Company information networks in the state ofMainecan have prompt and economical remote help from Progent's accredited security professionals to fix complex security problems. Rates are reasonable, billing is per minute, engagement is quick, and support is unbeatable. Progent also provides assistance for complex engagements that requires the services of seasoned security engineers with top security credentials.
In case yourMainecompany is away from major metropolitan areas includingPortland, Lewiston, or Bangor, support from nearby qualified security consultants could be limited when you have a security disaster. This could mean a drop in revenue for your business, upset customers, unproductive employees, and defocused executives. By utilizing Progent, you have access to a Premier security engineer ready to provide assistance whenever you have to have it to keep your information system operating and salvage your information.
Progent can help you in all your efforts to guard your IT environment with support that ranges from security audits to developing a comprehensive security strategy. Progent offers economical service to help companies of any size to configure and manage safe IT environments based on Windows and Cisco technology and that may include computers running UNIX or Linux operating systems plus BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver centralized management and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further level of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.
Progent's certified professionals are accessible online or on premises to offer a variety of urgent or longer-term computer security services including:
If your business has an emergency requirement for computer security support, refer to Progent's Emergency Online Network Support.
- Run thorough security evaluations
- Recover rapidly after virus and worm attacks
- Configure effective firewalls
- Implement safe methods for offsite and mobile connectivity
- Install advanced applications for automatic defense against spam and directory harvest attacks
- Help create a company-wide security plan with proactive security monitoring
- Provide outsourced Call Center Services
- Create a practical data backup and disaster recovery strategy centered on Data Protection Manager backup/restore capability
Progent's support professionals can deliver world-class support in key facets of system protection including security evaluation, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can evaluate the vulnerability of your current computer protection implementation by performing exhaustive remote automated testing based on advanced utilities and tested techniques. Progent's skill in this testing saves your company time and money and offers an accurate picture of security holes. The information your IT organization is provided can make up the foundation of a security plan that will allow your network to operate dependably and adapt rapidly to new risks.
Automated Vulnerability Evaluation
Progent provides consulting in the use of security evaluation packages including Microsoft Baseline Security Analyzer and GFI LANguard for affordably running a variety of programmed system auditing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of other network auditing products including NMAP Port Scanner, AMAP, eEye, as well as tools such as Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can show you how to design security into your business processes, configure scanning software, plan and deploy a protected system environment, and recommend policies to maximize the safety of your IT system. Progent's security professionals are able to help you configure a firewall, implement secure remote connectivity to email and business applications, and install VPN. Learn more about Progent's network security audits.
Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory scanning packages intended to allow small businesses to receive an independent network security assessment from an accredited security specialist. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your IT infrastructure from beyond your company firewall to uncover potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from an authorized computer within your firewall to determine the risk to inside threats. The two security inventory packages are set up and executed from a secured external site. The process is overseen by a consultant with high-level security credentials and who produces a document that details and interprets the information collected by the security scan and proposes cost-effective improvements if called for.
Stealth Penetration Analysis Support Services
Stealth penetration testing is a key component of any serious network security strategy. Progentís security experts can run thorough penetration tests without the awareness of your company's in-house IT staff. Stealth penetration testing uncovers whether current security defense tools such as intrusion detection alerts and event log analysis are properly configured and consistently checked. Learn additional information about Progent's stealth security penetration analysis support services.
Progent's background in network security technology includes extensive field work with leading firewalls and VPN technology from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key industry accreditations such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower Services integration and troubleshooting support.
Cisco Security and Virtual Private Network Support Services
Cisco's network security and offsite connection products provide a comprehensive range of manageable security products to help protect your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Find out additional details about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.
Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWall. Progent can help you design a comprehensive security plan and choose the right technologies from multiple suppliers to support your security objectives while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis technology to defend endpoint devices and physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely escape traditional signature-based AV products. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to automate the complete malware attack progression including filtering, detection, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver affordable in-depth security for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that meets your organization's specific needs and that helps you achieve and demonstrate compliance with government and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent's consultants can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid recovery of critical data, apps and virtual machines that have become lost or corrupted due to component failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR consultants can provide world-class expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPAA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading data security vendors to provide web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most threats from reaching your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage. Email Guard's onsite security gateway device adds a further layer of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported easily to an alternate hardware solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect information related to your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can eliminate up to half of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Security Design
Any company ought to have a carefully thought out security program that includes both proactive procedures and response plans. The proactive plan is a set of mechanisms that help to reduce security weaknesses. The post-attack strategy helps your network security personnel to evaluate the damage resulting from a security penetration, repair the damage, document the experience, and get the IT network restored as soon as possible.
Progent's certified IT security consultants can to assist your company to run a complete risk assessment and create a computer security plan to implement security policies and mechanisms to reduce future assaults and threats.
CISM Qualified Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and international standards of performance that information security professionals are required to master. It gives executive management the assurance that those who have qualified for their CISM credential have the background and capability to deliver effective security administration and support services. Progent can provide the services of CISM Premier security professionals to assist businesses with:
Find out additional information concerning Progent's CISM Certified Network Security Engineering Expertise.
- Network Security Strategies
- Vulnerability Management
- IS Security Implementation Management
- Network Security Administration
- Recovery Planning
CISSP Certified Security Engineering Support
CISSP certification recognizes expertise with an international standard for data security. ANSI has granted the CISSP credential recognition in the field of information protection under ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security fields such as:
Read more information concerning Progent's CISSP Security Consulting Expertise.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have earned ISSAP status through rigorous examination and extensive experience with network security architecture. The ISSAP credential represents proven mastery in the most complex requirements of IS security architecture within the broader field of information security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all aspects of architecture security such as.
Read more details about Progent's ISSAP Qualified Secure System Architecture Support Professionals.
- Access Control Systems and Techniques
- Telecommunications and Network Protection
- Cryptography Solutions
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a recognized qualification that represents mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA security audit engineers can help your company with:
Get additional details about Progent's CISA Accredited Security Auditing Engineering Support.
- IS Audit Services
- IT Governance
- Network Assets and Architecture Lifecycle
- IT Service Delivery
- Protecting Information Assets
- Business Continuity Planning
The CRISC program was initiated by ISACA in 2010 to validate a consultant's skills to plan, deploy, and support information system controls to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to create and carry out a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts can provide a range of risk identification services such as:
Get more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and review documentation to identify significant risk scenarios
- Identify statutory, regulatory, and business requirements and company policies associated with your information system to assess their possible influence on your strategic goals
- Point out potential threats for your operational processes to assist in evaluating your corporate risk
- Create a risk awareness program and conduct seminars to make sure your stakeholders understand IS risk so they can assist with your risk management process
- Connect key risk vectors to your associated business processes to help assign risk ownership
- Determine risk appetite with executive leadership and key stakeholders to make sure they are in agreement
GIAC Accredited IS Security Engineering Support
Learn more details about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security experts. GIAC's mission is to verify that a certified professional possesses the skills needed to provide support in vital areas of network, data, and application program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified IS security audit experts can help your company with:
Get in Touch with a Security Specialist
To learn how you can contact a Progent security consultant for remote or onsite assistance in Maine, phone 1-800-993-9400 or visit Remote Computer Help.