Company computer networks in the state of New Hampshire now have prompt and economical online access to Progent's certified network security support specialists to help with the toughest security problems. The cost is reasonable, charges are by the minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the knowledge of senior security engineers with top industry credentials.

In case your New Hampshire organization is based some distance from more populated metropolitan areas including Manchester, Nashua, or Concord, support from local certified network security consultants could be problematic when you have an emergency. This could mean a loss of revenue for your company, upset clients, idle workers, and defocused management. By contacting Progent, you can get in touch with a Certified security professional ready to provide expertise when you need it to get your computer network on line and salvage your data.

Progent can help you at any level in your initiatives to guard your network with support that ranges from network security assessments to developing a company-wide security strategy. Progent provides affordable support to assist businesses of all sizes to design and maintain safe networks based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security companies to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper layer of analysis for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends inside your security perimeter.

Progent's certified engineers are accessible online or in person to offer a variety of urgent or project-based network security services including:

If your company has an urgent requirement for computer security help, refer to Progent's Emergency Online Technical Help.

Progent's consultants provide advanced services in key fields of system security including security assessment, firewall and VPN solutions, and high-level security planning.

Security Audits
Progent's certified security consultants can evaluate the effectiveness of your existing network security systems through comprehensive remote automated analysis based on sophisticated utilities and proven procedures. Progent's experience in administering this testing saves you time and money and assures an objective picture of weaknesses. The information your business is provided can make up the basis of a network protection plan that can allow your network to run dependably and react rapidly to future risks.

Automated Security Analysis
Progent provides consulting in the application of security analysis packages including Microsoft Baseline Security Analyzer and LANguard from GFI for economically running a set of programmed system auditing checks to uncover potential security gaps. Progent has extensive knowledge of other security auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you build protection into your business operations, configure auditing applications, define and deploy a protected system architecture, and recommend policies to maximize the security of your IT system. Progent's security consultants are ready to show you how to set up a firewall, design safe remote connectivity to email and business applications, and install virtual private network. Find out additional information about Progent's network security evaluation.

Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory packages intended to allow small businesses to receive an impartial security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from outside your company firewall to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a system scan from an authorized machine inside your firewall to evaluate your exposure to inside attacks. Both security inventory services are configured and run from a protected remote site. The process is directed by an engineer with top security credentials and who produces a report that details and analyzes the data collected by the scan and proposes practical improvements if appropriate.

Stealth Penetration Testing Support Services
Stealth intrusion testing is an important part of any successful IT system security plan. Progentís security professionals can run thorough intrusion tests without the knowledge of your organization's in-house network support staff. Stealth penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log monitoring are properly configured and consistently monitored. Learn additional information on Progent's stealth security penetration analysis consulting.

Firewall/VPN Expertise
Progent's background in security solutions includes in-depth field work with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to manage your current PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection products represent a full line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Read more details concerning Progent's Engineering Expertise for Cisco Security Technology and VPN Appliances.

Support Services for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWall. Progent can help you design a detailed security strategy and select the right technologies from a variety of vendors to support your security goals while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based machine learning tools to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade traditional signature-matching AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to manage the complete threat lifecycle including blocking, identification, mitigation, remediation, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device control, and web filtering through leading-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's unique needs and that helps you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup processes and allows fast recovery of vital data, apps and VMs that have become lost or corrupted due to hardware failures, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security vendors to deliver web-based management and comprehensive protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hosting solution without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect information about your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSLs or domains. By updating and organizing your network documentation, you can save as much as half of time spent trying to find vital information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Planning
Every company ought to develop a carefully considered security program that incorporates both pre-attack processes and reaction plans. The pre-attack strategy is a set of mechanisms intended to reduce security weaknesses. The reactive strategy helps your company's IT security engineers to assess the damage resulting from an attack, fix the network, record the event, and get business functions restored as quickly as feasible.

Progent's certified IS security engineers are available to help you to run a comprehensive risk assessment and create a computer security plan to implement security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Accredited Information Security Support Assistance
The CISM committee defines the core capabilities and global standards of skill that information security managers are expected to master. CISM gives executive management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to provide effective security management and support services. Progent can provide the services of CISM Certified security professionals to assist businesses with:

  • Network Security Strategies
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Read more information concerning Progent's CISM Certified Information Security Consulting Expertise.

CISSP Accredited Security Consulting Services
The CISSP credential recognizes mastery of an international standard for information security. ANSI has granted certification accreditation in the field of data security under ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISSP Information Security Consulting Expertise.

CISSP-ISSAP Qualified Secure Information System Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified IT architecture engineers are experts who have earned ISSAP Certification as a result of thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the most in-depth requirements of IS security architecture bounded by the wider scope of IS security knowledge required for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Telecom and Network Security
  • Data Encryption Options
  • Requirements Analysis and Security Criteria
  • BCP and Disaster Recovery Planning
  • Physical Security
Read additional information concerning Progent's ISSAP Certified Secure IT Architecture Engineering Services.

CISA Accredited IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that represents expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test administered by the ISACA international professional group. Progent's CISA-qualified IS security audit engineers are available to assist your business in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Planning
Get additional information about Progent's CISA Certified Security Auditing Consulting Services.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's skills to design, deploy, and maintain information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity plan based on industry best practices promoted by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation consultants can provide a variety of risk assessment services including:

  • Collect information and study documentation to identify major risk scenarios
  • Identify statutory, industry, and contractual mandates and company standards associated with your information system to determine their potential influence on your strategic goals
  • Point out possible vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness program and provide seminars to make sure your organization appreciate information system risk so they can assist with your risk management program
  • Connect identified risk scenarios to related business processes to help assign risk ownership
  • Validate risk tolerance with executive management and major stakeholders to ensure they align
Get additional information about Progent's CRISC Risk Management Consultants.

GIAC Certified Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security professionals. GIAC's goal is to make sure that an accredited professional has the skills needed to deliver support in critical areas of network, information, and application program security. GIAC certifications are recognized by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit specialists can help your business in the areas of:

  • Auditing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Specialist
To see how you can contact a certified Progent security engineer for online or on-premises expertise in New Hampshire, call 1-800-993-9400 or visit Online Computer Help.