Small business IT networks in the state of Minnesota now have prompt and economical online access to Progent's qualified network security experts to resolve the toughest security problems. The cost is competitive, charges are per minute, engagement is immediate, and service is world class. Progent also provides help for long-term projects that requires the knowledge of seasoned security engineers with high-level industry credentials.
In case your Minnesota small business is based outside of major urban areas like Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, access to local certified network security engineers may be limited when you have an emergency. This can cause a loss of revenue for your company, upset customers, idle workers, and distracted management. By contacting Progent's online services, you can get in touch with a Certified security professional ready to provide help whenever you have to have it to keep your computer network running and salvage your information.
Progent can assist you in a variety of ways in your efforts to protect your IT environment with services ranging from network security checks to developing a comprehensive security plan. Progent provides affordable service to help small and midsize companies to configure and manage safe networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux operating systems plus mobile clients with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also help you outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security platform that incorporates the technology of top information security vendors to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email that stays inside your security perimeter.
Progent's certified engineers are available online or in person to offer a variety of urgent or project-based network security services such as:
If your business has an emergency requirement for IT security support, go to Progent's Urgent Remote Network Help.
Progent's security experts can deliver world-class support in key fields of computer protection including auditing, firewall and VPN solutions, and advanced security planning.
Progent's certified security engineers can evaluate the vulnerability of your existing computer security implementation through comprehensive remote automated analysis based on advanced utilities and proven techniques. Progent's skill in administering this service saves you time and money and assures a detailed portrayal of system vulnerability. The information your IT organization is provided can form the foundation of a security strategy that can allow your network to run dependably and react rapidly to future threats.
Automated Vulnerability Audits
Progent provides expertise in the use of security testing utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably running a set of programmed network auditing checks to uncover possible security holes. Progent has broad knowledge of other network auditing products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.
Progent can help you build protection into your company operations, configure auditing tools, define and deploy a secure network architecture, and suggest procedures to optimize the security of your IT system. Progent's security professionals are able to assist you to configure a firewall, implement secure remote access to email and data, and integrate virtual private network. Find out more on Progent's network security audits.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles intended to enable small businesses to receive an objective security assessment from an accredited security engineer. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from outside your firewall to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from a secure machine inside your company firewall to uncover the risk to internal threats. Both security inventory packages are set up and run from a secured remote location. The project is directed by an engineer with top security credentials and who produces a report that summarizes and interprets the information captured by the security scan and proposes practical improvements where called for.
Network Intrusion Analysis Consulting
Stealth intrusion checking is an important part of any successful IT system security plan. Progentís security experts can perform thorough penetration tests without the awareness of your company's internal IT resources. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion incident alerts and event log monitoring are properly configured and consistently monitored. Find out additional information concerning Progent's network penetration testing support services.
Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security technology includes in-depth familiarity with leading firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned important industry accreditations such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Consulting Services
Cisco's network security and offsite access products represent a comprehensive line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and CCNP qualifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Learn additional details concerning Progent's Consulting Expertise for Cisco Security and VPN Appliances.
Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size companies professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a detailed security plan and select appropriate products from a variety of suppliers to support your security objectives while sticking within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes next generation behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely evade traditional signature-matching anti-virus tools. ProSight ASM safeguards local and cloud-based resources and provides a single platform to address the entire malware attack progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering through cutting-edge tools packaged within a single agent managed from a single control. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP deployment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent's consultants can also assist your company to set up and verify a backup and restore system like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of critical data, applications and VMs that have become unavailable or damaged due to hardware failures, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class expertise to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to deliver centralized control and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway device provides a further level of inspection for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email that stays within your corporate firewall. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Because the system is virtualized, it can be moved immediately to an alternate hardware environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and safeguard data about your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Every company should have a carefully considered security strategy that incorporates both proactive processes and reaction plans. The pre-attack plan is a collection of mechanisms designed to reduce security weaknesses. The post-attack strategy assists your company's IT security personnel to evaluate the damage resulting from a security penetration, repair the system, document the event, and get the IT network operational as rapidly as possible.
Progent's expert IS security consultants can to assist your company to run a full risk evaluation and define a network security plan to implement security processes and mechanisms to mitigate ongoing attacks and threats.
CISM Certified Security Engineering Expertise
The CISM organization defines the core capabilities and international standards of skill that information security professionals are required to master. It provides business management the confidence that consultants who have qualified for their CISM credential have the background and capability to provide effective security administration and consulting services. Progent can provide the expertise of CISM Premier security professionals to help companies with:
Find out additional information concerning Progent's CISM Qualified Security Engineering Services.
- IS Security Processes
- Vulnerability Analysis
- Network Security Implementation Management
- Information Security Administration
- Response Management
CISSP Certified Security Consulting Support
CISSP certification denotes mastery of a worldwide standard for information security. ANSI has awarded certification recognition in the area of data protection under ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your business in a broad range of security fields such as:
Learn additional information concerning Progent's CISSP Network Security Consulting Professionals.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecom, Network and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure System Architecture Consulting Support
Progent's CISSP-ISSAP Certified IT architecture engineers are consultants who have been awarded ISSAP status as a result of thorough testing and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the most challenging requirements of information security architecture within the broader scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-premier security specialists can help your company with all phases of architecture security including.
Learn more details about Progent's ISSAP Accredited Secure System Architecture Consulting Services.
- Access Management Systems and Techniques
- Telecommunications and Network Security
- Cryptography Solutions
- Needs Analysis and Security Criteria
- Business Continuity Planning and DRP
- Site Security
CISA Certified Security Auditing Engineering Support
The CISA credential is an important achievement that represents expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA-qualified network security audit experts are available to assist your IT organization in the areas of:
Read the details concerning Progent's CISA Certified Information System Security Auditing Consulting Support.
- IS Audit Process
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- IT Support
- Safeguarding Information Resources
- Business Continuity Preparedness
The CRISC certification program was initiated by ISACA to verify an IT professional's ability to plan, implement, and maintain IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and carry out a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers offer a range of risk identification services including:
Read more information about Progent's CRISC Risk Management Consultants.
- Collect information and review documentation to identify significant risk scenarios
- Identify legal, regulatory, and contractual mandates and company standards associated with your information system to determine their potential influence on your business objectives
- Identify potential vulnerabilities for your operational processes to help in evaluating your corporate risk
- Develop a risk awareness program and conduct training to ensure your stakeholders appreciate information system risk so they can contribute to your risk management process
- Connect identified risk vectors to related operational procedures to help determine risk ownership
- Validate risk tolerance with your senior management and major stakeholders to make sure they match
GIAC Accredited Security Consulting Expertise
Learn additional details about Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to assure that a certified professional possesses the skills needed to deliver support in critical areas of network, information, and application software security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit consultants are available to assist your business with:
Talk to a Progent Security Engineer
To find out how to access a security consultant for online or on-premises help in Minnesota, phone 1-800-993-9400 or go to Online Computer Support.