Business networks in the state of Maryland can now get fast and economical remote technical support from Progent's certified network security experts to resolve the toughest security problems. Rates are affordable, billing is by the minute, engagement is quick, and service is unbeatable. Progent also offers help for long-term engagements that demand the knowledge of senior security consultants with high-level security certifications.
If your Maryland company is based far from major urban areas such as Baltimore, Columbia, Silver Spring, or Dundalk, access to nearby certified security experts may be problematic during a crisis. This can result in a drop in productivity for your business, upset customers, unproductive workers, and distracted management. By calling Progent's remote support, you can get in touch with a Premier security consultant who can offer help when you need it to keep your computer network on line and salvage your data.
Progent can assist you in all your initiatives to defend your network with services that ranges from security audits to developing a company-wide security strategy. Progent offers economical service to assist companies of any size to configure and maintain safe networks powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems as well as mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to deliver web-based management and world-class security for your email traffic. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also enable Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's certified engineers are available remotely or on site to provide a variety of emergency or project-based computer security services such as:
If your business has an immediate requirement for IT security help, refer to Progent's Urgent Remote Technical Support.
Progent's support professionals provide world-class support in vital fields of network security including auditing, firewall and VPN solutions, and advanced security consulting.
System Security Evaluation
Progent's expert security consultants can evaluate the strength of your current computer protection environment by performing comprehensive remote automated analysis via sophisticated utilities and proven techniques. Progent's skill in administering this service saves your company money and assures an objective picture of weaknesses. The information your IT organization gains can be used as the foundation of a network protection strategy that will allow your network to operate safely and adapt quickly to new risks.
Automated Network Security Evaluation
Progent offers consulting in the use of security auditing utilities such as Microsoft's MBSA and GFI LANguard for affordably running a variety of programmed system auditing scans to uncover possible security vulnerabilities. Progent has broad knowledge of additional security analysis utilities such as NMAP, AMAP, eEye, plus utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.
Progent can help you build protection into your company operations, configure scanning tools, plan and deploy a protected network environment, and recommend policies to optimize the safety of your network. Progent's security engineers are available to help you configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's automated security assessment.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory bundles designed to allow small companies to get an independent security assessment from a certified security specialist. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive examination of your IT infrastructure from beyond your company firewall to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from an authorized computer inside your company firewall to evaluate vulnerabilities to inside threats. Both security inventory services are configured and run from a protected external site. The project is overseen by an engineer who has earned top security accreditations and who produces a report that summarizes and interprets the information captured by the security scan and proposes practical remediation if called for.
Network Intrusion Testing Consulting
Stealth penetration testing is an important part of any successful network security plan. Progent’s security professionals can run thorough intrusion tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking shows whether current security monitoring tools such as intrusion incident alerts and event log monitoring are correctly set up and consistently monitored. Find out more concerning Progent's network penetration analysis support services.
Firewall And Virtual Private Network (VPN) Support
Progent's background in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to manage your existing PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Security and Virtual Private Network Support Expertise
Cisco's security and offsite access technology represent a comprehensive line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Read more information about Progent's Support Expertise for Cisco Security Technology and VPN Products.
Consulting Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWall. Progent can show you how to design a comprehensive security plan and choose the right technologies from a variety of suppliers to support your security objectives while staying within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight ASM protects local and cloud resources and provides a single platform to address the complete threat lifecycle including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that addresses your organization's specific needs and that helps you demonstrate compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent's consultants can also help you to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of critical files, applications and virtual machines that have become lost or damaged as a result of hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading data security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and keeps most threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Since the system is virtualized, it can be ported immediately to a different hardware solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard data related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can save as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you’re making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Security Planning
Every company ought to have a thoroughly considered security program that includes both pre-attack processes and response planning. The pre-attack strategy is a set of steps that help to reduce vulnerabilities. The reactive plan assists your IT security personnel to assess the impact resulting from a security penetration, fix the damage, document the experience, and get the IT network operational as rapidly as feasible.
Progent's certified information security consultants can to help you to run a comprehensive risk evaluation and create a company-wide security plan to implement security policies and mechanisms to reduce ongoing assaults and dangers.
CISM Qualified Information Security Engineering Services
The Certified Information Security Manager (CISM) organization describes the basic competencies and global standards of skill that information security managers are expected to learn. CISM provides business management the confidence that those who have earned their CISM credential possess the experience and knowledge to provide efficient security management and consulting consulting. Progent offers the services of CISM Premier security consultants to assist companies with:
Find out additional details about Progent's CISM Qualified Information Security Engineering Professionals.
- Network Security Processes
- Risk Analysis
- Information Security Program Management
- IS Security Administration
- Recovery Management
CISSP Accredited Security Consulting Expertise
CISSP certification recognizes mastery of an international standard for network security. ANSI has granted certification accreditation in the field of information protection stipulated by ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a variety security fields such as:
Read more information about Progent's CISSP Accredited Security Consulting Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Control Systems and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP Certified network architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated skill in the more challenging requirements of information security architecture within the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-premier security consultants can assist your business with all aspects of secure network architecture such as.
Read more details about Progent's ISSAP Qualified Secure Information System Architecture Consulting Professionals.
- Access Management Systems and Techniques
- Telecommunications and Network Infrastructure Protection
- Data Encryption Solutions
- Needs Evaluation and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor credential is a recognized achievement that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive examination given by the ISACA professional association. Progent's CISA IS security audit engineers can help your company in the areas of:
Find out more details concerning Progent's CISA Qualified Network Security Auditing Consulting Services.
- IS Audit Process
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Protecting Data Resources
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's skills to design, implement, and maintain information system controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk mitigation experts can provide a range of risk evaluation services including:
Learn additional details about Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to identify major risk scenarios
- Inventory legal, industry, and business requirements and organizational policies associated with your information system to determine their possible influence on your strategic goals
- Point out possible vulnerabilities for your business workflows to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct training to ensure your organization understand information system risk so they can contribute to your risk management program
- Match identified risk vectors to related business procedures to help determine risk responsibility
- Determine risk appetite with executive management and major stakeholders to make sure they match
GIAC Certified IS Security Engineering Support
Read additional information concerning Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to make sure that an accredited professional possesses the skills necessary to deliver support in important areas of network, data, and program security. GIAC certifications are recognized by businesses and government organizations throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified information security audit consultants can help your IT organization in the areas of:
Get in Touch with a Security Engineer
To find out how you can contact a certified Progent security consultant for online or on-premises support in Maryland, phone 1-800-993-9400 or visit Remote Computer Support.