Business information networks in the state of Maine can now get quick and affordable remote help from Progent's certified security support specialists to help with complex security problems. Rates are reasonable, billing is by the minute, engagement is immediate, and service is unbeatable. Progent also offers help for long-term projects that demand the expertise of seasoned security engineers with top security certifications.

If your Maine business is far from more populated metropolitan areas like Portland, Lewiston, or Bangor, help from local certified network security engineers could be limited when there's an emergency. This can cause a loss of income for your company, upset clients, idle workers, and distracted management. By calling Progent's remote support, you have access to a Certified security professional who can deliver help whenever you need it to get your system running and recover your information.

Progent can assist you at any level in your initiatives to defend your information system with support that ranges from network security audits to developing a company-wide security plan. Progent offers affordable service to help companies of any size to set up and manage secure IT environments powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security vendors to deliver web-based control and comprehensive protection for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most threats from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further level of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also enable Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.

Progent's security engineers are available remotely or on site to provide a range of urgent or project-based network security services including:

If your network has an emergency requirement for IT security support, refer to Progent's Urgent Online Technical Support.

Progent's support professionals provide world-class support in vital fields of system protection including security assessment, firewalls and VPN, and high-level security planning.

System Assessment
Progent's certified security consultants can assess the vulnerability of your current network security environment by performing comprehensive remote automated testing via sophisticated software tools and tested techniques. Progent's experience in administering this testing saves you consulting fees and offers a detailed picture of system vulnerability. The knowledge your IT organization gains can make up the basis of a network protection strategy that will permit your network to operate dependably and adapt rapidly to future risks.

Automated Network Security Audits
Progent offers consulting in the application of security analysis packages such as Microsoft's MBSA and GFI LANguard for economically performing a set of programmed network auditing scans to identify potential security holes. Progent has broad experience with other security analysis utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.

Progent can show you how to build security into your business processes, configure auditing tools, plan and implement a secure system environment, and suggest policies to optimize the security of your IT system. Progent's security professionals are able to show you how to set up a firewall, design secure remote access to email and data, and integrate VPN. Learn more about Progent's network security audits.

Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small businesses to get an objective network security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your network from outside your firewalled perimeter to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from a secure computer within your company firewall to uncover the risk to inside attacks. Both security inventory services are set up and executed from a protected external site. The process is directed by a consultant with top security accreditations and who generates a report that summarizes and interprets the data captured by the security scan and suggests practical remediation if called for.

Network Security Penetration Testing Consulting
Stealth penetration testing is a key component of any comprehensive IT system security plan. Progentís security experts can run extensive penetration tests without the knowledge of your organization's in-house IT staff. Stealth penetration testing uncovers whether current security monitoring tools such as intrusion detection alerts and event log monitoring are correctly set up and actively monitored. Learn more about Progent's network security penetration analysis consulting.

Firewalls and VPN Support
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned key networking accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access technology provide a complete line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Read additional details concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Engineering Services for Additional Firewall and VPN Solutions
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and select appropriate technologies from a variety of suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes next generation behavior-based machine learning technology to guard endpoints and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-matching anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the entire malware attack progression including filtering, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP offers firewall protection, penetration alarms, device control, and web filtering via leading-edge tools packaged within a single agent managed from a unified control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you prove compliance with government and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent's consultants can also assist your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables fast recovery of critical files, apps and VMs that have become unavailable or damaged as a result of hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to recover your critical information. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security vendors to deliver centralized management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be moved easily to an alternate hardware solution without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect information about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By updating and managing your IT documentation, you can save up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Every company should have a carefully thought out security program that includes both proactive processes and response plans. The pre-attack strategy is a set of steps that help to reduce security weaknesses. The reactive plan assists your company's IT security engineers to assess the impact caused by an attack, fix the damage, document the experience, and get business functions running as rapidly as feasible.

Progent's expert IS security consultants are available to assist your business to run a full vulnerability assessment and create a network security strategy to implement security processes and controls to minimize ongoing attacks and threats.

CISM Certified Information Security Support Assistance
The CISM committee describes the core competencies and international standards of performance that IT security professionals are expected to master. CISM provides business management the assurance that consultants who have qualified for their CISM certification possess the experience and capability to provide efficient security administration and consulting consulting. Progent offers the expertise of CISM Certified security professionals to help businesses with:

  • Network Security Processes
  • Risk Analysis
  • Network Security Program Management
  • Network Security Administration
  • Response Planning
Read additional information concerning Progent's CISM IS Security Engineering Professionals.

CISSP Qualified Security Consulting Expertise
The CISSP credential recognizes expertise with a worldwide standard for network security. The American National Standards Institute has awarded the CISSP credential recognition in the field of data protection defined by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn more information concerning Progent's CISSP Qualified Network Security Support Services.

CISSP-ISSAP Qualified Secure Network Architecture Consulting Services
Progent's CISSP-ISSAP Certified system architecture professionals are experts who have been awarded ISSAP status through thorough examination and significant experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more challenging demands of information system security architecture within the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read additional information about Progent's ISSAP Certified Secure Information System Architecture Support Professionals.

CISA Qualified Information System Security Auditing Engineering Assistance
The CISA credential is a globally recognized qualification that signifies expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants undergo an extensive test given by the ISACA professional association. Progent's CISA-qualified information security audit specialists can help your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Protecting Information Resources
  • Disaster Recovery Planning
Learn the details about Progent's CISA Qualified Information System Security Auditing Consulting Services.

CRISC Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management consultants can provide a variety of risk identification services including:

  • Collect data and study documentation to help identify significant risk scenarios
  • Inventory statutory, regulatory, and contractual requirements and company standards associated with your network to assess their possible influence on your strategic goals
  • Point out possible threats for your business workflows to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide seminars to make sure your stakeholders appreciate IS risk so they can contribute to your risk management program
  • Match key risk scenarios to related business procedures to help determine risk responsibility
  • Determine risk appetite with executive leadership and major stakeholders to make sure they match
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Engineering Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security professionals. GIAC's mission is to assure that an accredited security consultant has the skills appropriate to provide support in important areas of system, information, and application security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent's GIAC-qualified security audit consultants are available to assist your IT organization in the areas of:

  • Auditing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Engineer
To learn how you can get in touch with a security engineer for online or on-premises support in Maine, call 1-800-993-9400 or visit Online Computer Help.

  • CISSP Help and Support Portland, Lewiston, Bangor, ME
  • Consultants Maine
  • Firewall IT Consulting Maine
  • Integration Support Portland, ME
  • Maine Network Consulting for Firewall
  • Specialists
  • Maine - Portland, ME, Lewiston, ME, Bangor, ME, New England Firewall Technology Consulting
  • Network Consulting for CISSP Maine - Portland, ME, Lewiston, ME, Bangor, ME, New England
  • Best Online Technical Support for CISSP in Portland, ME, Lewiston, ME, Bangor, ME, New England