Small business networks in the state of Kentucky can depend on prompt and economical online help from Progent's certified security consultants to fix critical security issues. Rates are reasonable, charges are per minute, engagement is immediate, and service is world class. Progent also offers help for long-term projects that demand the services of seasoned security engineers with high-level industry credentials.

If your Kentucky business is based far from more populated metropolitan areas including Louisville, Lexington, Owensboro, or Bowling Green, support from nearby accredited security consultants is often limited when there's a crisis. This can cause a drop in productivity for your company, angry clients, idle employees, and distracted management. By utilizing Progent's remote support, you have access to a Premier security professional ready to provide assistance whenever you need it to keep your system running and recover your data.

Progent can help you in all your efforts to guard your IT environment with support services that ranges from network security assessments to developing a comprehensive security plan. Progent offers economical service to help small and midsize companies to configure and manage protected IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to deliver centralized management and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's certified engineers are available online or on premises to offer a range of urgent or project-based network security services which include:

  • Perform thorough security evaluations
  • Clean up rapidly after serious security breaches
  • Configure firewalls from multiple vendors
  • Configure secure methods for offsite and mobile access
  • Install advanced solutions for automatic protection against spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 security monitoring
  • Offer outsourced Help Desk Support
  • Create an effective network backup and recovery plan based on Data Protection Manager backup capability
If your company has an immediate requirement for IT security help, refer to Progent's Urgent Remote Technical Help.

Progent's engineers can deliver world-class support in vital facets of system security including analysis, firewall and VPN expertise, and advanced security consulting.

System Audits
Progent's certified security consultants can evaluate the vulnerability of your current computer security implementation through comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's skill in administering this service saves you money and assures an objective portrayal of weaknesses. The information your company gains can be used as the basis of a security strategy that will allow your network to run dependably and adapt rapidly to future threats.

Automated Vulnerability Assessment
Progent offers expertise in the use of security testing products including MBSA and GFI LANguard for economically performing a variety of automatic system testing scans to identify potential security weaknesses. Progent has broad knowledge of other network auditing tools including NMAP Port Scanner, AMAP application mapper, eEye, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can help you build protection into your company operations, configure auditing software, plan and deploy a protected network environment, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are able to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out more on Progent's automated security audits.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory scanning bundles designed to allow small businesses to get an impartial network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from outside your firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from an authorized computer within your firewall to uncover your exposure to inside assaults. The two security inventory services are configured and run from a protected external site. The project is directed by an engineer with high-level security accreditations and who generates a report that summarizes and interprets the data collected by the security scan and suggests cost-effective remediation where appropriate.

Stealth Security Penetration Testing Support Services
Stealth penetration checking is an important component of any serious network security strategy. Progentís security professionals can run thorough intrusion tests without the awareness of your company's in-house network support staff. Unannounced penetration checking uncovers whether current security defense tools such as intrusion incident warnings and event log monitoring are properly configured and actively checked. Learn more concerning Progent's network security penetration testing support services.

Firewall and Virtual Private Network Solutions
Progent's background in network security technology includes extensive field work with major firewalls and VPN products from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to manage your legacy PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Consulting Services
Cisco's network security and offsite access technology represent a complete range of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Find out more details concerning Progent's Engineering Services for Cisco Security Technology and VPN Appliances.

Engineering Expertise for Other Firewall and VPN Technology
Progent offers small and medium size organizations professional support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWall. Progent can show you how to create a comprehensive security strategy and select appropriate technologies from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis tools to guard endpoint devices and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to manage the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and forensics. Top features include single-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that helps you demonstrate compliance with legal and industry information protection standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent's consultants can also assist your company to set up and test a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup processes and enables rapid recovery of critical data, applications and virtual machines that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security vendors to provide centralized control and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of inspection for inbound email. For outbound email, the local security gateway provides AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can save up to half of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about ProSight IT Asset Management service.

Expert Network Security Planning
Any business should have a carefully thought out security program that includes both proactive procedures and reaction planning. The proactive plan is a set of procedures designed to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to evaluate the impact caused by an attack, fix the system, record the event, and get the IT network restored as rapidly as feasible.

Progent's expert information security engineers are available to help you to perform a comprehensive vulnerability assessment and create a company-wide security plan to implement security policies and mechanisms to mitigate future assaults and threats.

CISM Certified Security Engineering Expertise
The Certified Information Security Manager (CISM) committee describes the basic competencies and global standards of performance that information security managers are expected to master. CISM provides executive management the assurance that those who have earned their CISM certification have the background and knowledge to provide effective security management and consulting consulting. Progent can provide the expertise of CISM Certified security consultants to assist businesses with:

  • IS Security Governance
  • Vulnerability Management
  • IS Security Program Management
  • IS Security Administration
  • Response Planning
Read additional details concerning Progent's CISM Information Security Engineering Services.

CISSP Certified Security Engineering Services
CISSP recognizes mastery of a worldwide standard for data security. ANSI has awarded certification accreditation in the area of information protection stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecom, Network and Internet Security
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISSP Qualified Security Support Expertise.

CISSP-ISSAP Accredited Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture professionals are consultants who have been awarded ISSAP Certification through thorough testing and significant experience with information security architecture. The ISSAP certification indicates proven skill in the most challenging demands of information security architecture bounded by the wider scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-premier security consultants can help your company with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecom and Network Protection
  • Data Encryption Options
  • Requirements Analysis and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Learn more information concerning Progent's ISSAP Accredited Secure Network Architecture Support Services.

CISA Accredited Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-certified security audit experts are available to help your business with:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Find out additional information concerning Progent's CISA Certified IS Security Auditing Consulting Support.

CRISC Experts
The CRISC program was established by ISACA in 2010 to validate a consultant's skills to design, implement, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation specialists can provide a range of risk assessment services such as:

  • Collect information and review documentation to identify major vulnerabilities
  • Identify statutory, industry, and business mandates and company standards related to your network to assess their possible impact on your strategic objectives
  • Point out possible threats for your operational processes to assist in evaluating your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your organization understand information system risk so they can assist with your risk management program
  • Connect identified risk scenarios to your associated operational processes to help determine risk ownership
  • Validate risk appetite with your senior management and major stakeholders to make sure they match
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Engineering Expertise
GIAC was founded in 1999 to validate the knowledge of network security engineers. GIAC's mission is to assure that a certified professional has the skills appropriate to deliver services in critical categories of network, information, and program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC information security audit consultants can help your IT organization in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Find out more details concerning Progent's GIAC Information Assurance Services.

Talk to a Progent Security Expert
To see how you can access a certified security consultant for online or on-premises assistance in Kentucky, phone 1-800-993-9400 or go to Online Computer Help.