Company networks in Maryland now have fast and affordable online access to Progent's accredited security consultants to help with urgent security issues. The cost is competitive, charges are by the minute, engagement is fast, and service is world class. Progent also provides assistance for long-term projects that demand the expertise of seasoned security consultants with high-level industry certifications.

In case your Maryland company is located some distance from larger urban areas such as Baltimore, Columbia, Silver Spring, or Dundalk, support from local certified security experts could be problematic during a crisis. This could mean lost income for your company, angry clients, unproductive workers, and defocused management. By utilizing Progent's online services, you can get in touch with a Premier security professional ready to offer help whenever you require it to keep your information system on line and salvage your data.

Progent can help you in a variety of ways in your efforts to protect your information system with support ranging from network security checks to creating a comprehensive security strategy. Progent offers affordable service to help companies of any size to configure and manage protected networks based on Microsoft Windows and Cisco products and that may include computers running UNIX or Linux platforms plus BYOD users with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security vendors to provide web-based control and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a further level of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, DLP, and encryption. The local gateway can also enable Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

Progent's certified engineers are accessible remotely or in person to offer a range of urgent or project-based IT security services which include:

  • Run comprehensive network security evaluations
  • Recover quickly after serious security breaches
  • Configure firewalls from multiple vendors
  • Configure secure solutions for remote and mobile connectivity
  • Install effective software for protection against spam and DHAs
  • Help create a comprehensive security strategy with proactive network monitoring
  • Offer outsourced Call Center Support
  • Develop a practical backup and recovery plan built around Data Protection Manager automated backup technology
If your network has an emergency requirement for computer security support, refer to Progent's Emergency Online Network Support.

Progent's engineers offer world-class services in vital facets of computer protection that include security assessment, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's expert security engineers can assess the vulnerability of your existing computer protection systems through comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's skill in administering this testing saves you time and money and assures a detailed portrayal of security holes. The information your business gains can be used as the basis of a security strategy that will permit your information system to operate dependably and adapt rapidly to new risks.

Automated Network Vulnerability Audits
Progent offers expertise in the application of security analysis packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a set of automatic network testing checks to uncover potential security holes. Progent has broad knowledge of additional security analysis utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Hydra, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can help you design security into your business processes, configure scanning applications, plan and implement a protected network architecture, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are able to help you set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn more about Progent's automated security assessment.

Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory bundles designed to enable small businesses to get an independent network security evaluation from a qualified security engineer. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive test of your network from beyond your firewalled perimeter to uncover potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from a secure machine inside your firewall to uncover the risk to inside attacks. Both security inventory packages are configured and run from a secured external site. The process is overseen by an engineer who has earned high-level security credentials and who generates a report that details and interprets the data captured by the scan and proposes cost-effective improvements where appropriate.

Stealth Security Penetration Analysis Support Services
Stealth penetration testing is a key part of any serious IT system security plan. Progentís security professionals can perform thorough intrusion checks without the awareness of your organization's internal network support staff. Unannounced penetration testing uncovers whether existing security monitoring tools such as intrusion detection warnings and event history analysis are properly configured and actively monitored. Learn more concerning Progent's network security penetration analysis support services.

Firewall/VPN Solutions
Progent's expertise in security solutions includes extensive familiarity with leading firewalls and VPN technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the support of consultants with key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your legacy PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and remote access technology represent a full line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Learn additional details about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and select appropriate technologies from multiple vendors to support your security objectives while staying within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to guard endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including protection, identification, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, device control, and web filtering via leading-edge technologies packaged within one agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to design and implement a ProSight ESP deployment that meets your organization's specific needs and that allows you demonstrate compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent can also assist you to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup processes and enables fast restoration of critical files, applications and virtual machines that have become unavailable or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's BDR specialists can provide world-class expertise to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top information security companies to deliver centralized control and world-class protection for your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported easily to a different hosting environment without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect data about your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can save up to half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Planning
Any business ought to have a carefully considered security strategy that incorporates both pre-attack procedures and response plans. The proactive plan is a collection of steps intended to reduce vulnerabilities. The reactive strategy assists your company's IT security personnel to assess the impact caused by an attack, repair the damage, record the event, and get the IT network operational as rapidly as feasible.

Progent's expert information security engineers are available to help your business to run a full vulnerability evaluation and create a company-wide security strategy to implement security processes and controls to reduce future assaults and dangers.

CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) organization defines the core competencies and worldwide standards of skill that IT security managers are expected to master. It provides business management the confidence that those who have qualified for their CISM credential possess the experience and knowledge to deliver effective security administration and consulting consulting. Progent can provide the services of CISM Certified security consultants to help companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Recovery Management
Find out more information concerning Progent's CISM Information Security Consulting Expertise.

CISSP Certified Security Engineering Support
The CISSP credential denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information security stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Find out additional information about Progent's CISSP-certified Network Security Support Services.

CISSP-ISSAP Qualified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have been awarded ISSAP status as a result of thorough examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the most in-depth requirements of IS security architecture within the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-premier security consultants can assist your business with all aspects of architecture security including.

  • Access Control Systems and Techniques
  • Phone System and System Infrastructure Security
  • Data Encryption Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Learn additional information concerning Progent's ISSAP Qualified Secure System Architecture Support Professionals.

CISA Certified IS Security Auditing Consulting Support
The CISA accreditation is a prestigious qualification that represents expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional group. Progent's CISA-certified IS security audit experts can help your business with:

  • IS Audit Process
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Get additional details concerning Progent's CISA Certified Security Auditing Consulting Assistance.

CRISC Consultants
The CRISC program was initiated by ISACA to validate an IT professional's ability to plan, deploy, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management specialists can provide a variety of risk assessment services such as:

  • Collect data and review documentation to evaluate significant vulnerabilities
  • Identify legal, industry, and contractual requirements and organizational policies associated with your information system to determine their potential influence on your business objectives
  • Identify potential threats for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your stakeholders understand IS risk so they can contribute to your risk management process
  • Connect key risk vectors to related business procedures to help determine risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to ensure they align
Find out more information concerning Progent's CRISC Risk Management Experts.

GIAC Qualified Information System Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security experts. GIAC's goal is to assure that a certified security consultant has the skills needed to provide support in important categories of network, information, and software security. GIAC certifications are recognized by companies and institutions around the world including and the U.S. NSA. Progent's GIAC-certified information security audit specialists are available to help your business with:

Read additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Expert
To see how to get in touch with a certified Progent security consultant for online or on-premises support in Maryland, call 1-800-993-9400 or go to Remote Network Help.