Company networks in the state of Massachusetts now have fast and economical remote help from Progent's certified network security professionals to help with complex security problems. Rates are reasonable, charges are by the minute, engagement is fast, and support is world class. Progent also offers assistance for long-term engagements that requires the expertise of senior security consultants with top security certifications.
In case your Massachusetts office is away from major urban areas such as Boston, Worcester, Springfield, Lowell, or Cambridge, access to nearby qualified network security engineers may be limited when there's a crisis. This can result in a drop in revenue for your business, angry customers, unproductive employees, and distracted executives. By calling Progent's remote support, you have access to a Certified security engineer who can deliver assistance whenever you have to have it to keep your system operating and recover your information.
Progent can help you in your initiatives to defend your information system with support services that can range from security audits to creating a company-wide security plan. Progent offers affordable support to assist small and midsize companies to configure and maintain protected networks powered by Windows and Cisco technology and that can include computers running UNIX or Linux platforms plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security vendors to deliver web-based control and comprehensive security for all your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's security professionals are available remotely or on site to offer a range of urgent or project-based computer security services such as:
If your company has an emergency requirement for IT security help, go to Progent's Urgent Online Network Support.
Progent's engineers provide advanced support in vital fields of computer protection including security evaluation, firewall and VPN solutions, and high-level security consulting.
System Security Assessment
Progent's certified security engineers can assess the strength of your existing computer protection implementation by performing exhaustive remote automated analysis via advanced utilities and proven procedures. Progent's experience in this testing saves you time and money and assures a detailed picture of weaknesses. The information your business gains can form the foundation of a network protection plan that will permit your network to operate dependably and react rapidly to new threats.
Automated Vulnerability Analysis
Progent offers expertise in the use of security analysis utilities including MBSA and LANguard from GFI for economically running a variety of programmed system testing checks to uncover potential security holes. Progent has broad knowledge of additional network analysis utilities such as NMAP, AMAP, eEye, as well as utilities like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.
Progent can show you how to build security into your business processes, configure scanning software, plan and deploy a secure system architecture, and recommend policies to maximize the security of your IT system. Progent's security professionals are able to assist you to set up a firewall, design secure remote connectivity to email and business applications, and install VPN. Find out more about Progent's network security evaluation.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation bundles designed to enable small companies to receive an objective network security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from outside your firewall to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a network scan from a secure machine within your firewall to assess the risk to inside assaults. Both security inventory packages are set up and executed from a secured external location. The process is directed by a consultant who has earned high-level security credentials and who generates a report that details and interprets the data collected by the security scan and suggests practical improvements if appropriate.
Network Security Penetration Analysis Consulting
Stealth penetration testing is an important part of any comprehensive network security plan. Progentís security professionals can perform extensive intrusion tests without the awareness of your company's internal network support resources. Unannounced penetration checking uncovers whether current security monitoring tools such as intrusion detection warnings and event history analysis are properly set up and actively monitored. Find out more about Progent's network penetration analysis support services.
Firewalls and VPN Expertise
Progent's expertise in security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology from multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and remote access products provide a complete range of manageable security products to help safeguard your local and remote information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Find out additional details concerning Progent's Consulting Services for Cisco Security Technology and VPN Products.
Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and mid-size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select the right technologies from multiple vendors to achieve your security objectives while sticking within your budget restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to address the entire malware attack lifecycle including protection, identification, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows VSS and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides firewall protection, intrusion alerts, device management, and web filtering via leading-edge technologies packaged within a single agent managed from a single control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP environment that addresses your company's specific requirements and that allows you prove compliance with government and industry information security regulations. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate attention. Progent's consultants can also assist your company to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup activities and allows rapid recovery of vital files, apps and VMs that have become lost or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver advanced support to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security companies to provide centralized control and world-class security for your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite gateway device provides a further level of inspection for incoming email. For outbound email, the local gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that stays inside your security perimeter. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hardware solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard data about your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time spent searching for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether youíre making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about ProSight IT Asset Management service.
Certified Security Design
Any company ought to have a thoroughly considered security strategy that includes both pre-attack processes and response planning. The proactive plan is a collection of procedures intended to reduce security weaknesses. The post-attack strategy assists your company's IT security engineers to evaluate the impact caused by a security penetration, fix the system, record the event, and get the IT network running as rapidly as possible.
Progent's certified IS security consultants are available to help you to perform a full risk evaluation and create a network security plan to implement security policies and controls to reduce future attacks and threats.
CISM Qualified System Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of performance that information security managers are required to learn. CISM provides executive management the confidence that those who have qualified for their CISM credential have the experience and capability to provide effective security administration and support consulting. Progent offers the expertise of CISM Certified security professionals to assist companies with:
Learn additional information about Progent's CISM Certified Network Security Support Services.
- Information Security Strategies
- Risk Management
- IS Security Program Management
- Network Security Management
- Recovery Management
CISSP Qualified Security Consulting Expertise
CISSP denotes mastery of a worldwide standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information security stipulated by ISO 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas such as:
Learn more information concerning Progent's CISSP Information Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and extensive experience with network security architecture. The ISSAP credential represents demonstrated skill in the most in-depth requirements of information system security architecture bounded by the wider field of information security expertise needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your company with all aspects of secure network architecture such as.
Read more information concerning Progent's ISSAP Certified Secure Information System Architecture Support Services.
- Access Control Systems and Techniques
- Phone System and Network Protection
- Data Encryption Options
- Requirements Evaluation and Security Guidelines
- BCP and DRP
- Site Security
CISA Certified IS Security Auditing Consulting Expertise
The CISA credential is an important achievement that signifies mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive test given by the ISACA international professional association. Progent's CISA-certified IS security audit specialists are available to assist your company with:
Get additional details concerning Progent's CISA Accredited Information System Security Auditing Consulting Expertise.
- Information Systems Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle
- IT Service Delivery
- Safeguarding Data Assets
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, implement, and support IS controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management specialists offer a range of risk assessment services such as:
Read more details about Progent's CRISC Risk Management Consultants.
- Gather information and study documentation to help identify significant risk scenarios
- Identify legal, regulatory, and contractual requirements and organizational policies associated with your network to determine their possible impact on your business objectives
- Identify potential threats for your operational workflows to help in evaluating your corporate risk
- Develop a risk awareness initiative and provide seminars to ensure your organization appreciate information system risk so they can assist with your risk control program
- Match key risk scenarios to related business processes to help determine risk responsibility
- Validate risk appetite with your senior leadership and major stakeholders to make sure they match
GIAC Qualified IS Security Consulting Services
Read more information about Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to ensure that a certified security consultant possesses the skills appropriate to provide support in vital areas of network, data, and application program security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified IS security audit consultants can help your business in the areas of:
Get in Touch with a Security Specialist
To learn how to contact a Progent security consultant for remote or on-premises assistance in Massachusetts, call 1-800-993-9400 or go to Online Computer Help.