Business IT networks in Maryland now have quick and economical remote help from Progent's certified security consultants to help with critical security issues. The cost is competitive, billing is by the minute, engagement is quick, and support is unbeatable. Progent also provides assistance for long-term projects that requires the expertise of seasoned security consultants with high-level security credentials.
In case your Maryland network is based away from major metropolitan neighborhoods including Baltimore, Columbia, Silver Spring, or Dundalk, the availability of local certified security consultants may be limited when there's a security disaster. This can result in a drop in productivity for your business, upset customers, unproductive workers, and distracted executives. By utilizing Progent's online services, you can get in touch with a Certified security professional who can provide expertise whenever you need it to keep your network running and salvage your information.
Progent can help you in all your initiatives to guard your network with services that can range from security checks to creating a company-wide security strategy. Progent offers affordable service to help businesses of all sizes to set up and maintain safe networks powered by Microsoft Windows and Cisco products and that may include computers running UNIX or Linux operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security vendors to deliver centralized management and world-class security for all your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper level of inspection for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall.
Progent's security experts are accessible online or on site to provide a variety of urgent or longer-term IT security services including:
If your network has an immediate requirement for computer security help, refer to Progent's Emergency Online Technical Help.
Progent's engineers provide advanced support in vital facets of network security including security assessment, firewalls and VPN, and high-level security planning.
System Security Evaluation
Progent's certified security consultants can assess the vulnerability of your current computer security environment through comprehensive remote automated analysis via advanced software tools and tested techniques. Progent's skill in this testing saves your company consulting fees and offers an objective picture of weaknesses. The information your business is provided can form the basis of a security plan that can allow your network to operate safely and react rapidly to future risks.
Automated Vulnerability Audits
Progent provides expertise in the application of security evaluation utilities including MBSA and GFI LANguard NSS for economically performing a set of programmed network testing checks to identify possible security weaknesses. Progent has broad knowledge of additional security auditing products such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.
Progent can help you build security into your business processes, configure scanning applications, define and deploy a protected network environment, and recommend policies to maximize the safety of your network. Progent's security professionals are able to show you how to configure a firewall, design secure remote access to email and business applications, and integrate VPN. Find out additional information on Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages designed to enable small businesses to receive an impartial network security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your network from outside your firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a network scan from an authorized machine within your firewall to uncover vulnerabilities to internal threats. The two security inventory packages are set up and executed from a protected external site. The process is directed by a consultant who has earned top security accreditations and who generates a document that details and interprets the data collected by the security scan and proposes practical remediation if appropriate.
Network Security Penetration Analysis Support Services
Stealth intrusion testing is an important component of any comprehensive IT system security plan. Progentís security experts can perform extensive penetration checks without the knowledge of your company's internal network support resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event history monitoring are properly configured and actively monitored. Find out additional information on Progent's network penetration testing consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions includes extensive field work with leading firewalls and Virtual Private Network technology from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important industry certifications such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower integration and troubleshooting support.
Cisco Network Security and VPN Consulting Expertise
Cisco's security and offsite access technology provide a full range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Find out additional information about Progent's Consulting Services for Cisco Security Technology and VPN Products.
Consulting Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a detailed security strategy and choose the right products from a variety of suppliers to achieve your security objectives while sticking within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely get by legacy signature-matching AV tools. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to automate the entire malware attack progression including protection, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection services deliver economical multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge technologies packaged within a single agent accessible from a single console. Progent's security and virtualization experts can help you to design and implement a ProSight ESP environment that addresses your company's specific needs and that helps you prove compliance with legal and industry information protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also help you to install and test a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, applications and virtual machines that have become unavailable or damaged due to hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of top data security companies to provide centralized control and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be ported easily to a different hosting environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect information related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSL certificates or domains. By updating and organizing your IT infrastructure documentation, you can save as much as 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Certified Network Security Planning
Every company should develop a thoroughly thought out security program that incorporates both preventive procedures and response plans. The proactive plan is a collection of steps intended to minimize vulnerabilities. The post-attack plan assists your security engineers to evaluate the impact resulting from an attack, repair the damage, document the experience, and get the IT network running as quickly as feasible.
Progent's expert IT security consultants can to assist your business to run a complete vulnerability evaluation and define a network security plan to establish security processes and mechanisms to reduce ongoing assaults and threats.
CISM Certified Network Security Support Services
The Certified Information Security Manager (CISM) organization defines the core capabilities and worldwide standards of performance that IT security professionals are required to master. CISM gives executive management the assurance that consultants who have qualified for their CISM credential have the background and capability to deliver efficient security administration and consulting services. Progent offers the expertise of CISM Premier security consultants to help companies with:
Find out more information concerning Progent's CISM Information Security Consulting Professionals.
- IS Security Governance
- Vulnerability Analysis
- Network Security Implementation Management
- IS Security Management
- Recovery Planning
CISSP Qualified Security Engineering Services
CISSP certification denotes mastery of a worldwide standard for network security. ANSI has awarded the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas including:
Find out additional details concerning Progent's CISSP Accredited Network Security Support Services.
- Security Management Procedures
- Security Architecture and Models
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Technology
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have earned ISSAP Certification through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most challenging requirements of information system security architecture bounded by the wider scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-premier security experts can assist your business with all phases of secure network architecture including.
Find out more details concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Services.
- Access Management Systems and Methodologies
- Telecom and Network Security
- Data Encryption Solutions
- Needs Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a recognized qualification that signifies expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that consultants pass a comprehensive examination administered by the ISACA international professional group. Progent's CISA-qualified information security audit engineers can help your company in the areas of:
Find out additional details concerning Progent's CISA Certified Information System Security Auditing Engineering Assistance.
- Information Systems Audit Services
- IT Administration
- Systems and Architecture Lifecycle
- Information Technology Support
- Protecting Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's ability to plan, implement, and support information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a business continuity plan based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk management experts can provide a range of risk evaluation services including:
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and study documentation to identify significant vulnerabilities
- Inventory statutory, regulatory, and business mandates and company standards associated with your network to assess their potential influence on your strategic goals
- Identify potential vulnerabilities for your business processes to help in analyzing your corporate risk
- Develop a risk awareness program and provide seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk control process
- Connect identified risk vectors to your associated operational processes to help assign risk ownership
- Validate risk appetite with your senior leadership and key stakeholders to make sure they match
GIAC Certified Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's mission is to assure that an accredited professional possesses the knowledge necessary to deliver services in vital categories of network, data, and software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified network security audit consultants are available to help your IT organization with:
Find out more information concerning Progent's GIAC Information Assurance Services.
- Assessing Security Systems
- Security Incident Handling
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Get in Touch with a Certified Security Engineer
To see how to access a certified security consultant for online or onsite assistance in Maryland, phone 1-800-993-9400 or visit Online Computer Help.