Company IT networks in Maryland can now get prompt and economical remote technical support from Progent's accredited security professionals to fix complex security issues. The cost is competitive, billing is by the minute, engagement is fast, and service is world class. Progent also provides assistance for complex engagements that demand the services of senior security consultants with high-level industry certifications.

In case your Maryland small business is away from major metropolitan areas such as Baltimore, Columbia, Silver Spring, or Dundalk, help from local certified network security support specialists is often limited when you have a security disaster. This could mean a drop in income for your business, angry clients, idle employees, and distracted management. By utilizing Progent's remote support, you have access to a Premier security professional who can offer help whenever you need it to get your system operating and restore your data.

Progent can help you in a variety of ways in your efforts to guard your information system with support services ranging from security assessments to creating a comprehensive security plan. Progent offers economical service to help businesses of all sizes to design and manage protected networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX or Linux operating systems plus BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security vendors to provide web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.

Progent's security consultants are accessible remotely or in person to provide a variety of urgent or longer-term computer security services such as:

If your company has an emergency need for computer security help, go to Progent's Emergency Remote Network Support.

Progent's security experts offer advanced support in key areas of computer security including security evaluation, firewall and VPN expertise, and high-level security planning.

System Audits
Progent's certified security consultants can assess the strength of your current network security environment by performing exhaustive remote automated testing via advanced software tools and tested procedures. Progent's experience in this service saves your company consulting fees and assures a detailed picture of system vulnerability. The knowledge your company is provided can be used as the basis of a security plan that will allow your information system to operate dependably and adapt rapidly to new risks.

Automated Vulnerability Audits
Progent offers consulting in the use of security evaluation utilities such as Microsoft's MBSA and GFI LANguard for affordably performing a variety of programmed system auditing scans to identify potential security vulnerabilities. Progent has broad knowledge of additional network analysis products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can show you how to design security into your business processes, install scanning software, define and deploy a secure network environment, and suggest procedures to optimize the security of your network. Progent's security professionals are able to help you configure a firewall, design secure remote access to email and data, and install VPN. Find out additional information on Progent's automated security assessment.

Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory packages designed to allow small companies to get an impartial network security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer runs a comprehensive examination of your network from outside your firewall to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a system scan from a secure machine inside your company firewall to assess the risk to internal attacks. The two security inventory services are set up and executed from a protected external location. The project is overseen by an engineer who has earned top security credentials and who produces a document that details and interprets the information captured by the scan and proposes cost-effective remediation where appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration testing is an important component of any successful network security strategy. Progentís security experts can run thorough penetration tests without the awareness of your organization's in-house network support staff. Stealth penetration checking uncovers whether existing security monitoring tools such as intrusion incident warnings and event history analysis are properly set up and actively checked. Find out additional information concerning Progent's stealth security penetration analysis consulting.

Firewalls and VPN Support
Progent's background in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important industry certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and VPN Engineering Expertise
Cisco's security and offsite connection technology represent a full line of manageable security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company objectives. Find out additional details about Progent's Engineering Expertise for Cisco Security Solutions and VPN Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select appropriate technologies from multiple vendors to achieve your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes next generation behavior-based analysis technology to guard endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to automate the entire threat lifecycle including protection, identification, containment, remediation, and post-attack forensics. Key features include single-click rollback with Windows VSS and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver economical multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via cutting-edge tools packaged within a single agent managed from a unified control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP deployment that addresses your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate action. Progent can also help your company to set up and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables fast recovery of vital files, applications and VMs that have become unavailable or corrupted due to component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to recover your critical information. Learn more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security vendors to provide web-based control and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outbound email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the system is virtualized, it can be ported easily to an alternate hardware solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard data related to your network infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time spent searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Planning
Any business should develop a carefully thought out security program that includes both proactive procedures and reaction plans. The pre-attack strategy is a collection of steps that help to reduce security weaknesses. The post-attack strategy assists your company's IT security engineers to assess the damage resulting from an attack, fix the damage, record the experience, and get the IT network operational as soon as possible.

Progent's expert information security consultants can to help you to run a comprehensive vulnerability assessment and define a company-wide security plan to implement security policies and mechanisms to minimize future attacks and threats.

CISM Accredited Network Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the basic capabilities and international standards of performance that IT security managers are required to learn. CISM gives business management the assurance that consultants who have earned their CISM certification possess the background and knowledge to deliver efficient security management and consulting services. Progent can provide the support of CISM Certified security professionals to help companies with:

  • Information Security Strategies
  • Risk Analysis
  • Information Security Implementation Management
  • Information Security Administration
  • Response Planning
Find out more information concerning Progent's CISM Certified IS Security Support Expertise.

CISSP Qualified Security Consulting Expertise
CISSP recognizes expertise with a global standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data protection defined by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Disaster Recovery Planning
Find out additional information concerning Progent's CISSP Accredited Cybersecurity Consulting Professionals.

CISSP-ISSAP Qualified Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified IT architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more challenging demands of IS security architecture within the wider field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Data Encryption Solutions
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Read additional details concerning Progent's ISSAP Certified Secure Information System Architecture Engineering Expertise.

CISA Accredited Security Auditing Consulting Assistance
The CISA credential is a recognized qualification that represents mastery in IS security auditing. Certified by ANSI, the CISA credential has consultants undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA-qualified IS security audit consultants are available to help your business in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Planning
Learn additional information about Progent's CISA Accredited Information System Security Auditing Engineering Services.

CRISC Consultants
The CRISC certification program was initiated by ISACA to validate an IT professional's ability to plan, deploy, and support IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC network risk mitigation engineers can provide a variety of risk assessment services including:

  • Collect information and review documentation to help identify significant vulnerabilities
  • Inventory statutory, industry, and business requirements and company standards associated with your network to determine their potential influence on your business goals
  • Identify possible vulnerabilities for your business workflows to assist in analyzing your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk control process
  • Connect identified risk vectors to your associated operational processes to help determine risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they align
Find out the details about Progent's CRISC Risk Management Consultants.

GIAC Qualified Security Engineering Services
GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's goal is to verify that a certified professional possesses the knowledge appropriate to deliver support in important categories of system, data, and program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit experts are available to assist your company in the areas of:

Learn additional information about Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Specialist
To find out how you can get in touch with a security consultant for online or on-premises support in Maryland, call 1-800-993-9400 or go to Remote Computer Support.