Small business IT networks in the state ofMainecan now get quick and affordable online help from Progent's qualified network security engineers to resolve urgent security problems. The cost is affordable, billing is per minute, engagement is fast, and support is unbeatable. Progent also offers help for long-term projects that requires the expertise of seasoned security engineers with top security credentials.
If yourMaineorganization is based far from more populated metropolitan areas includingPortland, Lewiston, or Bangor, the availability of nearby accredited security engineers is often limited when there's a security disaster. This could mean a drop in revenue for your business, angry customers, idle employees, and defocused management. By utilizing Progent, you have access to a Certified security professional ready to provide assistance whenever you have to have it to get your information system on line and recover your information.
Progent can assist you in a variety of ways in your efforts to protect your network with support services that can range from security assessments to developing a company-wide security plan. Progent provides affordable support to assist businesses of all sizes to set up and maintain protected networks based on Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of top information security vendors to provide centralized control and world-class security for your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's certified engineers are available online or in person to offer a range of urgent or longer-term IT security services including:
If your business has an urgent need for IT security help, go to Progent's Urgent Online Technical Support.
- Run thorough security evaluations
- Recuperate rapidly after virus and worm attacks
- Set up and troubleshoot firewalls
- Configure secure techniques for remote and mobile access
- Deploy advanced solutions for automatic protection against spam and DHAs
- Develop a comprehensive security strategy with 24x7 monitoring
- Offer outsourced Call Center Services
- Help Develop an effective data backup and disaster recovery solution built around Data Protection Manager (DPM) backup technology
Progent's engineers offer advanced support in key areas of network security including analysis, firewall/VPN support, and high-level security consulting.
Progent's expert security consultants can evaluate the strength of your current computer protection implementation through comprehensive remote automated testing based on advanced utilities and tested procedures. Progent's skill in administering this service saves you time and money and offers an accurate picture of security holes. The knowledge your business gains can form the basis of a network protection plan that can allow your network to run safely and respond rapidly to future threats.
Automated Network Vulnerability Evaluation
Progent provides expertise in the application of security auditing software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a variety of automatic network testing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of other security analysis products including NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand testing reports and react appropriately.
Progent can show you how to design protection into your business operations, configure auditing applications, define and deploy a protected network environment, and recommend policies to optimize the security of your IT system. Progent's security engineers are able to help you set up a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out more about Progent's automated security assessment.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory and evaluation bundles designed to enable small businesses to receive an objective network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive test of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a system scan from a secure computer inside your firewall to determine vulnerabilities to internal threats. The two security inventory services are set up and executed from a secured external location. The process is managed by an engineer who has earned high-level security credentials and who produces a report that summarizes and interprets the information captured by the security scan and proposes practical remediation if appropriate.
Network Penetration Testing Support Services
Stealth intrusion testing is a key component of any serious IT system security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your company's in-house IT resources. Unannounced penetration checking uncovers whether current security monitoring tools such as intrusion detection alerts and event log monitoring are correctly configured and consistently monitored. Find out more on Progent's stealth security penetration testing support services.
Firewalls and VPN Support
Progent's background in security technology encompasses extensive familiarity with leading firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Security and Virtual Private Network Consulting Services
Cisco's security and remote connection technology represent a complete range of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Learn more details about Progent's Engineering Expertise for Cisco Security and VPN Appliances.
Support Services for Other Firewall and VPN Products
Progent provides small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security strategy and choose the right products from multiple suppliers to support your security goals while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to defend endpoint devices and servers and VMs against new malware attacks like ransomware and email phishing, which routinely get by traditional signature-based anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to manage the entire malware attack progression including blocking, detection, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services deliver affordable multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint control, and web filtering through cutting-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization experts can help your business to design and configure a ProSight ESP environment that addresses your company's specific needs and that allows you demonstrate compliance with government and industry information protection standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent can also assist you to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical data, applications and virtual machines that have become lost or corrupted as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver advanced support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide centralized control and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a further layer of inspection for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to half of time spent searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every business should develop a carefully considered security strategy that incorporates both proactive procedures and response planning. The pre-attack plan is a collection of mechanisms that help to reduce vulnerabilities. The post-attack plan helps your company's IT security engineers to assess the damage resulting from a security penetration, fix the damage, record the experience, and get business functions operational as rapidly as feasible.
Progent's certified IS security consultants can to help you to run a full risk evaluation and define a computer security strategy to implement security policies and controls to reduce future assaults and threats.
CISM Qualified Network Security Support Expertise
The CISM organization defines the basic capabilities and worldwide standards of performance that IT security professionals are required to learn. It provides business management the assurance that consultants who have qualified for their CISM certification possess the experience and knowledge to deliver effective security management and consulting services. Progent can provide the expertise of CISM Certified security professionals to assist companies with:
Learn additional details about Progent's CISM Qualified IS Security Engineering Services.
- IS Security Processes
- Risk Analysis
- IS Security Implementation Management
- Network Security Management
- Response Management
CISSP Qualified Security Engineering Expertise
CISSP certification denotes expertise with an international standard for information security. ANSI has granted certification accreditation in the area of information protection defined by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your organization in a broad range of security fields including:
Read additional information concerning Progent's CISSP-certified Cybersecurity Consulting Expertise.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP Premier network architecture professionals are experts who have earned ISSAP Certification as a result of rigorous testing and significant experience with information security design. The ISSAP certification indicates demonstrated mastery in the most complex requirements of information system security architecture bounded by the wider scope of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of architecture security including.
Find out more information concerning Progent's ISSAP Accredited Secure System Architecture Engineering Professionals.
- Access Management Systems and Techniques
- Telecom and System Infrastructure Protection
- Encryption/Decryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Certified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive examination administered by the ISACA international professional association. Progent's CISA-certified IS security audit engineers can help your IT organization in the areas of:
Find out additional details about Progent's CISA Certified IS Security Auditing Consulting Support.
- Information Systems Audit Process
- IT Enforcement
- Systems and Architecture Lifecycle
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Preparedness
The CRISC certification program was established by ISACA to verify an IT professional's skills to plan, deploy, and support IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk management consultants offer a variety of risk assessment services including:
Read more details concerning Progent's CRISC Risk Management Consultants.
- Collect information and study documentation to evaluate significant vulnerabilities
- Identify legal, regulatory, and contractual mandates and company standards associated with your information system to assess their potential influence on your business goals
- Identify potential threats for your operational workflows to assist in evaluating your enterprise risk
- Create a risk awareness program and provide training to ensure your stakeholders understand IS risk so they can assist with your risk control program
- Match key risk vectors to your associated operational procedures to help assign risk responsibility
- Validate risk tolerance with executive leadership and key stakeholders to ensure they align
GIAC Accredited Information System Security Consulting Expertise
Learn more details concerning Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was established in 1999 to validate the skill of computer security professionals. GIAC's goal is to verify that an accredited security consultant has the knowledge needed to deliver support in vital categories of system, information, and software security. GIAC certifications are recognized by companies and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC security audit specialists are available to assist your company in the areas of:
Get in Touch with a Security Expert
To find out how to access a certified Progent security engineer for remote or onsite expertise in Maine, call 1-800-993-9400 or go to Remote Network Help.