Company networks inMarylandnow have fast and affordable remote help from Progent's certified network security experts to fix complex security problems. The cost is affordable, billing is per minute, sign-up is fast, and service is world class. Progent also provides assistance for long-term projects that demand the knowledge of senior security consultants with high-level security credentials.
In case yourMarylandnetwork is based some distance from larger metropolitan neighborhoods includingBaltimore, Columbia, Silver Spring, or Dundalk, support from local qualified security consultants could be problematic during an urgent situation. This could mean lost revenue for your business, upset customers, idle employees, and defocused executives. By contacting Progent's online services, you have access to a Premier security professional who can deliver expertise whenever you need it to keep your network operating and salvage your information.
Progent can help you in your initiatives to protect your IT environment with services that can range from security checks to creating a company-wide security plan. Progent offers economical service to help small and midsize companies to design and manage protected IT environments powered by Windows and Cisco products and that may include servers and desktops running UNIX or Linux operating systems plus mobile users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security solution that uses the technology of leading information security companies to deliver web-based control and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a further level of analysis for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.
Progent's certified professionals are available online or on site to offer a range of emergency or project-based IT security services which include:
If your company has an urgent requirement for IT security support, refer to Progent's Emergency Online Network Help.
- Perform automated security audits
- Clean up promptly after serious security breaches
- Configure hardware and software firewalls
- Implement secure techniques for offsite and mobile access
- Install effective applications for automatic protection against spam and DHAs
- Develop a company-wide security strategy with round-the-clock monitoring
- Offer outsourced Help Desk Support
- Develop an effective network backup and restore plan centered on System Center Data Protection Manager backup capability
Progent's security experts offer advanced support in key fields of computer security that include auditing, firewall and VPN expertise, and advanced security consulting.
Progent's expert security consultants can assess the vulnerability of your current network protection implementation through comprehensive remote automated analysis via advanced software tools and proven techniques. Progent's experience in administering this service saves your company money and assures a detailed picture of weaknesses. The information your business is provided can make up the foundation of a network protection strategy that can permit your network to run dependably and respond quickly to new risks.
Automated Network Vulnerability Assessment
Progent provides consulting in the application of security auditing products such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably running a variety of programmed network auditing checks to identify potential security vulnerabilities. Progent has extensive knowledge of other security analysis products such as NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand audit reports and react effectively.
Progent can help you build security into your business operations, configure auditing applications, define and deploy a secure network architecture, and recommend policies to optimize the safety of your network. Progent's security engineers are available to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Find out additional information concerning Progent's network security analysis.
Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation packages intended to enable small businesses to get an objective security evaluation from a certified security specialist. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your company firewall to uncover possible risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized machine inside your firewall to uncover vulnerabilities to internal attacks. Both security inventory services are configured and run from a protected remote location. The project is directed by a consultant with top security credentials and who generates a document that summarizes and interprets the information collected by the security scan and proposes cost-effective improvements if appropriate.
Network Security Penetration Testing Support Services
Stealth penetration checking is an important part of any successful IT system security plan. Progentís security professionals can perform thorough intrusion checks without the awareness of your company's internal network support resources. Stealth penetration testing uncovers whether existing security defense systems such as intrusion detection alerts and event history monitoring are correctly set up and consistently monitored. Find out more about Progent's stealth penetration testing consulting.
Progent's background in network security solutions includes in-depth field work with major firewalls and Virtual Private Network technology from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite access products provide a comprehensive line of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Learn more details about Progent's Engineering Services for Cisco Security Technology and VPN Appliances.
Engineering Expertise for Other Firewall and VPN Solutions
Progent provides small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and Symantec. Progent can help you create a detailed security strategy and choose appropriate products from multiple suppliers to support your security objectives while sticking within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior analysis tools to guard endpoints as well as servers and VMs against new malware assaults like ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to address the complete threat progression including protection, detection, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer security for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device control, and web filtering via leading-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that addresses your organization's specific requirements and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will help you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent can also help your company to set up and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end solution for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and enables fast recovery of critical data, applications and virtual machines that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight Data Protection Services to to comply with regulatory standards such as HIPAA, FINRA, and PCI and, when necessary, can help you to restore your business-critical information. Find out more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading information security companies to provide centralized control and world-class security for all your email traffic. The powerful architecture of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Since the system is virtualized, it can be moved immediately to a different hardware environment without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to half of time spent searching for vital information about your network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Security Design
Any business should have a thoroughly considered security strategy that includes both preventive procedures and response planning. The pre-attack plan is a collection of procedures intended to minimize vulnerabilities. The reactive plan assists your company's security engineers to assess the impact caused by an attack, fix the system, record the experience, and get business functions restored as quickly as possible.
Progent's expert IT security engineers can to help your company to perform a full vulnerability evaluation and define a network security plan to establish security processes and controls to mitigate ongoing assaults and dangers.
CISM Accredited Security Consulting Services
The CISM committee defines the basic competencies and international standards of performance that IT security managers are required to master. It gives business management the assurance that those who have earned their CISM credential possess the background and knowledge to deliver efficient security administration and consulting services. Progent can provide the services of CISM Premier security consultants to help businesses with:
Read more details concerning Progent's CISM Certified Network Security Support Expertise.
- Information Security Processes
- Risk Management
- Information Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Accredited Security Consulting Support
CISSP certification recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security fields such as:
Read additional information about Progent's CISSP Accredited Information Security Consulting Professionals.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure Network Architecture Engineering Expertise
Progent's CISSP-ISSAP Certified IT architecture engineers are experts who have earned ISSAP status as a result of rigorous examination and extensive work with network security architecture. The ISSAP credential indicates demonstrated mastery in the more in-depth requirements of information security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-premier security consultants can assist your company with all phases of secure network architecture including.
Read additional information concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Expertise.
- Access Management Mechanisms and Techniques
- Telecommunications and Network Security
- Encryption/Decryption Solutions
- Requirements Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Accredited IS Security Auditing Consulting Expertise
The CISA credential is a recognized qualification that signifies expertise in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants pass a comprehensive test administered by the ISACA international professional association. Progent's CISA IS security audit experts are available to assist your IT organization with:
Read additional information concerning Progent's CISA Qualified IS Security Auditing Engineering Expertise.
- IS Audit Process
- Information Technology Governance
- Systems and Infrastructure Lifecycle Planning
- IT Service Delivery
- Safeguarding Information Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's ability to design, deploy, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help you to create and carry out a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk management specialists offer a range of risk assessment services including:
Learn additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and study documentation to help identify significant risk scenarios
- Identify statutory, industry, and business requirements and organizational policies related to your network to determine their possible influence on your business goals
- Point out potential vulnerabilities for your business workflows to help in evaluating your corporate risk
- Develop a risk awareness initiative and conduct seminars to make sure your stakeholders understand IT risk so they can contribute to your risk control process
- Match identified risk vectors to your associated operational procedures to help determine risk ownership
- Validate risk appetite with executive leadership and major stakeholders to make sure they are in agreement
GIAC Qualified Network Security Consulting Assistance
GIAC was established in 1999 to validate the skill of information technology security professionals. GIAC's mission is to make sure that a certified security consultant has the knowledge appropriate to deliver services in vital categories of system, information, and program security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC security audit engineers are available to help your IT organization with:
Learn additional details about Progent's GIAC Information Assurance Support.
- Assessing Perimeters
- Security Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Get in Touch with a Security Expert
To find out how to contact a certified security engineer for remote or onsite help in Maryland, call 1-800-993-9400 or visit Online Network Help.