Business networks in the state ofMissourican depend on quick and economical remote access to Progent's qualified security professionals to fix complex security issues. Rates are reasonable, billing is per minute, sign-up is immediate, and service is world class. Progent also provides assistance for complex projects that demand the expertise of senior security engineers with high-level industry credentials.
If yourMissouriorganization is located some distance from more populated urban neighborhoods includingKansas City, St. Louis, Springfield, or Independence, access to nearby qualified security professionals may be limited when you have a crisis. This can cause a loss of revenue for your company, upset clients, unproductive workers, and distracted executives. By calling Progent's remote support, you can get in touch with a Certified security consultant ready to deliver assistance when you need it to get your system operating and salvage your data.
Progent can assist you in a variety of ways in your efforts to protect your IT environment with services that ranges from security audits to creating a comprehensive security strategy. Progent offers economical service to assist small and midsize companies to design and maintain safe networks based on Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple handhelds or Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to deliver web-based control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a further layer of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall.
Progent's certified engineers are accessible remotely or on site to offer a range of urgent or project-based computer security services such as:
If your company has an immediate requirement for IT security help, refer to Progent's Emergency Remote Network Support.
- Run comprehensive network security audits
- Recover rapidly after serious security breaches
- Configure hardware and software firewalls
- Configure secure techniques for remote and mobile access
- Deploy advanced software for defense against spam and DHAs
- Help create a company-wide security plan with proactive network monitoring
- Provide outsourced Call Center Support
- Help Create a practical backup and recovery plan centered on Microsoft DPM backup/restore technology
Progent's consultants provide advanced services in key facets of system protection including auditing, firewall and VPN solutions, and advanced security consulting.
System Security Audits
Progent's certified security consultants can evaluate the strength of your current computer protection implementation by performing exhaustive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in this testing saves you money and assures an accurate picture of gaps. The knowledge your business gains can be used as the basis of a security plan that will permit your network to run safely and react quickly to future risks.
Automated Network Vulnerability Assessment
Progent offers expertise in the application of security auditing software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically running a set of automatic network auditing checks to uncover potential security problems. Progent has extensive knowledge of other network analysis utilities such as NMAP Port Scanner, AMAP application mapper, eEye, plus tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and respond effectively.
Progent can show you how to design protection into your company operations, configure auditing applications, plan and implement a secure network architecture, and suggest procedures to optimize the safety of your IT system. Progent's security professionals are ready to help you configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's automated security assessment.
Security Inventory Service Packages for Small Companies
Progent has put together two low-cost security inventory scanning packages intended to enable small businesses to receive an impartial network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Scan, an engineer administers a comprehensive examination of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from a secure machine inside your firewall to determine your exposure to internal threats. Both security inventory services are set up and run from a secured external location. The project is managed by a consultant with top security accreditations and who produces a report that summarizes and interprets the information captured by the scan and suggests cost-effective remediation if appropriate.
Stealth Penetration Testing Support Services
Stealth intrusion testing is an important part of any serious IT system security plan. Progentís security experts can perform thorough penetration tests without the knowledge of your organization's in-house network support staff. Unannounced penetration checking shows whether current security monitoring tools such as intrusion incident warnings and event history analysis are properly configured and consistently checked. Find out additional information concerning Progent's stealth security penetration testing consulting.
Firewall and Virtual Private Network Expertise
Progent's background in security solutions includes in-depth field work with leading firewalls and Virtual Private Network (VPN) products offered by multiple companies including Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned key networking accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Consulting Expertise
Cisco's network security and offsite access technology offer a complete range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Find out additional information concerning Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.
Support Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWall. Progent can show you how to design a detailed security plan and select the right products from a variety of suppliers to achieve your security goals while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to manage the complete malware attack progression including protection, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device control, and web filtering through cutting-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP deployment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate attention. Progent's consultants can also help your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates and monitors your backup processes and enables fast restoration of critical data, applications and virtual machines that have become lost or damaged as a result of hardware failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to configure ProSight DPS to to comply with regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security companies to provide centralized control and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further layer of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Since the system is virtualized, it can be ported immediately to a different hosting environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By updating and organizing your network documentation, you can save as much as half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Security Planning
Any business ought to have a carefully thought out security program that includes both pre-attack processes and reaction plans. The pre-attack strategy is a collection of mechanisms designed to reduce vulnerabilities. The post-attack plan assists your company's security engineers to assess the damage caused by a security penetration, fix the damage, record the experience, and get the IT network restored as quickly as possible.
Progent's expert IS security consultants can to help your business to run a complete vulnerability assessment and create a company-wide security plan to establish security policies and mechanisms to reduce future attacks and threats.
CISM Accredited Security Consulting Services
The Certified Information Security Manager (CISM) committee defines the core competencies and international standards of skill that IT security professionals are expected to learn. It gives executive management the assurance that consultants who have earned their CISM credential have the experience and capability to deliver effective security management and consulting services. Progent can provide the expertise of CISM Certified security professionals to help companies with:
Learn additional details concerning Progent's CISM Information Security Support Professionals.
- IS Security Strategies
- Risk Analysis
- IS Security Implementation Management
- Information Security Management
- Response Planning
CISSP Certified Security Engineering Services
CISSP recognizes mastery of a global standard for information security. ANSI has awarded certification accreditation in the field of information protection defined by ISO 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security areas including:
Find out additional information about Progent's CISSP Accredited Information Security Consulting Professionals.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Applications Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Premier information system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the more in-depth demands of IS security architecture bounded by the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture such as.
Find out additional information concerning Progent's ISSAP Certified Secure Network Architecture Support Services.
- Access Management Mechanisms and Techniques
- Phone System and System Infrastructure Security
- Encryption/Decryption Solutions
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and DRP
- Site Security
CISA Certified IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants undergo a comprehensive test given by the ISACA international professional association. Progent's CISA-qualified information security audit engineers can assist your IT organization in the areas of:
Read more details about Progent's CISA Qualified Information System Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Service Delivery
- Safeguarding Data Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA in 2010 to verify a consultant's skills to design, implement, and maintain information system control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a workplace continuity strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC IT risk mitigation experts can provide a range of risk evaluation services including:
Learn more details concerning Progent's CRISC Risk Management Experts.
- Gather information and study documentation to evaluate major risk scenarios
- Inventory statutory, regulatory, and business mandates and organizational standards related to your information system to assess their possible influence on your strategic goals
- Point out possible threats for your operational workflows to assist in evaluating your enterprise risk
- Create a risk awareness initiative and conduct training to ensure your stakeholders appreciate information system risk so they can contribute to your risk control process
- Match identified risk vectors to related business processes to help determine risk ownership
- Validate risk appetite with your senior leadership and key stakeholders to make sure they align
GIAC Accredited Network Security Consulting Expertise
Read more details about Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to assure that an accredited security consultant possesses the knowledge needed to provide services in critical areas of system, information, and application program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC-certified IS security audit consultants are available to help your IT organization with:
Get in Touch with a Certified Security Specialist
To learn how to access a certified Progent security engineer for remote or onsite support in Missouri, call 1-800-993-9400 or visit Remote Network Support.