Company information networks in the state of Massachusetts can have prompt and economical online access to Progent's certified network security professionals to resolve the toughest security problems. The cost is competitive, billing is by the minute, engagement is fast, and support is world class. Progent also offers assistance for complex projects that demand the expertise of seasoned security engineers with high-level industry credentials.
If your Massachusetts small business is situated outside of major metropolitan areas including Boston, Worcester, Springfield, Lowell, or Cambridge, access to local accredited network security professionals is often problematic during an urgent situation. This could mean lost income for your company, upset clients, unproductive workers, and defocused management. By contacting Progent's online services, you have access to a Certified security professional ready to offer expertise when you require it to get your computer network operating and recover your information.
Progent can help you in all your initiatives to protect your information system with support that can range from network security checks to developing a comprehensive security strategy. Progent provides affordable support to help companies of any size to set up and maintain safe networks based on Windows and Cisco technology and that can include servers and desktops running UNIX or Linux operating systems plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to deliver centralized control and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also enable Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.
Progent's security experts are accessible online or in person to offer a variety of urgent or project-based network security services which include:
If your network has an emergency requirement for computer security help, go to Progent's Emergency Remote Technical Support.
- Perform thorough security audits
- Clean up promptly after attacks
- Configure and troubleshoot firewalls
- Configure secure solutions for offsite and mobile access
- Deploy advanced solutions for automatic defense against viruses, spam and directory harvest attacks
- Help create a comprehensive security plan with round-the-clock network monitoring
- Provide comprehensive Call Center Services
- Help Develop an effective backup and business continuity plan built around Microsoft DPM automated backup technology
Progent's security experts offer advanced services in key areas of network security including security assessment, firewall/VPN support, and high-level security planning.
Progent's certified security consultants can evaluate the strength of your current network protection systems through comprehensive remote automated testing via sophisticated utilities and proven techniques. Progent's skill in this testing saves you time and money and offers an objective portrayal of security holes. The knowledge your company gains can be used as the foundation of a security strategy that can permit your information system to operate safely and react quickly to future threats.
Automated Network Vulnerability Audits
Progent offers expertise in the application of security auditing software such as MBSA and GFI LANguard Network Security Scanner for affordably performing a variety of programmed network auditing scans to uncover potential security vulnerabilities. Progent has extensive knowledge of other security analysis products including NMAP, AMAP, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and react effectively.
Progent can help you build protection into your company processes, configure scanning tools, plan and deploy a secure network environment, and recommend policies to maximize the security of your network. Progent's security professionals are able to show you how to configure a firewall, implement secure remote access to email and data, and integrate VPN. Find out additional information about Progent's network security audits.
Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation packages intended to allow small companies to receive an impartial network security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your IT infrastructure from outside your firewall to determine potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from a secure machine within your firewall to evaluate your exposure to internal attacks. The two security inventory services are set up and run from a protected external location. The project is directed by a consultant who has earned top security accreditations and who generates a report that summarizes and interprets the information collected by the security scan and suggests cost-effective improvements if appropriate.
Network Intrusion Analysis Consulting
Stealth intrusion checking is an important part of any successful IT system security strategy. Progentís security professionals can perform thorough penetration tests without the awareness of your company's in-house network support resources. Stealth penetration checking uncovers whether current security monitoring tools such as intrusion detection alerts and event log monitoring are properly configured and consistently checked. Find out additional information concerning Progent's stealth security penetration testing consulting.
Firewall and Virtual Private Network Expertise
Progent's expertise in network security technology includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help your company to manage your existing PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.
Cisco Security and Virtual Private Network Consulting Services
Cisco's security and remote connection products offer a full line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Find out additional details about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.
Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from a variety of vendors to support your security objectives while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices and servers and VMs against modern malware assaults like ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to address the entire malware attack progression including filtering, identification, containment, cleanup, and forensics. Key features include single-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge tools incorporated within one agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with government and industry information protection regulations. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for immediate action. Progent can also help you to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid recovery of critical files, applications and VMs that have become lost or damaged due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading information security companies to deliver centralized management and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be ported easily to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect information related to your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can eliminate up to 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre making improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
Certified Security Design
Any business ought to have a carefully considered security program that includes both preventive procedures and response planning. The pre-attack strategy is a set of steps intended to reduce security weaknesses. The reactive strategy helps your security engineers to assess the impact caused by an attack, repair the system, record the experience, and get the IT network running as rapidly as possible.
Progent's certified information security consultants can to assist your business to perform a complete vulnerability assessment and define a computer security plan to implement security processes and controls to minimize ongoing assaults and threats.
CISM Accredited System Security Support Expertise
The Certified Information Security Manager (CISM) committee describes the basic competencies and worldwide standards of performance that information security managers are required to master. CISM gives executive management the confidence that those who have earned their CISM credential possess the background and knowledge to deliver effective security management and consulting consulting. Progent can provide the services of CISM Certified security consultants to assist companies with:
Read more details about Progent's CISM Accredited Security Consulting Expertise.
- Information Security Processes
- Vulnerability Analysis
- Information Security Program Management
- Network Security Management
- Response Planning
CISSP Certified Security Engineering Assistance
The CISSP credential recognizes mastery of an international standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information security defined by ISO 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security fields such as:
Learn additional details about Progent's CISSP Accredited Cybersecurity Consulting Professionals.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption Mechanisms
- Telecom, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier information system architecture engineers are consultants who have been awarded ISSAP status through thorough examination and extensive work with information security design. The ISSAP certification indicates demonstrated competence in the most challenging requirements of information security architecture within the broader scope of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of secure network architecture such as.
Learn more details concerning Progent's ISSAP Qualified Secure Information System Architecture Consulting Services.
- Access Management Systems and Methodologies
- Telecommunications and Network Protection
- Data Encryption Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive examination given by the ISACA professional group. Progent's CISA information security audit engineers are available to assist your IT organization in the areas of:
Get more details about Progent's CISA Certified Security Auditing Engineering Services.
- Information Systems Audit Services
- IT Governance
- Systems and Architecture Planned Useful Life
- Information Technology Service Delivery
- Protecting Data Assets
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a business continuity strategy that follows leading practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk management consultants can provide a variety of risk assessment services including:
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and review documentation to help identify significant vulnerabilities
- Inventory legal, regulatory, and contractual requirements and organizational standards related to your network to determine their potential influence on your strategic objectives
- Point out potential vulnerabilities for your operational processes to assist in analyzing your enterprise risk
- Develop a risk awareness initiative and provide seminars to make sure your organization appreciate IT risk so they can contribute to your risk management program
- Match key risk scenarios to your associated business procedures to help determine risk responsibility
- Determine risk tolerance with executive management and key stakeholders to ensure they match
GIAC Certified Information System Security Consulting Assistance
Read more information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security experts. GIAC's mission is to assure that an accredited security consultant possesses the skills appropriate to deliver support in important categories of network, information, and application software security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC-qualified security audit consultants are available to assist your IT organization with:
Contact a Security Expert
To find out how to get in touch with a security engineer for online or onsite assistance in Massachusetts, phone 1-800-993-9400 or go to Remote Network Support.