Small business IT networks in the state of New Hampshire can have prompt and affordable online help from Progent's qualified network security consultants to fix complex security issues. Rates are affordable, charges are per minute, engagement is immediate, and service is world class. Progent also provides help for complex projects that requires the knowledge of seasoned security consultants with high-level industry certifications.

In case your New Hampshire office is away from larger metropolitan neighborhoods including Manchester, Nashua, or Concord, the availability of nearby qualified security consultants is often problematic when you have an emergency. This could mean lost productivity for your business, upset customers, unproductive workers, and distracted executives. By calling Progent's remote support, you have access to a Certified security consultant ready to provide assistance whenever you require it to get your information system operating and restore your data.

Progent can help you at any level in your efforts to protect your information system with services that ranges from network security audits to creating a comprehensive security plan. Progent offers affordable service to assist small and midsize companies to configure and maintain secure IT environments based on Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to provide web-based management and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also enable Exchange Server to track and protect internal email that originates and ends inside your corporate firewall.

Progent's certified consultants are accessible online or on site to offer a range of urgent or project-based IT security services which include:

  • Perform extensive security audits
  • Recover rapidly after serious security breaches
  • Configure hardware and software firewalls
  • Configure secure solutions for remote and mobile access
  • Deploy effective utilities for automatic protection against spam and directory harvest attacks
  • Help create a comprehensive security plan with proactive network monitoring
  • Provide outsourced Call Center Support
  • Help Create an effective backup and business continuity strategy based on Microsoft DPM automated backup capability
If your company has an emergency need for computer security support, go to Progent's Emergency Remote Network Support.

Progent's consultants can deliver world-class services in key facets of computer security that include security assessment, firewall and VPN expertise, and advanced security consulting.

System Audits
Progent's expert security consultants can assess the strength of your existing computer security implementation by performing exhaustive remote automated testing via advanced software tools and tested techniques. Progent's skill in administering this service saves you money and offers an accurate picture of gaps. The knowledge your IT organization gains can form the foundation of a security plan that can allow your information system to run safely and react quickly to new threats.

Automated Security Audits
Progent provides expertise in the use of security evaluation products including Microsoft's MBSA and GFI LANguard for economically performing a variety of programmed network auditing scans to uncover potential security weaknesses. Progent has broad experience with additional network analysis tools such as NMAP, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of audit reports and react effectively.

Progent can help you design protection into your business operations, install scanning software, define and deploy a secure system environment, and recommend policies to maximize the safety of your IT system. Progent's security consultants are ready to show you how to set up a firewall, design safe remote connectivity to email and data, and install virtual private network. Find out additional information on Progent's network security evaluation.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two low-cost security inventory bundles designed to enable small companies to get an impartial security assessment from a qualified security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your network from beyond your firewall to determine possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a system scan from an authorized computer within your company firewall to assess vulnerabilities to inside threats. The two security inventory services are set up and executed from a protected remote location. The project is directed by a consultant who has earned top security credentials and who produces a report that summarizes and analyzes the data captured by the security scan and suggests cost-effective improvements where appropriate.

Network Security Penetration Testing Support Services
Stealth intrusion testing is an important component of any serious network security strategy. Progentís security professionals can perform thorough penetration tests without the awareness of your organization's internal network support resources. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event log monitoring are properly set up and consistently monitored. Find out more on Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Network Security and VPN Consulting Expertise
Cisco's security and remote connection products offer a full range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes experienced engineers with Cisco CCIE and CCNP qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Find out additional details about Progent's Engineering Services for Cisco Security and VPN Products.

Support Expertise for Other Firewall and VPN Solutions
Progent offers small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and choose the right products from multiple vendors to achieve your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to defend endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to manage the entire threat progression including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides firewall protection, penetration alarms, device management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your company's specific needs and that allows you prove compliance with legal and industry information protection regulations. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent can also assist your company to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup processes and allows rapid restoration of vital files, apps and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can provide world-class expertise to set up ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security companies to provide web-based control and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect data related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time spent searching for vital information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any business ought to develop a thoroughly considered security strategy that includes both preventive processes and reaction planning. The proactive strategy is a collection of steps intended to minimize vulnerabilities. The post-attack strategy helps your company's security engineers to assess the impact caused by a security penetration, repair the network, document the experience, and get the IT network running as rapidly as possible.

Progent's expert information security consultants are available to help your company to run a comprehensive vulnerability evaluation and create a company-wide security plan to implement security processes and controls to mitigate future assaults and threats.

CISM Qualified System Security Support Expertise
The CISM committee defines the basic capabilities and global standards of performance that information security professionals are expected to master. CISM provides business management the confidence that consultants who have earned their CISM certification have the experience and capability to deliver efficient security administration and support consulting. Progent can provide the support of CISM Premier security professionals to assist businesses with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Management
  • Response Management
Learn additional details about Progent's CISM Accredited IS Security Engineering Professionals.

CISSP Qualified Security Engineering Expertise
CISSP denotes expertise with a global standard for network security. ANSI has granted certification recognition in the field of information security stipulated by ISO 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a variety security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Read more information about Progent's CISSP Qualified Information Security Support Professionals.

CISSP-ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified IT architecture engineers are consultants who have earned ISSAP Certification through thorough examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most complex demands of information system security architecture bounded by the broader field of information security knowledge required for CISSP accreditation. Progent's ISSAP-premier security specialists can help your business with all aspects of architecture security such as.

  • Access Control Systems and Methodologies
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read more information about Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.

CISA Qualified IS Security Auditing Consulting Assistance
The CISA credential is a prestigious achievement that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive examination given by the ISACA professional association. Progent's CISA-certified information security audit specialists can help your business with:

  • IS Audit Process
  • IT Enforcement
  • Systems and Architecture Lifecycle
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISA Accredited Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and maintain IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist you to create and carry out a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk management consultants offer a range of risk evaluation services such as:

  • Collect data and study documentation to evaluate significant vulnerabilities
  • Identify legal, regulatory, and contractual mandates and company standards associated with your network to determine their possible impact on your business goals
  • Identify potential vulnerabilities for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide training to ensure your organization understand IT risk so they can assist with your risk management process
  • Connect key risk vectors to your associated business procedures to help assign risk ownership
  • Validate risk appetite with executive leadership and major stakeholders to ensure they align
Learn more details about Progent's CRISC Risk Management Consultants.

GIAC Certified IS Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security experts. GIAC's mission is to verify that a certified security consultant has the knowledge necessary to deliver support in vital categories of network, information, and program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified information security audit specialists are available to assist your business in the areas of:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Expert
To see how to access a security consultant for online or on-premises assistance in New Hampshire, call 1-800-993-9400 or visit Remote Computer Support.