Company networks inNebraskacan now get prompt and affordable online technical support from Progent's certified security support specialists to help with complex security problems. The cost is competitive, charges are by the minute, engagement is fast, and service is world class. Progent also provides assistance for long-term engagements that demand the expertise of seasoned security consultants with high-level industry certifications.
If yourNebraskaoffice is situated away from larger metropolitan areas such asOmaha, Lincoln, Bellevue, or Grand Island, the availability of local qualified security professionals may be problematic during a security disaster. This can cause a loss of revenue for your company, angry clients, unproductive employees, and distracted management. By utilizing Progent, you have access to a Premier security engineer ready to deliver help when you have to have it to keep your network operating and salvage your data.
Progent can assist you in all your efforts to guard your information system with support services ranging from network security checks to creating a comprehensive security plan. Progent provides affordable service to help companies of any size to set up and manage safe networks powered by Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems plus mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver web-based management and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter.
Progent's security professionals are available remotely or on premises to offer a variety of emergency or longer-term IT security services including:
If your company has an immediate requirement for IT security help, refer to Progent's Emergency Remote Technical Support.
- Perform thorough security audits
- Clean up quickly after attacks
- Set up hardware and software firewalls
- Configure secure solutions for remote and mobile access
- Deploy advanced solutions for automatic defense against viruses, spam and directory harvest attacks
- Develop a comprehensive security plan with 24x7 monitoring
- Provide outsourced Call Center Services
- Develop an effective backup and recovery solution centered on Data Protection Manager (DPM) automated backup technology
Progent's security experts can deliver world-class support in key fields of system protection including security evaluation, firewall and VPN solutions, and high-level security consulting.
System Security Evaluation
Progent's certified security consultants can evaluate the vulnerability of your existing computer security environment by performing comprehensive remote automated testing via advanced software tools and proven techniques. Progent's experience in administering this service saves you consulting fees and assures an objective portrayal of weaknesses. The information your IT organization gains can form the basis of a network protection plan that will permit your information system to run safely and adapt quickly to future risks.
Automated Vulnerability Assessment
Progent provides consulting in the use of security evaluation utilities such as MBSA and GFI LANguard NSS for affordably running a variety of automatic system auditing scans to uncover potential security holes. Progent has broad experience with additional network auditing utilities such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities such as SolarWinds, Netcat, and Nikto. Progent can show you how to understand audit reports and respond appropriately.
Progent can help you design protection into your business processes, install auditing applications, plan and deploy a secure system architecture, and recommend procedures to optimize the security of your IT system. Progent's security engineers are available to assist you to set up a firewall, implement safe remote access to email and business applications, and install VPN. Learn additional information concerning Progent's automated security audits.
Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory service packages designed to enable small businesses to receive an impartial network security assessment from an accredited security specialist. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from outside your firewall to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from an authorized machine inside your firewall to determine vulnerabilities to inside attacks. The two security inventory services are configured and run from a protected remote location. The project is managed by an engineer who has earned top security credentials and who generates a report that summarizes and analyzes the data collected by the security scan and suggests practical remediation if called for.
Stealth Intrusion Analysis Support Services
Stealth penetration testing is an important component of any serious network security plan. Progent's security experts can run extensive penetration tests without the knowledge of your company's internal IT staff. Unannounced penetration checking shows whether current security defense systems such as intrusion detection alerts and event log monitoring are properly configured and consistently checked. Find out more concerning Progent's network penetration testing consulting.
Progent's expertise in network security technology includes in-depth field work with leading firewalls and Virtual Private Network technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and VPN Engineering Expertise
Cisco's network security and remote connection technology offer a comprehensive line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your business objectives. Read additional details concerning Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.
Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as Check Point Software, Juniper Networks, and SonicWall. Progent can show you how to create a comprehensive security strategy and choose appropriate products from a variety of suppliers to achieve your security goals while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes SentinelOne's next generation behavior machine learning technology to guard endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to manage the complete threat progression including protection, infiltration detection, containment, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Progent is a SentinelOne Partner. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery based on SentinelOne technology.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection services offer ultra-affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, device management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a single control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that addresses your company's specific needs and that helps you prove compliance with government and industry information protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require immediate attention. Progent can also help you to install and test a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of vital files, apps and virtual machines that have become unavailable or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPAA, FIRPA, and PCI and, when necessary, can help you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top data security vendors to deliver centralized control and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Since the system is virtualized, it can be ported easily to a different hardware solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect data about your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether you're planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more about ProSight IT Asset Management service.
Certified Network Security Design
Any company ought to have a carefully thought out security strategy that incorporates both pre-attack procedures and reaction planning. The pre-attack strategy is a collection of procedures designed to reduce vulnerabilities. The reactive plan helps your company's IT security personnel to evaluate the damage resulting from a security penetration, repair the network, record the event, and get the IT network restored as rapidly as feasible.
Progent's expert information security consultants are available to assist your company to perform a complete vulnerability evaluation and create a network security plan to implement security policies and controls to reduce future assaults and dangers.
CISM Accredited System Security Engineering Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and global standards of skill that information security managers are required to learn. CISM gives business management the assurance that those who have earned their CISM certification have the background and capability to deliver efficient security management and support services. Progent offers the expertise of CISM Premier security consultants to assist companies with:
Find out additional information concerning Progent's CISM Qualified Security Support Expertise.
- IS Security Strategies
- Vulnerability Management
- Information Security Implementation Management
- IS Security Management
- Response Planning
CISSP Qualified Security Consulting Assistance
CISSP denotes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data security under ISO 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your business in a broad range of security areas such as:
Learn more information concerning Progent's CISSP Security Consulting Expertise.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Systems and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption Technology
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous examination and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the most challenging requirements of information system security architecture bounded by the broader scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security consultants can help your company with all phases of secure network architecture including.
Read additional details concerning Progent's ISSAP Accredited Secure Information System Architecture Support Services.
- Access Management Systems and Techniques
- Telecom and System Infrastructure Security
- Encryption/Decryption Solutions
- Needs Evaluation and Security Standards
- BCP and DRP
- Hardware Security
CISA Certified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates expertise in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates pass a comprehensive examination given by the ISACA international professional group. Progent's CISA-qualified information security audit specialists can help your business in the areas of:
Read more information about Progent's CISA Accredited Security Auditing Engineering Support.
- IS Audit Process
- IT Administration
- Network Assets and Architecture Planned Useful Life
- IT Support
- Protecting Data Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support IS controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and execute a workplace continuity plan based on industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation consultants can provide a variety of risk assessment services such as:
Find out more information concerning Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to help identify significant vulnerabilities
- Inventory statutory, regulatory, and contractual requirements and company policies related to your information system to assess their possible influence on your strategic objectives
- Identify possible vulnerabilities for your operational workflows to assist in evaluating your enterprise risk
- Create a risk awareness program and provide training to ensure your stakeholders appreciate IT risk so they can assist with your risk management process
- Connect key risk vectors to related business processes to help assign risk responsibility
- Validate risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
GIAC Qualified IS Security Engineering Support
GIAC was established in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to assure that an accredited professional possesses the skills appropriate to provide support in critical areas of network, data, and application security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit specialists can assist your company with:
Find out additional information concerning Progent's GIAC Information Assurance Services.
- Auditing Security Systems
- Security Incident Handling
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Get in Touch with a Progent Security Engineer
To see how you can get in touch with a certified security consultant for online or onsite help in Nebraska, phone 1-800-993-9400 or go to Online Computer Support.