Small business computer networks in Maryland now have prompt and affordable remote help from Progent's accredited security experts to help with the toughest security problems. Rates are competitive, charges are by the minute, engagement is quick, and service is unbeatable. Progent also offers assistance for complex projects that demand the expertise of senior security engineers with high-level security certifications.

In case your Maryland small business is situated away from more populated metropolitan areas like Baltimore, Columbia, Silver Spring, or Dundalk, help from local qualified security professionals could be limited when there's an urgent situation. This could mean a loss of productivity for your company, angry customers, idle workers, and distracted executives. By contacting Progent's online services, you can get in touch with a Certified security professional ready to provide assistance whenever you require it to get your system operating and restore your data.

Progent can assist you in your initiatives to defend your information system with services that ranges from security assessments to developing a comprehensive security strategy. Progent offers economical service to help companies of any size to configure and maintain protected IT environments powered by Windows and Cisco products and that may include computers running UNIX or Linux platforms as well as BYOD users with Apple handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that incorporates the technology of top data security companies to deliver centralized control and world-class security for all your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your exposure to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a deeper level of inspection for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.

Progent's certified professionals are accessible online or in person to offer a variety of emergency or longer-term network security services including:

  • Run thorough security audits
  • Clean up quickly after virus and worm attacks
  • Install and troubleshoot firewalls
  • Configure safe techniques for remote and mobile access
  • Install effective applications for protection against spam and directory harvest attacks
  • Develop a company-wide security strategy with 24x7 monitoring
  • Offer comprehensive Help Desk Call Center Support
  • Help Develop an effective data backup and disaster recovery solution built around Microsoft DPM automated backup technology
If your network has an immediate requirement for IT security help, go to Progent's Emergency Remote Network Help.

Progent's consultants provide advanced services in key fields of system security that include analysis, firewalls and VPN, and high-level security consulting.

Security Assessment
Progent's certified security engineers can assess the effectiveness of your existing computer protection systems by performing comprehensive remote automated testing based on advanced software tools and tested procedures. Progent's skill in administering this service saves you money and assures an objective picture of weaknesses. The knowledge your business is provided can form the basis of a network protection plan that can permit your information system to run safely and respond rapidly to new risks.

Automated Network Security Evaluation
Progent provides consulting in the application of security evaluation products including Microsoft's MBSA and LANguard from GFI for affordably running a variety of automatic system auditing scans to identify possible security vulnerabilities. Progent has extensive experience with other network analysis products including NMAP, AMAP, eEye, as well as utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can help you build protection into your business operations, install auditing tools, define and deploy a secure system environment, and recommend procedures to maximize the security of your IT system. Progent's security engineers are able to assist you to configure a firewall, implement secure remote access to email and business applications, and install VPN. Find out additional information about Progent's automated security analysis.

Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to enable small companies to receive a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a network scan from a secure computer inside your company firewall to determine the risk to internal attacks. Both security inventory services are set up and executed from a protected external site. The process is directed by a consultant with high-level security credentials and who generates a document that summarizes and analyzes the information captured by the scan and proposes cost-effective remediation where appropriate.

Network Intrusion Analysis Consulting
Stealth intrusion testing is an important part of any successful network security strategy. Progentís security professionals can perform thorough intrusion checks without the awareness of your company's internal IT resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion incident alerts and event log analysis are properly configured and actively monitored. Learn more about Progent's stealth penetration testing consulting.

Firewall/VPN Solutions
Progent's expertise in network security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and remote connection technology offer a full range of manageable security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Read additional details concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security plan and select appropriate technologies from a variety of vendors to support your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis tools to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely escape traditional signature-based AV products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to automate the entire malware attack lifecycle including protection, detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within one agent managed from a unified console. Progent's security and virtualization experts can help your business to design and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with government and industry information security regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent can also help you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical data, applications and VMs that have become unavailable or corrupted as a result of hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced support to configure ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your business-critical information. Find out more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top information security vendors to deliver web-based control and comprehensive protection for your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's onsite gateway device adds a further level of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Since the system is virtualized, it can be ported easily to a different hardware environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save as much as 50% of time spent searching for critical information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Design
Any company ought to develop a thoroughly thought out security strategy that includes both pre-attack processes and response plans. The pre-attack strategy is a set of procedures that help to reduce vulnerabilities. The reactive strategy helps your network security engineers to evaluate the damage caused by an attack, fix the damage, document the experience, and get the IT network running as quickly as feasible.

Progent's certified IS security consultants can to help your business to run a comprehensive vulnerability assessment and define a company-wide security plan to establish security policies and controls to minimize ongoing assaults and dangers.

CISM Qualified Security Support Services
The CISM committee describes the basic capabilities and international standards of skill that IT security professionals are expected to learn. It provides executive management the assurance that consultants who have qualified for their CISM credential possess the background and knowledge to provide efficient security management and consulting services. Progent offers the support of CISM Certified security consultants to assist companies with:

  • Information Security Governance
  • Risk Analysis
  • Information Security Implementation Management
  • Information Security Management
  • Recovery Planning
Read more details about Progent's CISM Security Consulting Expertise.

CISSP Qualified Security Engineering Services
CISSP certification recognizes expertise with a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the field of information security stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Read additional information about Progent's CISSP Accredited Network Security Consulting Professionals.

CISSP-ISSAP Qualified Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP Certified system architecture engineers are experts who have earned ISSAP status as a result of thorough testing and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the most complex demands of information system security architecture within the broader field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Phone System and System Infrastructure Security
  • Data Encryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more details concerning Progent's ISSAP Qualified Secure System Architecture Support Services.

CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a globally recognized achievement that indicates mastery in IS security auditing. Certified by ANSI, the CISA accreditation has candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA IS security audit consultants are available to help your company with:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Safeguarding Information Resources
  • Disaster Recovery Preparedness
Read more details about Progent's CISA Accredited Security Auditing Engineering Expertise.

CRISC Experts
The CRISC certification program was established by ISACA in 2010 to validate a consultant's skills to design, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management engineers offer a range of risk identification services such as:

  • Collect data and review documentation to help identify significant risk scenarios
  • Inventory statutory, industry, and contractual requirements and company policies related to your network to assess their potential influence on your strategic objectives
  • Point out possible threats for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk control process
  • Match identified risk scenarios to related operational processes to help determine risk responsibility
  • Validate risk tolerance with executive leadership and key stakeholders to ensure they are in agreement
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Network Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security experts. GIAC's goal is to verify that an accredited security consultant has the skills necessary to deliver support in vital categories of network, information, and application software security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC information security audit engineers can assist your IT organization in the areas of:

Learn more details about Progent's GIAC Information Assurance Support.

Talk to a Certified Progent Security Specialist
To find out how to contact a certified security engineer for online or on-premises help in Maryland, phone 1-800-993-9400 or go to Remote Computer Support.