Small business information networks in the state of Maine can depend on fast and economical online access to Progent's certified network security engineers to help with the toughest security issues. Rates are competitive, billing is by the minute, engagement is quick, and service is world class. Progent also provides help for complex engagements that demand the services of senior security consultants with top security certifications.
If your Maine office is based far from major urban areas such as Portland, Lewiston, or Bangor, help from local qualified security support specialists may be problematic when you have an urgent situation. This can result in lost income for your company, upset customers, idle workers, and distracted management. By utilizing Progent's remote support, you have access to a Premier security consultant who can offer help when you require it to keep your computer network running and recover your data.
Progent can help you in all your initiatives to guard your IT environment with support that ranges from security assessments to creating a comprehensive security plan. Progent offers economical service to assist businesses of all sizes to design and maintain protected IT environments based on Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Ransomware Hot Line: 800-462-8800
Progent's Ransomware Hot Line is intended to help organizations to carry out the urgent first steps in responding to a ransomware attack by containing the malware. Progent's online ransomware experts can assist businesses to identify and isolate breached servers and endpoints and guard undamaged assets from being compromised.
If your network has been breached by any strain of ransomware, act fast. Get immediate help by calling Progent's 24-hour Ransomware Hot Line at 800-462-8800.
Overview of Progent's IT Security Services
Progent can show you how to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security vendors to deliver web-based management and world-class security for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a further layer of analysis for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, DLP, and encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.
Progent's security engineers are available online or on site to offer a variety of emergency or longer-term network security services including:
If your company has an urgent need for IT security support, refer to Progent's Urgent Online Technical Help.
Progent's support professionals offer advanced support in key areas of system protection that include security evaluation, firewall/VPN support, and advanced security planning.
Progent's certified security consultants can evaluate the vulnerability of your existing network protection environment by performing comprehensive remote automated analysis via sophisticated software tools and tested procedures. Progent's experience in administering this service saves you time and money and assures a detailed portrayal of gaps. The knowledge your company gains can form the basis of a network protection strategy that can allow your network to run safely and react rapidly to future threats.
Automated Network Vulnerability Audits
Progent offers expertise in the application of security evaluation utilities including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a set of automatic system auditing scans to identify possible security weaknesses. Progent has broad experience with additional network auditing tools including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities like SolarWinds, Netcat, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can help you design security into your business operations, install scanning software, plan and implement a secure system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are ready to show you how to set up a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information about Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory scanning packages designed to enable small businesses to receive an objective security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from beyond your firewall to uncover possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized computer within your company firewall to uncover your exposure to inside assaults. The two security inventory packages are set up and executed from a protected remote site. The process is managed by an engineer who has earned top security accreditations and who generates a document that summarizes and interprets the information captured by the security scan and suggests practical improvements where appropriate.
Support for Horizon3.ai's NodeZero Security Assessment Solutions
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that supports continuous, simultaneous, automated testing of your internal and perimeter network so you can uncover, rank, remediate, and verify cybersecurity vulnerabilities before threat actors can take advantage of them. Progent can help you to deploy NodeZero to perform comprehensive penetration tests of your network perimeter and your internal network so you can determine your current security posture. Progent can also help you to strengthen your network security and can assist you to plan and implement a unified cybersecurity strategy that simplifies management and delivers optimum cyber defense for on-prem, cloud-based, and perimeter IT assets. To find out more information about Progent's threat assessment services powered by on NodeZero's penetration test products, refer to Consulting Services for NodeZero's PEN Test Platform.
Network Security Penetration Analysis Support Services
Stealth intrusion testing is a key part of any successful network security strategy. Progent's security experts can perform extensive intrusion tests without the knowledge of your company's internal IT resources. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection alerts and event history analysis are correctly set up and consistently monitored. Find out additional information concerning Progent's network penetration testing consulting.
Firewalls and VPN Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to manage your current PIX or ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Network Security and VPN Support Services
Cisco's security and offsite access products offer a complete range of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and CCNP qualifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business goals. Learn additional information about Progent's Support Services for Cisco Security Technology and VPN Products.
Support Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and medium size companies expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWall. Progent can help you create a comprehensive security plan and choose appropriate products from multiple vendors to achieve your security goals while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes SentinelOne's next generation behavior analysis technology to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade legacy signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to manage the entire malware attack progression including blocking, infiltration detection, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Progent is a SentinelOne Partner, reseller, and integrator. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery based on SentinelOne technology.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth protection for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge technologies packaged within a single agent accessible from a unified control. Progent's security and virtualization consultants can assist you to plan and configure a ProSight ESP environment that meets your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent action. Progent can also assist your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of vital data, applications and VMs that have become lost or damaged as a result of component breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPAA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading data security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper layer of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hardware environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can eliminate up to half of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you're planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Every business ought to have a carefully considered security strategy that incorporates both pre-attack procedures and response planning. The proactive strategy is a collection of procedures intended to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to assess the impact caused by an attack, fix the system, document the experience, and get business functions operational as soon as possible.
Progent's expert information security engineers are available to help your business to perform a full risk assessment and define a network security strategy to establish security policies and controls to mitigate ongoing assaults and threats.
CISM Certified System Security Engineering Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and worldwide standards of skill that information security professionals are expected to master. It gives executive management the confidence that those who have earned their CISM credential have the background and capability to provide effective security management and support services. Progent offers the support of CISM Premier security professionals to assist businesses with:
Find out additional details concerning Progent's CISM Accredited Network Security Engineering Professionals.
- Information Security Processes
- Risk Analysis
- Information Security Implementation Management
- Information Security Management
- Response Planning
CISSP Qualified Security Consulting Assistance
CISSP certification denotes expertise with a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields including:
Read more information about Progent's CISSP Accredited Network Security Support Services.
- Security Management Practices
- Security Architecture and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP Certified IT architecture engineers are experts who have earned ISSAP status through rigorous testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the more complex demands of information system security architecture bounded by the wider scope of information system security knowledge required for CISSP certification. Progent's ISSAP-premier security consultants can assist your business with all phases of secure network architecture including.
Read additional details about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.
- Access Management Mechanisms and Techniques
- Telecommunications and System Infrastructure Protection
- Encryption/Decryption Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified IS Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a prestigious achievement that indicates mastery in IS security auditing. Certified by ANSI, the CISA credential requires that consultants undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA information security audit engineers are available to assist your company with:
Read additional details about Progent's CISA Qualified Network Security Auditing Consulting Services.
- Information Systems Audit Services
- IT Governance
- Systems and Architecture Planned Useful Life
- Information Technology Service Delivery
- Protecting Data Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, deploy, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a workplace continuity plan that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation consultants can provide a range of risk assessment services such as:
Get additional details concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to help identify major risk scenarios
- Identify statutory, regulatory, and business mandates and organizational policies associated with your network to determine their potential influence on your business goals
- Point out potential threats for your business processes to assist in analyzing your enterprise risk
- Create a risk awareness program and provide training to ensure your stakeholders appreciate IT risk so they can assist with your risk management program
- Connect identified risk scenarios to related operational processes to help assign risk responsibility
- Validate risk tolerance with executive management and major stakeholders to make sure they match
GIAC Qualified Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that an accredited security consultant possesses the skills appropriate to deliver services in critical areas of network, information, and application program security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the U.S. NSA. Progent's GIAC-certified IS security audit consultants are available to help your business with:
Read additional information about Progent's GIAC Information Assurance Services.
- Assessing Networks
- Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Contact a Certified Security Expert
To find out how to get in touch with a security engineer for online or onsite help in Maine, call 1-800-993-9400 or go to Remote Computer Help.