Business IT networks in the state of Montana can now get fast and affordable online access to Progent's qualified security engineers to help with complex security problems. Rates are competitive, charges are by the minute, engagement is quick, and service is unbeatable. Progent also provides help for complex engagements that demand the services of seasoned security engineers with high-level security certifications.
In case your Montana small business is located far from major metropolitan areas such as Billings, Missoula, or Great Falls, support from local certified security professionals is often problematic when you have a crisis. This can result in a loss of income for your company, upset customers, unproductive workers, and defocused management. By utilizing Progent's online services, you have access to a Premier security engineer who can offer help when you require it to get your information system on line and recover your information.
Progent can assist you in your efforts to defend your information system with support that ranges from security checks to creating a comprehensive security strategy. Progent provides economical support to help businesses of all sizes to set up and maintain safe networks powered by Windows and Cisco technology and that can include servers and desktops based on UNIX or Linux platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to deliver centralized control and comprehensive protection for all your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified engineers are available remotely or in person to provide a variety of emergency or project-based network security services such as:
If your network has an emergency requirement for computer security help, go to Progent's Urgent Online Technical Help.
- Run extensive network security audits
- Clean up promptly after virus and worm attacks
- Set up firewalls from multiple vendors
- Implement secure techniques for offsite and mobile connectivity
- Deploy advanced utilities for automatic protection against viruses, spam and directory harvest attacks
- Help create a comprehensive security plan with round-the-clock monitoring
- Provide outsourced Help Desk Services
- Help Develop a practical backup and business continuity strategy centered on Microsoft DPM backup/restore technology
Progent's security experts offer advanced services in vital fields of computer security including auditing, firewall/VPN support, and advanced security planning.
System Security Evaluation
Progent's certified security consultants can assess the effectiveness of your existing computer protection systems by performing exhaustive remote automated analysis based on advanced software tools and proven procedures. Progent's skill in this service saves you money and assures an objective picture of system vulnerability. The information your IT organization is provided can form the foundation of a security plan that can permit your network to operate dependably and react rapidly to future risks.
Automated Vulnerability Analysis
Progent provides expertise in the application of security evaluation products including Microsoft Baseline Security Analyzer and GFI LANguard for affordably running a variety of automatic network testing checks to identify possible security vulnerabilities. Progent has broad knowledge of additional security analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to understand testing reports and respond appropriately.
Progent can show you how to design security into your company operations, configure auditing software, define and deploy a protected network environment, and suggest policies to optimize the security of your IT system. Progent's security engineers are available to help you configure a firewall, design safe remote access to email and data, and install VPN. Learn more on Progent's network security analysis.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to enable small businesses to get an objective network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert runs an extensive examination of your IT infrastructure from outside your firewalled perimeter to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from a secure computer inside your firewall to determine the risk to internal attacks. The two security inventory services are configured and executed from a secured remote location. The process is overseen by a consultant with high-level security accreditations and who generates a report that details and analyzes the information collected by the security scan and suggests practical remediation if called for.
Network Penetration Analysis Support Services
Stealth intrusion testing is an important component of any comprehensive IT system security plan. Progentís security experts can run extensive intrusion tests without the awareness of your company's internal IT resources. Unannounced penetration checking shows whether existing security defense tools such as intrusion detection warnings and event log monitoring are properly set up and actively monitored. Learn more about Progent's network security penetration testing support services.
Firewalls and VPN Expertise
Progent's expertise in security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with key networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.
Cisco Security and VPN Engineering Expertise
Cisco's security and offsite connection products provide a complete line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Read more information about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.
Engineering Expertise for Other Firewall and VPN Products
Progent provides small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can help you create a comprehensive security strategy and choose the right technologies from a variety of vendors to achieve your security objectives while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis tools to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to manage the entire threat lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge tools packaged within a single agent managed from a unified control. Progent's data protection and virtualization experts can help your business to plan and configure a ProSight ESP deployment that addresses your company's specific requirements and that helps you achieve and demonstrate compliance with legal and industry information protection standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for urgent action. Progent's consultants can also help your company to set up and verify a backup and restore solution like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical data, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security companies to provide web-based management and world-class security for your email traffic. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hosting environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data about your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT documentation, you can save up to 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Design
Any business should develop a thoroughly considered security program that incorporates both proactive processes and response planning. The proactive strategy is a collection of mechanisms designed to reduce vulnerabilities. The reactive strategy assists your company's network security engineers to assess the damage caused by a security penetration, fix the network, document the event, and get business functions restored as soon as feasible.
Progent's certified IT security consultants can to assist you to perform a full vulnerability evaluation and define a company-wide security strategy to implement security policies and controls to minimize future attacks and dangers.
CISM Qualified Security Support Assistance
The Certified Information Security Manager (CISM) organization describes the basic capabilities and worldwide standards of skill that information security professionals are required to master. It provides executive management the confidence that those who have earned their CISM certification possess the experience and capability to deliver effective security administration and support services. Progent can provide the services of CISM Premier security consultants to help businesses with:
Read more information concerning Progent's CISM Qualified Information Security Engineering Expertise.
- Information Security Strategies
- Risk Analysis
- Information Security Program Management
- IS Security Management
- Response Management
CISSP Certified Security Engineering Services
The CISSP credential denotes mastery of a worldwide standard for network security. The American National Standards Institute has awarded the CISSP credential recognition in the field of information protection defined by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security areas including:
Read additional information concerning Progent's CISSP Qualified Network Security Consulting Professionals.
- Security Administration Practices
- Security Infrastructure and Models
- Access Management Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure System Architecture Consulting Support
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have been awarded ISSAP Certification as a result of rigorous examination and significant experience with information security architecture. The ISSAP credential represents proven skill in the more complex requirements of information security architecture within the broader field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-premier security experts can assist your business with all aspects of architecture security such as.
Read more details about Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.
- Access Control Systems and Techniques
- Telecom and System Infrastructure Protection
- Encryption/Decryption Solutions
- Needs Analysis and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Site Security
CISA Certified Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a recognized achievement that represents expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA professional association. Progent's CISA-certified network security audit specialists are available to help your IT organization in the areas of:
Get additional information concerning Progent's CISA Certified Network Security Auditing Consulting Support.
- IS Audit Process
- Information Technology Enforcement
- Network Assets and Architecture Lifecycle Planning
- IT Service Delivery
- Safeguarding Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and support IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and carry out a business continuity strategy that follows industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts offer a variety of risk identification services including:
Read additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and study documentation to identify major risk scenarios
- Inventory legal, industry, and contractual mandates and organizational policies related to your information system to assess their possible impact on your business goals
- Identify potential threats for your business processes to assist in analyzing your corporate risk
- Develop a risk awareness initiative and provide seminars to make sure your stakeholders appreciate IT risk so they can assist with your risk control program
- Match identified risk vectors to related operational processes to help assign risk responsibility
- Validate risk tolerance with executive management and key stakeholders to make sure they match
GIAC Accredited IS Security Consulting Expertise
GIAC was founded in 1999 to certify the skill of information technology security engineers. GIAC's mission is to make sure that an accredited security consultant has the knowledge needed to provide support in important areas of system, data, and application security. GIAC certifications are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified information security audit consultants are available to assist your business in the areas of:
Find out more details about Progent's GIAC Information Assurance Expertise.
- Auditing Perimeters
- Incident Handling
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Get in Touch with a Certified Security Engineer
To learn how to access a security engineer for remote or onsite assistance in Montana, call 1-800-993-9400 or go to Remote Computer Support.