Business computer networks inMainecan depend on fast and affordable online technical support from Progent's qualified security professionals to resolve urgent security issues. The cost is competitive, billing is per minute, sign-up is fast, and service is unbeatable. Progent also offers assistance for long-term engagements that demand the knowledge of seasoned security consultants with top industry credentials.
If yourMainebusiness is far from major urban neighborhoods includingPortland, Lewiston, or Bangor, access to local qualified security consultants is often limited when you have an urgent situation. This could mean a drop in income for your business, angry customers, idle workers, and defocused executives. By calling Progent, you have access to a Certified security engineer ready to deliver expertise whenever you require it to keep your network on line and salvage your information.
Progent can assist you in a variety of ways in your efforts to protect your IT environment with services that ranges from security checks to developing a company-wide security strategy. Progent offers economical service to help small and midsize companies to configure and maintain secure IT environments based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security vendors to deliver centralized management and world-class security for all your email traffic. The hybrid structure of Email Guard combines cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter.
Progent's security engineers are accessible remotely or on site to provide a variety of emergency or project-based computer security services such as:
If your business has an immediate need for IT security support, refer to Progent's Emergency Online Network Support.
- Run extensive network security evaluations
- Clean up promptly after serious security breaches
- Configure hardware and software firewalls
- Configure secure techniques for offsite and mobile access
- Install effective software for automatic defense against viruses, spam and directory harvest attacks
- Develop a comprehensive security plan with proactive monitoring
- Offer comprehensive Help Desk Support
- Develop a practical data backup and disaster recovery solution built around Microsoft DPM backup capability
Progent's security experts offer advanced support in key fields of network security that include analysis, firewall and VPN solutions, and high-level security planning.
Progent's certified security consultants can assess the strength of your existing computer security implementation by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's experience in administering this service saves you consulting fees and offers a detailed picture of weaknesses. The information your IT organization gains can make up the foundation of a security strategy that can permit your information system to run dependably and respond rapidly to future threats.
Automated Network Security Audits
Progent provides consulting in the use of security testing packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a set of automatic network testing checks to identify potential security gaps. Progent has broad knowledge of additional network auditing products such as NMAP, AMAP Application Scanner, eEye, as well as utilities such as Metasploit, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.
Progent can help you build security into your company processes, install scanning applications, define and implement a secure network architecture, and suggest procedures to maximize the security of your network. Progent's security engineers are available to show you how to configure a firewall, design secure remote access to email and business applications, and integrate VPN. Learn more on Progent's automated security assessment.
Security Inventory Scanning Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles intended to enable small companies to receive a professional network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from outside your firewall to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized machine inside your firewall to evaluate vulnerabilities to inside threats. The two security inventory services are set up and run from a protected remote location. The process is overseen by an engineer with top security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and suggests practical remediation where called for.
Stealth Security Penetration Analysis Consulting
Stealth intrusion testing is an important part of any comprehensive network security strategy. Progentís security professionals can run extensive penetration checks without the knowledge of your company's internal network support resources. Unannounced penetration testing shows whether current security defense tools such as intrusion incident warnings and event log monitoring are properly configured and actively checked. Learn more concerning Progent's stealth penetration analysis support services.
Firewalls and VPN Support
Progent's background in security solutions includes extensive field work with leading firewalls and Virtual Private Network technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.
Cisco Network Security and VPN Engineering Services
Cisco's network security and offsite connection technology offer a full line of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco CCIE and CCNP certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Find out more information about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Appliances.
Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWall. Progent can show you how to create a comprehensive security plan and select the right technologies from a variety of vendors to support your security objectives while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the complete threat progression including blocking, infiltration detection, containment, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint management, and web filtering via cutting-edge tools incorporated within a single agent accessible from a unified control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP deployment that addresses your company's specific requirements and that allows you demonstrate compliance with legal and industry information protection regulations. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate action. Progent can also help you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates your backup processes and allows fast restoration of vital files, apps and virtual machines that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can deliver world-class support to configure ProSight DPS to to comply with regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your critical data. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security vendors to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSL certificates or warranties. By updating and managing your network documentation, you can eliminate as much as half of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require when you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Security Planning
Every company ought to have a carefully thought out security strategy that includes both proactive procedures and reaction plans. The pre-attack plan is a collection of procedures intended to reduce vulnerabilities. The reactive strategy assists your network security personnel to assess the damage resulting from a security penetration, fix the system, document the event, and get the IT network restored as rapidly as feasible.
Progent's certified information security consultants are available to help your business to run a complete vulnerability evaluation and create a network security strategy to establish security processes and controls to minimize ongoing attacks and dangers.
CISM Qualified System Security Engineering Expertise
The CISM committee describes the core competencies and worldwide standards of performance that information security professionals are expected to learn. CISM provides executive management the confidence that those who have earned their CISM certification have the background and capability to deliver efficient security management and support consulting. Progent offers the support of CISM Premier security consultants to help companies with:
Find out more details about Progent's CISM Network Security Consulting Professionals.
- Information Security Governance
- Vulnerability Analysis
- IS Security Implementation Management
- Information Security Management
- Response Management
CISSP Qualified Security Consulting Assistance
CISSP denotes mastery of a global standard for network security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information security stipulated by ISO 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields including:
Learn additional information about Progent's CISSP Qualified Cybersecurity Consulting Professionals.
- Security Management Practices
- Security Infrastructure and Models
- Access Management Systems and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have been awarded ISSAP status through rigorous testing and significant work with network security architecture. The ISSAP credential indicates proven mastery in the most complex demands of IS security architecture bounded by the wider field of information security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security including.
Find out more information concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Professionals.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Data Encryption Options
- Needs Evaluation and Security Criteria
- Business Continuity Planning (BCP) and DRP
- Site Security
CISA Qualified Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is a recognized achievement that represents mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass a comprehensive examination administered by the ISACA international professional group. Progent's CISA-certified network security audit experts are available to assist your IT organization in the areas of:
Find out additional information about Progent's CISA Certified IS Security Auditing Consulting Expertise.
- Information Systems Audit Services
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle Planning
- IT Support
- Protecting Information Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity strategy based on leading practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists offer a range of risk assessment services including:
Get additional information about Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to evaluate significant vulnerabilities
- Identify statutory, regulatory, and contractual requirements and company standards associated with your information system to determine their potential influence on your business objectives
- Point out potential vulnerabilities for your operational processes to assist in evaluating your enterprise risk
- Create a risk awareness initiative and provide training to make sure your organization understand IS risk so they can contribute to your risk management program
- Connect key risk vectors to your associated business processes to help determine risk responsibility
- Validate risk tolerance with your senior management and key stakeholders to make sure they match
GIAC Qualified Security Engineering Services
Learn more details about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security engineers. GIAC's mission is to make sure that an accredited security consultant possesses the skills appropriate to deliver services in critical areas of system, information, and program security. GIAC certifications are recognized by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified network security audit specialists are available to assist your business with:
Talk to a Progent Security Engineer
To find out how you can access a certified Progent security engineer for remote or on-premises support in Maine, call 1-800-993-9400 or visit Remote Computer Help.