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified control. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with government and industry information security regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent can also help you to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates your backup activities and enables rapid recovery of critical data, applications and VMs that have become lost or corrupted as a result of component failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery specialists can deliver advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to recover your business-critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security vendors to deliver centralized control and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported immediately to a different hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any company ought to develop a thoroughly considered security program that incorporates both pre-attack procedures and response plans. The proactive strategy is a set of procedures intended to minimize vulnerabilities. The reactive strategy assists your network security engineers to evaluate the impact caused by a security penetration, fix the system, document the experience, and get business functions operational as rapidly as feasible.
Progent's expert IT security consultants are available to help you to run a comprehensive risk assessment and define a computer security plan to implement security policies and controls to minimize ongoing attacks and threats.
CISM Accredited Information Security Engineering Expertise
The Certified Information Security Manager (CISM) committee defines the core competencies and worldwide standards of skill that IT security professionals are expected to learn. It provides executive management the assurance that consultants who have earned their CISM certification have the experience and knowledge to provide effective security administration and support services. Progent offers the expertise of CISM Certified security professionals to help companies with:
Read more details about Progent's CISM Information Security Engineering Expertise.
- IS Security Strategies
- Vulnerability Analysis
- Network Security Program Management
- IS Security Management
- Recovery Planning
CISSP Accredited Security Consulting Expertise
The CISSP credential recognizes mastery of an international standard for network security. ANSI has granted certification accreditation in the field of information protection defined by ISO 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your business in a variety security fields such as:
Learn more information about Progent's CISSP Information Security Consulting Professionals.
- Security Management Practices
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture professionals are consultants who have been awarded ISSAP status through thorough testing and extensive experience with information security architecture. The ISSAP certification represents proven competence in the most challenging demands of information system security architecture within the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-premier security experts can assist your company with all aspects of secure network architecture including.
Learn additional information concerning Progent's ISSAP Certified Secure IT Architecture Consulting Professionals.
- Access Management Mechanisms and Methodologies
- Phone System and Network Infrastructure Security
- Data Encryption Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited IS Security Auditing Consulting Assistance
The CISA credential is an important qualification that indicates mastery in IS security auditing. Certified by ANSI, the CISA credential has candidates undergo an extensive test given by the ISACA professional association. Progent's CISA-certified security audit engineers are available to assist your company with:
Find out additional information concerning Progent's CISA Certified Security Auditing Engineering Expertise.
- IS Audit Process
- IT Governance
- Systems and Infrastructure Lifecycle
- IT Service Delivery
- Protecting Data Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to validate an IT professional's skills to design, deploy, and support information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and execute a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation consultants can provide a range of risk identification services such as:
Read more information about Progent's CRISC Risk Management Experts.
- Collect data and review documentation to identify significant risk scenarios
- Inventory statutory, industry, and contractual mandates and company standards related to your network to assess their potential impact on your strategic objectives
- Point out possible threats for your business workflows to help in evaluating your corporate risk
- Develop a risk awareness program and conduct seminars to ensure your organization appreciate IS risk so they can contribute to your risk control program
- Match identified risk vectors to related operational processes to help assign risk ownership
- Determine risk appetite with executive management and key stakeholders to ensure they match
GIAC Certified Network Security Engineering Expertise
GIAC was established in 1999 to certify the skill of IT security engineers. GIAC's goal is to verify that an accredited professional has the skills needed to provide support in vital areas of network, information, and application security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC network security audit specialists can assist your IT organization in the areas of:
Read more information concerning Progent's GIAC Information Assurance Support.
- Auditing Security Systems
- Security Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Certified Security Expert
To learn how to access a certified Progent security consultant for remote or onsite support in Kentucky, phone 1-800-993-9400 or go to Remote Network Support.