Business computer networks in the state ofMainecan now get quick and economical online help from Progent's accredited network security experts to assist with critical security issues. Rates are reasonable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also offers assistance for complex projects that requires the services of seasoned security consultants with high-level industry certifications.
If yourMainenetwork is located far from major urban areas such asPortland, Lewiston, or Bangor, access to local qualified security engineers could be problematic during an emergency. This can cause lost revenue for your business, angry customers, unproductive workers, and defocused management. By utilizing Progent's online services, you have access to a Premier security professional ready to offer help whenever you require it to keep your information system operating and restore your data.
Progent can assist you at any level in your efforts to protect your IT environment with support that ranges from network security audits to creating a company-wide security strategy. Progent provides economical support to help small and midsize companies to configure and manage protected networks powered by Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to deliver centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.
Progent's security consultants are accessible online or in person to offer a range of urgent or project-based network security services which include:
If your business has an urgent requirement for computer security support, refer to Progent's Urgent Remote Network Help.
Progent's support professionals offer advanced support in vital facets of network security including security assessment, firewall/VPN support, and advanced security planning.
Progent's expert security engineers can assess the strength of your current network security implementation by performing exhaustive remote automated analysis via sophisticated software tools and proven procedures. Progent's skill in this service saves your company money and offers an objective picture of gaps. The information your company gains can be used as the foundation of a security strategy that will permit your network to operate dependably and respond quickly to new threats.
Automated Security Assessment
Progent provides consulting in the use of security auditing products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a set of programmed system testing checks to identify potential security vulnerabilities. Progent has extensive experience with additional network auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.
Progent can show you how to build security into your company processes, configure scanning tools, define and deploy a protected system environment, and suggest policies to optimize the safety of your network. Progent's security consultants are able to show you how to configure a firewall, design secure remote access to email and data, and install VPN. Find out more about Progent's network security analysis.
Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to allow small companies to receive an impartial network security assessment from a certified security consultant. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from beyond your firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from a secure computer within your firewall to assess vulnerabilities to internal attacks. The two security inventory services are configured and run from a secured external site. The process is directed by an engineer who has earned top security credentials and who produces a document that details and interprets the information captured by the security scan and proposes practical improvements if appropriate.
Stealth Penetration Testing Consulting
Stealth penetration checking is an important part of any serious IT system security strategy. Progentís security experts can perform thorough intrusion tests without the knowledge of your company's in-house network support staff. Stealth penetration testing shows whether existing security defense tools such as intrusion incident alerts and event log monitoring are correctly set up and actively monitored. Learn additional information about Progent's stealth penetration analysis support services.
Progent's background in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key industry certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and VPN Support Expertise
Cisco's network security and offsite access technology provide a comprehensive line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company goals. Find out additional information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.
Engineering Services for Other Firewall and VPN Technology
Progent provides small and medium size companies expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a detailed security plan and choose appropriate technologies from a variety of vendors to support your security goals while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to automate the complete threat lifecycle including blocking, detection, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge technologies incorporated within one agent accessible from a single control. Progent's security and virtualization experts can help you to design and implement a ProSight ESP environment that addresses your organization's specific needs and that helps you prove compliance with government and industry information security standards. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for immediate action. Progent's consultants can also help your company to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates your backup processes and allows fast restoration of critical data, applications and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory requirements such as HIPAA, FIRPA, and PCI and, when needed, can assist you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further level of inspection for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported easily to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect data related to your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate up to half of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Expert Security Planning
Any company ought to develop a thoroughly thought out security strategy that includes both preventive processes and response plans. The proactive plan is a collection of mechanisms designed to minimize vulnerabilities. The post-attack plan helps your security personnel to evaluate the impact resulting from a security penetration, fix the damage, record the experience, and get the IT network restored as soon as possible.
Progent's expert information security consultants can to assist your company to run a full risk assessment and define a network security strategy to establish security policies and mechanisms to reduce ongoing attacks and threats.
CISM Qualified Security Support Assistance
The CISM organization describes the core capabilities and global standards of skill that information security professionals are expected to master. It provides executive management the assurance that those who have qualified for their CISM certification possess the background and knowledge to deliver effective security administration and consulting consulting. Progent offers the services of CISM Premier security consultants to assist companies with:
Find out additional information about Progent's CISM Qualified Information Security Consulting Professionals.
- Network Security Strategies
- Risk Analysis
- Information Security Program Management
- IS Security Management
- Recovery Planning
CISSP Qualified Security Engineering Expertise
CISSP recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data security under ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields including:
Find out more information about Progent's CISSP Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, Network and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP Certified system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven mastery in the most challenging demands of information security architecture bounded by the wider field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security including.
Learn more information concerning Progent's ISSAP Qualified Secure System Architecture Support Services.
- Access Management Mechanisms and Methodologies
- Telecom and Network Infrastructure Protection
- Data Encryption Solutions
- Needs Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Physical Security
CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates expertise in information system security auditing. Certified by ANSI, the CISA credential has candidates undergo an extensive examination given by the ISACA international professional group. Progent's CISA network security audit engineers can assist your IT organization with:
Learn more details concerning Progent's CISA Accredited Network Security Auditing Consulting Services.
- IS Audit Process
- IT Governance
- Network Assets and Architecture Lifecycle
- IT Service Delivery
- Protecting Information Assets
- Disaster Recovery Preparedness
The CRISC certification program was initiated by ISACA to verify an IT professional's ability to design, deploy, and support IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation consultants offer a range of risk identification services including:
Learn the details concerning Progent's CRISC Risk Management Consultants.
- Gather data and study documentation to evaluate significant risk scenarios
- Identify statutory, industry, and business mandates and company standards related to your network to assess their potential impact on your business objectives
- Point out potential vulnerabilities for your business processes to help in analyzing your corporate risk
- Develop a risk awareness initiative and provide seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk management process
- Match key risk vectors to related operational processes to help determine risk responsibility
- Validate risk tolerance with your senior leadership and major stakeholders to make sure they align
GIAC Certified Information System Security Consulting Services
GIAC was established in 1999 to certify the knowledge of network security professionals. GIAC's mission is to verify that an accredited security consultant possesses the knowledge necessary to deliver services in critical areas of network, data, and software security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC-certified security audit engineers can assist your company with:
Find out more details concerning Progent's GIAC Information Assurance Expertise.
- Auditing Security Systems
- Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Get in Touch with a Security Specialist
To find out how to contact a security engineer for online or onsite expertise in Maine, phone 1-800-993-9400 or visit Remote Network Help.