Company information networks in Massachusetts can depend on quick and economical online help from Progent's qualified security experts to resolve critical security problems. The cost is competitive, billing is by the minute, sign-up is immediate, and service is unbeatable. Progent also offers assistance for long-term engagements that requires the expertise of senior security engineers with high-level security certifications.
If your Massachusetts small business is based away from major metropolitan neighborhoods like Boston, Worcester, Springfield, Lowell, or Cambridge, access to nearby certified network security support specialists is often limited when there's a crisis. This could mean a loss of income for your business, angry clients, unproductive employees, and distracted executives. By utilizing Progent, you have access to a Certified security professional who can provide assistance when you need it to keep your computer network operating and restore your data.
Progent can assist you in a variety of ways in your efforts to protect your network with support services that can range from security audits to creating a comprehensive security strategy. Progent provides economical service to help businesses of all sizes to design and maintain secure networks powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email that stays inside your corporate firewall.
Progent's certified engineers are accessible online or on premises to offer a variety of emergency or project-based computer security services including:
If your network has an urgent need for IT security help, refer to Progent's Emergency Remote Technical Help.
- Perform automated security audits
- Recuperate rapidly after serious security breaches
- Configure firewalls from multiple vendors
- Implement safe techniques for offsite and mobile connectivity
- Deploy advanced utilities for protection against spam and directory harvest attacks
- Develop a comprehensive security strategy with 24x7 security monitoring
- Offer outsourced Help Desk Support
- Help Create a practical data backup and recovery plan based on Microsoft DPM automated backup technology
Progent's engineers offer advanced support in key fields of computer security that include analysis, firewall and VPN solutions, and advanced security consulting.
Progent's certified security consultants can evaluate the strength of your existing network protection systems by performing exhaustive remote automated testing based on advanced software tools and tested techniques. Progent's experience in this testing saves you time and money and assures an objective picture of system vulnerability. The information your IT organization gains can make up the foundation of a network protection plan that can permit your network to operate safely and adapt quickly to new risks.
Automated Vulnerability Audits
Progent provides consulting in the application of security analysis software such as MBSA and GFI LANguard for economically performing a set of automatic network auditing scans to uncover potential security holes. Progent has extensive knowledge of other security analysis tools including NMAP Port Scanner, AMAP, eEye, as well as utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.
Progent can help you design protection into your business operations, install scanning applications, plan and implement a secure network architecture, and recommend procedures to optimize the security of your IT system. Progent's security consultants are ready to help you set up a firewall, implement secure remote connectivity to email and data, and install VPN. Find out more about Progent's network security analysis.
Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory service packages designed to enable small businesses to get an objective network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer runs an extensive test of your network from outside your firewalled perimeter to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a system scan from a secure machine inside your company firewall to determine vulnerabilities to internal threats. The two security inventory packages are set up and run from a protected external site. The project is managed by a consultant who has earned top security credentials and who produces a document that details and interprets the information captured by the security scan and suggests cost-effective improvements if called for.
Network Intrusion Testing Consulting
Stealth penetration testing is an important part of any comprehensive IT system security strategy. Progentís security experts can perform extensive intrusion checks without the awareness of your organization's internal IT staff. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event history monitoring are properly set up and consistently monitored. Learn more concerning Progent's stealth security penetration testing support services.
Firewall and Virtual Private Network Solutions
Progent's expertise in network security solutions includes extensive familiarity with leading firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of engineers with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your existing PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower configuration and debugging support.
Cisco Security and VPN Engineering Services
Cisco's security and offsite access products represent a full range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Find out additional details concerning Progent's Consulting Services for Cisco Security Solutions and VPN Appliances.
Consulting Services for Other Firewall and VPN Products
Progent provides small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and choose appropriate technologies from multiple suppliers to achieve your security goals while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to guard endpoints and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and provides a unified platform to address the entire malware attack progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge technologies incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP environment that meets your organization's unique needs and that helps you prove compliance with government and industry information security standards. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent's consultants can also help you to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of vital files, applications and virtual machines that have become lost or damaged as a result of component breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security companies to deliver centralized control and comprehensive protection for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs or domains. By updating and managing your IT documentation, you can eliminate as much as 50% of time spent trying to find critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Certified Security Planning
Every business should develop a thoroughly thought out security program that includes both preventive processes and reaction planning. The pre-attack plan is a collection of mechanisms intended to minimize security weaknesses. The reactive strategy helps your company's network security personnel to evaluate the impact resulting from a security penetration, repair the damage, record the experience, and get the IT network restored as rapidly as possible.
Progent's certified IT security engineers are available to help your business to perform a complete vulnerability assessment and create a computer security plan to implement security policies and controls to mitigate future attacks and dangers.
CISM Qualified System Security Support Assistance
The Certified Information Security Manager (CISM) committee defines the basic capabilities and international standards of skill that information security managers are expected to master. CISM gives business management the confidence that consultants who have qualified for their CISM certification have the background and knowledge to deliver effective security management and consulting consulting. Progent offers the services of CISM Certified security consultants to help businesses with:
Find out more details concerning Progent's CISM Qualified Security Engineering Expertise.
- Network Security Strategies
- Vulnerability Management
- Network Security Program Management
- Information Security Management
- Recovery Management
CISSP Accredited Security Engineering Support
CISSP recognizes mastery of a global standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data security stipulated by ISO 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security areas such as:
Read more details about Progent's CISSP Qualified Information Security Consulting Services.
- Security Management Procedures
- Security Architecture and Models
- Access Control Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, LAN and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have been awarded ISSAP status through rigorous testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the more challenging demands of IS security architecture bounded by the wider field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture such as.
Find out additional details about Progent's ISSAP Certified Secure Network Architecture Consulting Expertise.
- Access Management Mechanisms and Techniques
- Phone System and Network Infrastructure Security
- Encryption/Decryption Options
- Needs Analysis and Security Criteria
- BCP and DRP
- Site Security
CISA Certified Security Auditing Consulting Services
The CISA credential is a globally recognized qualification that represents mastery in IS security auditing. Accredited by ANSI, the CISA credential has candidates undergo an extensive examination given by the ISACA international professional association. Progent's CISA-certified IS security audit engineers can assist your business in the areas of:
Get more information about Progent's CISA Qualified IS Security Auditing Engineering Expertise.
- IS Audit Services
- IT Administration
- Network Assets and Architecture Lifecycle
- IT Support
- Safeguarding Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and maintain information system controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and execute a business continuity strategy based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk management experts offer a range of risk evaluation services including:
Get more information about Progent's CRISC Risk Management Consultants.
- Collect information and review documentation to evaluate significant vulnerabilities
- Inventory legal, regulatory, and business mandates and organizational policies related to your network to determine their potential influence on your strategic goals
- Identify possible vulnerabilities for your operational processes to help in evaluating your enterprise risk
- Create a risk awareness program and conduct training to make sure your organization appreciate IT risk so they can contribute to your risk control process
- Match identified risk scenarios to related business procedures to help assign risk ownership
- Validate risk tolerance with executive leadership and major stakeholders to make sure they are in agreement
GIAC Accredited Security Consulting Services
Find out more details about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of network security engineers. GIAC's goal is to ensure that a certified security consultant possesses the knowledge needed to provide support in key categories of network, data, and application program security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC security audit experts can assist your business with:
Talk to a Certified Progent Security Specialist
To find out how you can access a certified Progent security consultant for remote or on-premises expertise in Massachusetts, phone 1-800-993-9400 or go to Remote Network Help.