Business computer networks in the state of Maine can depend on quick and affordable online technical support from Progent's accredited security engineers to help with critical security problems. Rates are reasonable, billing is per minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex engagements that demand the knowledge of senior security engineers with high-level industry credentials.
If your Maine network is far from more populated metropolitan areas like Portland, Lewiston, or Bangor, support from local qualified security consultants could be problematic when there's an urgent situation. This can cause a loss of revenue for your business, upset customers, idle workers, and distracted management. By contacting Progent's online services, you have access to a Certified security professional ready to provide assistance when you have to have it to get your network running and restore your information.
Progent can help you in all your efforts to protect your IT environment with services that ranges from network security checks to creating a comprehensive security strategy. Progent provides economical service to help companies of any size to design and maintain safe IT environments based on Microsoft Windows and Cisco technology and that can include computers running UNIX or Linux platforms as well as mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of leading data security vendors to deliver centralized control and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for incoming email. For outbound email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email that stays inside your corporate firewall.
Progent's security experts are available online or in person to offer a variety of urgent or longer-term network security services such as:
If your company has an immediate requirement for IT security help, refer to Progent's Urgent Remote Network Support.
Progent's security experts offer advanced support in vital facets of computer security including security evaluation, firewalls and VPN, and high-level security planning.
Progent's expert security engineers can evaluate the strength of your existing computer security implementation by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in administering this service saves you time and money and assures an accurate picture of system vulnerability. The information your company gains can make up the foundation of a network protection strategy that can permit your network to operate safely and respond rapidly to future threats.
Automated Network Vulnerability Analysis
Progent provides consulting in the use of security analysis packages including MBSA and GFI LANguard Network Security Scanner for affordably running a variety of programmed system testing scans to uncover possible security vulnerabilities. Progent has broad experience with other network auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like Metasploit, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.
Progent can show you how to design security into your company processes, configure auditing software, define and deploy a protected system environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are available to help you configure a firewall, implement safe remote access to email and data, and integrate virtual private network. Find out more about Progent's automated security evaluation.
Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory service bundles designed to allow small companies to get a professional security evaluation from an accredited security expert. With Progent's External Network Security Inventory Checkup, a security expert administers a comprehensive test of your network from outside your firewalled perimeter to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from an authorized computer within your company firewall to uncover your exposure to internal threats. The two security inventory packages are set up and run from a protected external location. The process is managed by an engineer who has earned high-level security credentials and who generates a document that details and analyzes the information captured by the security scan and proposes practical remediation if called for.
Stealth Penetration Testing Support Services
Stealth penetration checking is a key part of any successful IT system security strategy. Progentís security experts can run thorough penetration checks without the knowledge of your company's internal IT resources. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion detection warnings and event history monitoring are properly set up and actively checked. Learn more about Progent's stealth security penetration testing consulting.
Firewall and Virtual Private Network Support
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, tune, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and Virtual Private Network Consulting Services
Cisco's security and offsite connection technology provide a complete line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Find out more details concerning Progent's Support Services for Cisco Security Technology and VPN Products.
Engineering Services for Other Firewall and VPN Products
Progent provides small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security plan and select appropriate products from a variety of vendors to achieve your security goals while sticking within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis tools to guard endpoint devices and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-based AV products. ProSight ASM protects on-premises and cloud resources and offers a single platform to automate the complete malware attack lifecycle including protection, identification, mitigation, cleanup, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device control, and web filtering via cutting-edge technologies packaged within one agent managed from a unified console. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your company's unique needs and that allows you demonstrate compliance with government and industry data protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for urgent attention. Progent can also assist your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. Available at a low monthly price, ProSight DPS automates your backup activities and enables fast restoration of vital files, apps and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver world-class support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security vendors to deliver centralized management and world-class protection for your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a further level of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to a different hardware environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard data about your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require when you need it. Find out more about ProSight IT Asset Management service.
Expert Network Security Design
Every company should develop a carefully thought out security strategy that incorporates both proactive procedures and reaction planning. The proactive strategy is a set of steps designed to minimize vulnerabilities. The reactive strategy helps your security personnel to assess the impact caused by an attack, fix the network, record the experience, and get the IT network running as quickly as possible.
Progent's certified IS security consultants can to help you to perform a complete vulnerability assessment and create a computer security strategy to establish security processes and controls to minimize future attacks and dangers.
CISM Accredited System Security Engineering Assistance
The CISM committee describes the core capabilities and worldwide standards of skill that IT security managers are expected to learn. It gives business management the assurance that consultants who have earned their CISM credential possess the background and knowledge to deliver efficient security management and consulting consulting. Progent can provide the expertise of CISM Premier security professionals to help companies with:
Learn additional information concerning Progent's CISM Certified Information Security Support Expertise.
- Network Security Processes
- Vulnerability Analysis
- Network Security Program Management
- Network Security Management
- Recovery Planning
CISSP Accredited Security Consulting Services
CISSP certification denotes mastery of an international standard for data security. ANSI has awarded certification recognition in the field of information protection defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a broad range of security fields including:
Read more information about Progent's CISSP Security Consulting Services.
- Security Management Practices
- Security Architecture and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Technology
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the most in-depth demands of information security architecture bounded by the broader field of IS security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security such as.
Read more information about Progent's ISSAP Accredited Secure System Architecture Engineering Expertise.
- Access Control Mechanisms and Methodologies
- Phone System and Network Infrastructure Security
- Encryption/Decryption Options
- Needs Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Qualified IS Security Auditing Engineering Expertise
The CISA accreditation is a recognized achievement that represents expertise in information system security auditing. Accredited by ANSI, the CISA credential requires that candidates pass an extensive test given by the ISACA professional association. Progent's CISA-qualified information security audit engineers can help your IT organization in the areas of:
Find out additional information about Progent's CISA Accredited Network Security Auditing Consulting Services.
- Information Systems Audit Services
- IT Administration
- Systems and Architecture Lifecycle
- IT Support
- Protecting Information Assets
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a workplace continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk management specialists can provide a range of risk assessment services such as:
Learn more details about Progent's CRISC Risk Management Experts.
- Collect data and study documentation to help identify major vulnerabilities
- Identify statutory, industry, and business requirements and company policies related to your information system to determine their possible influence on your business objectives
- Point out potential threats for your operational workflows to help in analyzing your enterprise risk
- Create a risk awareness program and provide training to ensure your organization appreciate IT risk so they can contribute to your risk control program
- Match identified risk vectors to your associated business procedures to help assign risk responsibility
- Determine risk tolerance with your senior leadership and key stakeholders to make sure they align
GIAC Certified Network Security Engineering Expertise
Read additional details concerning Progent's GIAC Information Assurance Support.
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to ensure that an accredited security consultant possesses the skills appropriate to deliver services in important categories of network, data, and application software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC-qualified security audit consultants are available to assist your company with:
Get in Touch with a Certified Progent Security Engineer
To learn how you can get in touch with a security engineer for remote or on-premises expertise in Maine, call 1-800-993-9400 or visit Remote Network Help.