Company information networks in the state of Kentucky can have fast and affordable remote technical support from Progent's certified security professionals to assist with critical security problems. The cost is competitive, billing is by the minute, engagement is fast, and service is unbeatable. Progent also provides assistance for complex engagements that requires the services of senior security consultants with high-level industry certifications.
In case your Kentucky network is located some distance from major urban neighborhoods including Louisville, Lexington, Owensboro, or Bowling Green, contact with local qualified security experts may be problematic when you have an emergency. This could mean a drop in revenue for your company, angry clients, unproductive workers, and defocused executives. By contacting Progent, you have access to a Certified security engineer who can provide assistance when you need it to get your information system operating and recover your information.
Progent can assist you in a variety of ways in your initiatives to guard your information system with support services that ranges from security checks to developing a comprehensive security plan. Progent offers affordable service to assist businesses of all sizes to design and maintain secure IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver centralized control and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outbound email, the local gateway provides AV and anti-spam protection, DLP, and encryption. The onsite security gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified engineers are accessible online or on premises to provide a range of emergency or project-based IT security services such as:
If your network has an emergency need for IT security help, go to Progent's Urgent Remote Technical Help.
- Perform automated security evaluations
- Clean up rapidly after serious security breaches
- Install firewalls from multiple vendors
- Configure safe solutions for offsite and mobile connectivity
- Deploy effective applications for defense against spam and directory harvest attacks
- Help create a comprehensive security strategy with round-the-clock security monitoring
- Provide comprehensive Help Desk Support
- Develop a practical backup and disaster recovery strategy built around Microsoft DPM backup/restore technology
Progent's engineers can deliver advanced support in vital fields of computer security including security assessment, firewall/VPN support, and advanced security planning.
System Security Audits
Progent's certified security engineers can assess the vulnerability of your current network protection systems through comprehensive remote automated testing based on sophisticated software tools and tested procedures. Progent's experience in administering this service saves you consulting fees and offers an accurate picture of system vulnerability. The knowledge your IT organization gains can make up the basis of a network protection strategy that will allow your network to operate safely and adapt rapidly to new risks.
Automated Security Analysis
Progent offers expertise in the application of security evaluation products such as MBSA and GFI LANguard Network Security Scanner for economically performing a variety of programmed network auditing checks to identify potential security holes. Progent has extensive experience with other security analysis utilities such as NMAP, AMAP, eEye, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can show you how to design protection into your business processes, install auditing tools, define and deploy a secure network environment, and suggest policies to maximize the safety of your IT system. Progent's security consultants are able to show you how to set up a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Learn more concerning Progent's automated security evaluation.
Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory service bundles designed to allow small businesses to receive an independent network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your network from outside your company firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from an authorized computer within your company firewall to evaluate the risk to inside attacks. Both security inventory services are configured and executed from a secured remote location. The project is overseen by a consultant who has earned top security credentials and who generates a document that details and interprets the information collected by the scan and suggests cost-effective improvements where called for.
Network Penetration Analysis Consulting
Stealth intrusion testing is a key component of any comprehensive IT system security plan. Progentís security experts can run thorough penetration checks without the knowledge of your organization's in-house IT resources. Unannounced penetration testing shows whether existing security monitoring systems such as intrusion detection alerts and event history monitoring are properly configured and consistently checked. Learn more on Progent's stealth penetration analysis support services.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security technology includes in-depth field work with major firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your current PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote access products offer a complete range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Read more details about Progent's Support Services for Cisco Security and VPN Products.
Consulting Services for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and choose appropriate products from multiple vendors to support your security goals while sticking within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to guard endpoints and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus tools. ProSight ASM safeguards local and cloud-based resources and provides a single platform to manage the entire threat lifecycle including blocking, infiltration detection, mitigation, remediation, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver economical in-depth security for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools incorporated within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your organization's unique needs and that helps you prove compliance with government and industry data protection standards. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for immediate attention. Progent's consultants can also help you to install and test a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of vital files, applications and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security companies to deliver centralized control and comprehensive protection for your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be ported immediately to a different hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect information related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can eliminate up to half of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Design
Any company ought to develop a carefully thought out security program that incorporates both pre-attack procedures and response planning. The pre-attack plan is a set of mechanisms intended to reduce vulnerabilities. The post-attack strategy helps your company's network security engineers to assess the impact caused by a security penetration, repair the network, document the event, and get the IT network running as rapidly as possible.
Progent's certified IT security consultants are available to assist your company to perform a complete vulnerability assessment and define a network security plan to establish security policies and mechanisms to reduce future assaults and threats.
CISM Certified System Security Support Services
The Certified Information Security Manager (CISM) committee defines the basic capabilities and international standards of skill that IT security managers are required to learn. It provides executive management the confidence that those who have earned their CISM credential possess the experience and knowledge to deliver effective security management and support consulting. Progent can provide the expertise of CISM Premier security professionals to assist companies with:
Read additional information concerning Progent's CISM Certified IS Security Engineering Professionals.
- IS Security Processes
- Vulnerability Analysis
- Information Security Program Management
- IS Security Management
- Recovery Planning
CISSP Qualified Security Engineering Expertise
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security defined by ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security areas such as:
Read additional information concerning Progent's CISSP-certified Information Security Support Expertise.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecom, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture engineers are experts who have earned ISSAP Certification through rigorous examination and significant experience with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the most in-depth requirements of IS security architecture bounded by the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all phases of architecture security such as.
Learn additional details about Progent's ISSAP Certified Secure Information System Architecture Engineering Services.
- Access Management Systems and Techniques
- Phone System and Network Protection
- Data Encryption Options
- Requirements Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a globally recognized qualification that represents expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive examination administered by the ISACA professional group. Progent's CISA-certified network security audit experts are available to assist your IT organization with:
Learn more information concerning Progent's CISA Certified Information System Security Auditing Engineering Services.
- IS Audit Process
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- IT Service Delivery
- Safeguarding Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to verify an IT professional's ability to plan, implement, and maintain IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and carry out a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation engineers offer a range of risk identification services such as:
Learn additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and study documentation to evaluate major risk scenarios
- Inventory statutory, industry, and contractual mandates and organizational standards related to your information system to determine their possible influence on your business objectives
- Identify potential threats for your operational workflows to help in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to make sure your stakeholders understand IT risk so they can assist with your risk control process
- Connect key risk vectors to your associated operational processes to help determine risk ownership
- Validate risk appetite with your senior management and major stakeholders to make sure they match
GIAC Accredited Security Engineering Services
Find out additional information about Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security engineers. GIAC's goal is to ensure that an accredited security consultant possesses the skills needed to deliver support in important categories of system, information, and software security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit specialists are available to help your IT organization with:
Contact a Security Expert
To find out how you can get in touch with a certified Progent security engineer for remote or on-premises help in Kentucky, call 1-800-993-9400 or go to Remote Network Help.