Company networks in the state of Maine now have fast and economical online access to Progent's accredited network security engineers to assist with urgent security problems. Rates are reasonable, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also offers assistance for complex projects that demand the expertise of seasoned security engineers with high-level industry credentials.
If your Maine business is based far from larger urban areas like Portland, Lewiston, or Bangor, help from nearby certified network security professionals may be problematic during an urgent situation. This could mean a drop in productivity for your company, angry customers, unproductive workers, and defocused executives. By contacting Progent's remote support, you can get in touch with a Certified security professional ready to offer assistance whenever you need it to keep your computer network running and recover your information.
Progent can assist you in all your efforts to protect your information system with support that can range from network security assessments to creating a comprehensive security plan. Progent provides economical support to assist companies of any size to set up and maintain protected IT environments powered by Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also help you outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver centralized management and world-class protection for all your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, DLP, and encryption. The local gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.
Progent's security consultants are accessible online or on site to provide a variety of urgent or longer-term computer security services which include:
If your business has an urgent need for IT security help, refer to Progent's Emergency Online Network Support.
Progent's support professionals can deliver world-class support in vital areas of network protection that include security assessment, firewall/VPN support, and high-level security planning.
System Security Evaluation
Progent's expert security engineers can assess the effectiveness of your existing computer protection systems through exhaustive remote automated testing based on sophisticated utilities and proven techniques. Progent's experience in administering this service saves your company time and money and offers a detailed picture of gaps. The knowledge your company gains can make up the foundation of a network protection strategy that will allow your information system to run dependably and respond rapidly to new risks.
Automated Network Security Analysis
Progent offers expertise in the use of security analysis software such as Microsoft's MBSA and GFI LANguard NSS for affordably performing a set of automatic system testing checks to identify possible security holes. Progent has broad experience with other network auditing utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools like SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.
Progent can show you how to design protection into your business processes, install auditing tools, plan and deploy a protected system architecture, and suggest policies to optimize the safety of your IT system. Progent's security engineers are available to assist you to configure a firewall, design safe remote access to email and data, and install virtual private network. Find out additional information about Progent's automated security evaluation.
Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory packages designed to enable small companies to get an impartial security evaluation from an accredited security expert. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your network from outside your firewall to determine potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a system scan from an authorized machine within your firewall to uncover the risk to internal assaults. Both security inventory services are configured and run from a protected external location. The process is directed by an engineer with top security accreditations and who produces a document that summarizes and interprets the data collected by the security scan and proposes cost-effective improvements where appropriate.
Network Security Penetration Testing Support Services
Stealth intrusion checking is an important component of any successful network security strategy. Progentís security experts can run thorough penetration tests without the knowledge of your company's internal network support staff. Stealth penetration testing shows whether current security defense systems such as intrusion incident alerts and event history monitoring are correctly configured and actively monitored. Learn additional information concerning Progent's stealth penetration testing support services.
Progent's background in network security solutions encompasses extensive field work with major firewalls and VPN products from multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your current PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Network Security and VPN Consulting Expertise
Cisco's security and remote access technology provide a comprehensive line of manageable security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Learn additional details about Progent's Engineering Expertise for Cisco Security Solutions and VPN Appliances.
Engineering Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWall. Progent can help you create a comprehensive security strategy and select appropriate technologies from a variety of suppliers to achieve your security objectives while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior analysis tools to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape legacy signature-matching AV products. ProSight ASM protects local and cloud-based resources and provides a unified platform to address the complete malware attack progression including filtering, infiltration detection, containment, remediation, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge tools incorporated within one agent managed from a unified console. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP deployment that addresses your organization's unique needs and that allows you demonstrate compliance with government and industry data security regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent's consultants can also help you to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end service for secure backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, apps and VMs that have become lost or damaged due to component failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can deliver world-class support to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when needed, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security companies to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hosting environment without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can save up to half of time thrown away searching for vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Expert Security Consulting
Any company ought to develop a carefully thought out security program that includes both proactive procedures and response planning. The pre-attack plan is a collection of steps that help to reduce vulnerabilities. The reactive plan helps your IT security engineers to evaluate the damage caused by an attack, repair the damage, record the event, and get business functions restored as rapidly as feasible.
Progent's expert IS security engineers are available to assist your business to run a comprehensive risk evaluation and define a network security strategy to establish security policies and controls to reduce future attacks and dangers.
CISM Accredited System Security Support Expertise
The CISM committee defines the basic competencies and worldwide standards of performance that information security professionals are expected to master. It provides business management the confidence that consultants who have qualified for their CISM certification have the background and capability to deliver efficient security administration and consulting services. Progent offers the expertise of CISM Certified security consultants to assist companies with:
Read additional information about Progent's CISM Certified Information Security Support Professionals.
- Network Security Processes
- Risk Management
- Information Security Program Management
- Network Security Management
- Response Planning
CISSP Certified Security Engineering Expertise
CISSP certification recognizes expertise with a global standard for information security. ANSI has granted certification accreditation in the field of information protection defined by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields such as:
Learn additional details about Progent's CISSP Qualified Information Security Support Expertise.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure Network Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have been awarded ISSAP Certification through thorough examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the more in-depth requirements of IS security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-premier security specialists can help your business with all aspects of secure network architecture including.
Learn additional information concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Services.
- Access Control Systems and Methodologies
- Telecommunications and Network Infrastructure Security
- Cryptography Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Physical Security
CISA Certified Security Auditing Engineering Support
The Certified Information Systems Auditor credential is a globally recognized qualification that signifies expertise in information system security auditing. Certified by ANSI, the CISA credential requires that consultants undergo a comprehensive test given by the ISACA professional group. Progent's CISA IS security audit experts are available to help your business in the areas of:
Learn the details about Progent's CISA Certified Information System Security Auditing Consulting Services.
- IS Audit Process
- Information Technology Governance
- Network Assets and Architecture Planned Useful Life
- IT Service Delivery
- Protecting Data Assets
- Disaster Recovery Planning
The CRISC certification program was established by ISACA in 2010 to validate a consultant's ability to plan, implement, and support IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a business continuity strategy that follows leading practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC IT risk mitigation consultants offer a variety of risk assessment services such as:
Learn the details concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to help identify significant vulnerabilities
- Inventory statutory, regulatory, and contractual mandates and organizational policies associated with your information system to assess their possible impact on your strategic goals
- Point out possible threats for your operational workflows to help in evaluating your enterprise risk
- Create a risk awareness program and provide training to make sure your organization appreciate IS risk so they can contribute to your risk management program
- Match key risk vectors to related operational processes to help determine risk responsibility
- Validate risk tolerance with your senior management and key stakeholders to make sure they are in agreement
GIAC Certified IS Security Engineering Assistance
GIAC was founded in 1999 to validate the knowledge of network security engineers. GIAC's goal is to make sure that an accredited professional has the knowledge appropriate to provide services in key areas of network, information, and application security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified security audit experts are available to assist your company with:
Learn more information concerning Progent's GIAC Information Assurance Services.
- Assessing Security Systems
- Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Specialist
To find out how to get in touch with a Progent security engineer for remote or onsite support in Maine, call 1-800-993-9400 or go to Remote Computer Help.