Small business IT networks in Maine now have fast and economical remote access to Progent's accredited security engineers to assist with the toughest security problems. The cost is affordable, charges are by the minute, engagement is fast, and service is unbeatable. Progent also provides assistance for complex engagements that requires the services of senior security engineers with high-level industry certifications.
In case your Maine organization is far from more populated metropolitan neighborhoods like Portland, Lewiston, or Bangor, help from nearby accredited network security professionals could be limited when there's an emergency. This could mean lost income for your company, angry clients, idle workers, and distracted executives. By utilizing Progent's remote support, you can get in touch with a Certified security consultant who can deliver expertise whenever you have to have it to keep your system running and restore your information.
Progent can assist you in your initiatives to defend your network with services ranging from security audits to creating a company-wide security strategy. Progent provides economical support to assist small and midsize companies to configure and maintain secure networks based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security companies to provide web-based control and world-class security for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper level of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, DLP, and encryption. The local security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.
Progent's security consultants are available remotely or on premises to offer a range of urgent or longer-term network security services which include:
If your business has an immediate requirement for computer security help, go to Progent's Urgent Online Network Help.
- Perform comprehensive network security audits
- Recover rapidly after virus and worm attacks
- Install firewalls from multiple vendors
- Configure secure solutions for offsite and mobile connectivity
- Install advanced utilities for protection against viruses, spam and directory harvest attacks
- Help create a company-wide security plan with 24x7 monitoring
- Provide comprehensive Call Center Services
- Create a practical network backup and restore solution based on Microsoft Data Protection Manager backup/restore technology
Progent's consultants provide world-class support in vital fields of network protection that include security assessment, firewall/VPN support, and high-level security planning.
System Security Assessment
Progent's expert security engineers can evaluate the strength of your current network protection environment through comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in this service saves you money and offers a detailed portrayal of security holes. The information your business gains can make up the foundation of a security plan that will allow your network to run safely and react quickly to new risks.
Automated Network Security Audits
Progent offers consulting in the use of security auditing utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing checks to identify possible security holes. Progent has extensive knowledge of additional network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.
Progent can show you how to build security into your business operations, install auditing tools, plan and deploy a secure network environment, and suggest policies to optimize the security of your IT system. Progent's security professionals are able to show you how to set up a firewall, implement safe remote connectivity to email and data, and integrate VPN. Learn more about Progent's automated security audits.
Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to enable small businesses to get an impartial security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, an engineer runs an extensive examination of your network from outside your company firewall to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from a secure computer inside your company firewall to determine your exposure to internal attacks. The two security inventory services are set up and run from a secured remote site. The project is managed by an engineer who has earned high-level security accreditations and who produces a document that details and interprets the information captured by the scan and proposes practical improvements where appropriate.
Network Security Penetration Analysis Consulting
Stealth penetration checking is a key part of any successful network security strategy. Progentís security experts can perform extensive penetration tests without the knowledge of your organization's internal network support staff. Unannounced penetration checking uncovers whether existing security defense tools such as intrusion incident alerts and event log analysis are properly set up and actively checked. Find out more on Progent's stealth penetration testing consulting.
Firewall and Virtual Private Network Expertise
Progent's background in network security technology includes extensive field work with major firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of engineers who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.
Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and remote connection products offer a full line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Learn additional details concerning Progent's Consulting Expertise for Cisco Security and VPN Appliances.
Support Services for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right products from multiple suppliers to support your security goals while sticking within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based analysis technology to guard endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-based AV tools. ProSight ASM safeguards local and cloud resources and provides a single platform to address the complete threat progression including filtering, identification, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer economical multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge tools packaged within a single agent accessible from a unified console. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP environment that meets your company's specific needs and that helps you prove compliance with government and industry information security regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require urgent action. Progent's consultants can also help you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables fast recovery of critical data, applications and virtual machines that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security vendors to provide centralized management and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further level of inspection for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hosting solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time thrown away looking for vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Every business should develop a carefully considered security program that incorporates both preventive processes and reaction plans. The proactive strategy is a set of steps designed to minimize vulnerabilities. The reactive plan helps your company's IT security engineers to evaluate the damage resulting from a security penetration, repair the system, record the event, and get business functions running as quickly as feasible.
Progent's certified IS security engineers can to help you to perform a complete vulnerability assessment and define a company-wide security strategy to establish security processes and controls to minimize ongoing attacks and threats.
CISM Certified Security Engineering Expertise
The CISM organization describes the basic capabilities and global standards of skill that information security managers are required to master. It provides executive management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to deliver effective security administration and support consulting. Progent offers the expertise of CISM Premier security consultants to assist businesses with:
Read additional details concerning Progent's CISM Certified Information Security Consulting Expertise.
- Network Security Processes
- Vulnerability Analysis
- Information Security Implementation Management
- IS Security Management
- Recovery Management
CISSP Accredited Security Engineering Services
CISSP denotes mastery of an international standard for information security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data protection stipulated by ISO 17024. Progent offers access to of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields including:
Find out additional details concerning Progent's CISSP Information Security Support Services.
- Security Management Procedures
- Security Infrastructure and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure System Architecture Engineering Services
Progent's CISSP-ISSAP Premier information system architecture engineers are experts who have been awarded ISSAP Certification as a result of thorough examination and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most in-depth requirements of information system security architecture within the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security such as.
Learn more information concerning Progent's ISSAP Certified Secure Information System Architecture Engineering Services.
- Access Management Systems and Techniques
- Telecommunications and System Infrastructure Security
- Cryptography Options
- Needs Analysis and Security Criteria
- BCP and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that indicates expertise in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants pass an extensive examination given by the ISACA international professional group. Progent's CISA-qualified information security audit engineers can assist your business in the areas of:
Get more details about Progent's CISA Accredited Information System Security Auditing Engineering Services.
- Information Systems Audit Process
- Information Technology Governance
- Network Assets and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Protecting Information Resources
- Disaster Recovery Planning
The CRISC certification program was initiated by ISACA to validate an IT professional's skills to design, implement, and support IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and carry out a workplace continuity plan that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk management consultants can provide a variety of risk evaluation services including:
Find out additional information concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to identify major risk scenarios
- Identify legal, industry, and contractual mandates and company policies related to your information system to assess their possible influence on your strategic objectives
- Identify potential vulnerabilities for your business workflows to help in analyzing your corporate risk
- Develop a risk awareness initiative and conduct training to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
- Connect identified risk scenarios to related operational procedures to help determine risk responsibility
- Determine risk tolerance with executive leadership and major stakeholders to ensure they are in agreement
GIAC Qualified Network Security Consulting Services
Learn more details concerning Progent's GIAC Information Assurance Services.
GIAC was established in 1999 to validate the knowledge of IT security experts. GIAC's mission is to ensure that a certified professional has the skills needed to provide support in important categories of system, data, and software security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States NSA. Progent's GIAC-certified information security audit specialists can assist your IT organization in the areas of:
Talk to a Progent Security Engineer
To find out how you can contact a certified Progent security consultant for remote or on-premises assistance in Maine, call 1-800-993-9400 or visit Remote Computer Help.