Company IT networks in the state of Missouri now have fast and affordable remote access to Progent's qualified security consultants to assist with the toughest security problems. The cost is competitive, charges are per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex engagements that requires the knowledge of seasoned security consultants with high-level security certifications.
In case your Missouri small business is situated away from larger metropolitan areas like Kansas City, St. Louis, Springfield, or Independence, support from local accredited network security consultants may be problematic when you have a crisis. This can cause a drop in productivity for your business, upset clients, unproductive workers, and defocused management. By contacting Progent, you can get in touch with a Premier security professional ready to deliver help whenever you require it to keep your system on line and recover your information.
Progent can help you at any level in your efforts to defend your network with support that ranges from network security audits to developing a comprehensive security strategy. Progent provides economical support to assist companies of any size to design and maintain protected networks powered by Microsoft Windows and Cisco products and that can include computers based on UNIX or Linux platforms plus mobile users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security companies to provide centralized control and world-class protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter.
Progent's security experts are accessible online or in person to provide a range of urgent or project-based IT security services which include:
If your company has an urgent requirement for computer security help, refer to Progent's Emergency Remote Network Support.
Progent's support professionals offer world-class support in key areas of network protection that include auditing, firewall and VPN solutions, and high-level security planning.
Progent's expert security consultants can evaluate the strength of your existing network protection systems through exhaustive remote automated testing based on sophisticated utilities and proven techniques. Progent's skill in this service saves your company time and money and assures a detailed portrayal of weaknesses. The knowledge your IT organization is provided can form the foundation of a security strategy that will permit your information system to run safely and respond rapidly to future threats.
Automated Vulnerability Evaluation
Progent provides consulting in the application of security auditing packages such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically running a variety of automatic system testing checks to identify possible security vulnerabilities. Progent has broad experience with additional network auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye, plus utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.
Progent can show you how to design protection into your business processes, configure auditing software, plan and implement a protected network environment, and suggest procedures to optimize the security of your network. Progent's security professionals are able to assist you to configure a firewall, design safe remote connectivity to email and data, and install virtual private network. Find out more concerning Progent's automated security evaluation.
Security Inventory Scanning Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to allow small companies to receive an independent network security assessment from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from beyond your firewalled perimeter to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, an engineer runs a network scan from an authorized machine within your company firewall to determine your exposure to inside attacks. The two security inventory services are configured and executed from a secured external site. The process is overseen by a consultant with high-level security accreditations and who generates a report that details and interprets the information captured by the security scan and suggests practical improvements if appropriate.
Stealth Intrusion Testing Support Services
Stealth intrusion checking is an important component of any serious IT system security plan. Progentís security professionals can perform thorough penetration tests without the awareness of your company's in-house network support resources. Stealth penetration checking uncovers whether existing security monitoring systems such as intrusion incident warnings and event history analysis are properly set up and actively checked. Learn more concerning Progent's network security penetration analysis consulting.
Progent's background in network security solutions encompasses extensive field work with major firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Network Security and VPN Support Expertise
Cisco's security and remote connection products provide a full range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your business goals. Read additional information about Progent's Support Services for Cisco Security Technology and VPN Products.
Engineering Services for Other Firewall and VPN Products
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a detailed security plan and choose appropriate technologies from a variety of vendors to achieve your security objectives while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning technology to guard endpoint devices and servers and VMs against new malware assaults like ransomware and email phishing, which routinely evade traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to manage the complete threat progression including filtering, identification, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP environment that meets your organization's specific needs and that allows you achieve and demonstrate compliance with government and industry information protection regulations. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed service for secure backup/disaster recovery. For a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables rapid recovery of vital files, apps and virtual machines that have become lost or corrupted as a result of component failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever needed, can help you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top information security vendors to provide web-based management and comprehensive protection for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Exchange Server to track and safeguard internal email that stays inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hardware environment without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as 50% of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need when you need it. Learn more about ProSight IT Asset Management service.
Certified Network Security Design
Every business ought to have a carefully thought out security program that includes both proactive processes and reaction plans. The pre-attack strategy is a collection of procedures that help to reduce security weaknesses. The reactive plan helps your company's IT security engineers to assess the damage resulting from an attack, fix the damage, document the event, and get business functions running as quickly as possible.
Progent's certified IS security consultants are available to assist your business to run a complete vulnerability assessment and create a network security plan to establish security processes and mechanisms to minimize ongoing attacks and dangers.
CISM Accredited Information Security Engineering Expertise
The CISM committee describes the core competencies and international standards of performance that information security professionals are required to master. CISM gives business management the assurance that those who have earned their CISM certification possess the experience and knowledge to provide efficient security management and support services. Progent offers the services of CISM Certified security consultants to help companies with:
Read additional information about Progent's CISM Qualified Information Security Consulting Services.
- IS Security Governance
- Vulnerability Analysis
- Information Security Program Management
- Information Security Administration
- Recovery Planning
CISSP Accredited Security Consulting Services
The CISSP credential denotes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the field of information protection defined by ISO 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security fields including:
Read more information about Progent's CISSP-certified Network Security Support Expertise.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP Certified system architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous examination and significant work with information security design. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the more in-depth requirements of information system security architecture within the broader field of IS security expertise required for CISSP certification. Progent's ISSAP-premier security consultants can assist your business with all aspects of architecture security such as.
Find out more information concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.
- Access Management Systems and Methodologies
- Telecommunications and Network Infrastructure Protection
- Cryptography Options
- Requirements Analysis and Security Criteria
- BCP and Disaster Recovery Planning
- Physical Security
CISA Accredited Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that indicates mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass a comprehensive examination given by the ISACA international professional group. Progent's CISA IS security audit engineers are available to assist your company in the areas of:
Get the details concerning Progent's CISA Certified Security Auditing Consulting Support.
- IS Audit Services
- IT Enforcement
- Network Assets and Infrastructure Planned Useful Life
- Information Technology Support
- Safeguarding Data Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's skills to design, implement, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation specialists offer a range of risk evaluation services including:
Get more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to evaluate significant risk scenarios
- Identify legal, industry, and contractual requirements and organizational standards related to your network to determine their potential impact on your business goals
- Identify potential threats for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness program and provide seminars to make sure your organization appreciate information system risk so they can assist with your risk management process
- Connect key risk scenarios to your associated operational processes to help determine risk responsibility
- Determine risk tolerance with your senior management and major stakeholders to ensure they match
GIAC Accredited IS Security Consulting Services
Global Information Assurance Certification was founded in 1999 to validate the skill of information technology security engineers. GIAC's mission is to make sure that a certified security consultant possesses the skills necessary to provide support in key areas of system, data, and software security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit consultants can assist your IT organization with:
Learn more information about Progent's GIAC Information Assurance Support.
- Assessing Perimeters
- Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Get in Touch with a Certified Progent Security Expert
To see how you can contact a certified security consultant for remote or onsite assistance in Missouri, phone 1-800-993-9400 or go to Online Network Support.