Company IT networks in the state ofNew Hampshirecan have quick and affordable remote access to Progent's qualified security engineers to assist with urgent security issues. The cost is affordable, charges are per minute, engagement is quick, and service is world class. Progent also offers help for complex engagements that requires the expertise of seasoned security engineers with top industry credentials.
In case yourNew Hampshirenetwork is based outside of larger urban areas includingManchester, Nashua, or Concord, contact with local qualified network security professionals could be limited when there's a crisis. This can cause a drop in productivity for your company, upset clients, unproductive workers, and defocused executives. By utilizing Progent, you have access to a Certified security professional who can deliver assistance when you need it to keep your computer network running and recover your data.
Progent can help you in a variety of ways in your efforts to protect your IT environment with support that ranges from network security audits to developing a comprehensive security strategy. Progent provides affordable service to help companies of any size to set up and maintain safe networks based on Windows and Cisco technology and that may include computers based on UNIX or Linux platforms as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security companies to deliver centralized management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter.
Progent's certified engineers are accessible online or in person to offer a variety of urgent or longer-term computer security services which include:
If your business has an emergency requirement for computer security support, go to Progent's Urgent Remote Technical Help.
- Run extensive network security audits
- Clean up promptly after serious security breaches
- Configure firewalls from multiple vendors
- Implement secure methods for offsite and mobile connectivity
- Install effective applications for automatic protection against viruses, spam and DHAs
- Develop a company-wide security strategy with proactive monitoring
- Offer comprehensive Help Desk Services
- Create a practical network backup and recovery strategy built around Data Protection Manager backup/restore technology
Progent's consultants can deliver advanced support in key fields of system security including analysis, firewall and VPN solutions, and high-level security planning.
Progent's certified security engineers can evaluate the effectiveness of your existing computer security environment through comprehensive remote automated testing based on advanced software tools and tested techniques. Progent's experience in administering this testing saves you money and assures a detailed picture of weaknesses. The knowledge your business gains can be used as the foundation of a security strategy that will allow your network to operate safely and respond quickly to future threats.
Automated Security Audits
Progent offers consulting in the application of security testing software such as MBSA and LANguard from GFI for economically running a variety of automatic system auditing checks to identify potential security vulnerabilities. Progent has extensive knowledge of additional security auditing products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can help you build security into your company operations, configure auditing tools, define and implement a secure network environment, and recommend policies to optimize the security of your IT system. Progent's security professionals are available to assist you to configure a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn more on Progent's network security assessment.
Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles designed to allow small companies to receive a professional security assessment from an accredited security expert. With Progent's External Security Inventory Checkup, a security engineer administers an extensive examination of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from an authorized computer within your firewall to evaluate vulnerabilities to internal assaults. The two security inventory services are set up and run from a secured external location. The project is directed by an engineer who has earned high-level security credentials and who generates a document that details and analyzes the data captured by the security scan and suggests cost-effective improvements if appropriate.
Stealth Penetration Testing Support Services
Stealth penetration testing is a key component of any successful IT system security plan. Progentís security professionals can perform thorough intrusion tests without the knowledge of your company's internal IT staff. Unannounced penetration testing shows whether current security defense systems such as intrusion incident warnings and event log analysis are properly set up and consistently monitored. Find out additional information on Progent's stealth security penetration testing support services.
Progent's expertise in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network products offered by multiple companies including Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and VPN Engineering Expertise
Cisco's security and offsite connection technology provide a full line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business goals. Learn more details concerning Progent's Support Services for Cisco Security Technology and VPN Products.
Engineering Services for Other Firewall and Virtual Private Network Products
Progent provides small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a detailed security plan and choose the right products from multiple vendors to achieve your security goals while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to guard endpoints as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which easily escape traditional signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to automate the complete threat progression including filtering, identification, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering via cutting-edge technologies incorporated within one agent managed from a unified console. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP deployment that addresses your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry data protection regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also help you to set up and test a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates your backup processes and enables fast restoration of vital data, apps and VMs that have become lost or corrupted due to hardware failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading data security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the apps. Since the environment is virtualized, it can be moved immediately to a different hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any business should have a carefully thought out security strategy that incorporates both proactive processes and response plans. The pre-attack strategy is a set of steps intended to reduce vulnerabilities. The post-attack plan assists your network security engineers to evaluate the impact resulting from an attack, repair the network, document the event, and get business functions restored as rapidly as feasible.
Progent's certified information security engineers are available to help your business to run a comprehensive vulnerability assessment and define a computer security plan to establish security policies and mechanisms to mitigate ongoing attacks and dangers.
CISM Certified System Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of performance that information security professionals are expected to master. It gives business management the assurance that consultants who have earned their CISM certification have the experience and capability to deliver effective security management and consulting consulting. Progent offers the support of CISM Certified security professionals to help companies with:
Find out additional details concerning Progent's CISM Security Engineering Services.
- IS Security Processes
- Risk Management
- Network Security Implementation Management
- Network Security Administration
- Recovery Planning
CISSP Accredited Security Consulting Expertise
The CISSP credential recognizes mastery of a global standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a variety security areas including:
Find out additional details about Progent's CISSP Information Security Support Professionals.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecommunications, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified system architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous testing and extensive work with network security architecture. The ISSAP certification indicates proven competence in the most complex requirements of information security architecture within the wider scope of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of architecture security including.
Read more information concerning Progent's ISSAP Qualified Secure IT Architecture Consulting Services.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Protection
- Encryption/Decryption Options
- Needs Evaluation and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that indicates expertise in IS security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test given by the ISACA professional association. Progent's CISA-certified network security audit experts can help your IT organization in the areas of:
Get more details concerning Progent's CISA Accredited Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Enforcement
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Protecting Data Assets
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's ability to design, deploy, and maintain IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and carry out a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation consultants offer a range of risk identification services such as:
Find out additional details concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to help identify major vulnerabilities
- Inventory legal, regulatory, and contractual requirements and organizational policies related to your network to assess their potential influence on your business goals
- Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
- Develop a risk awareness program and conduct training to make sure your organization appreciate IT risk so they can contribute to your risk management program
- Connect key risk vectors to related operational processes to help assign risk ownership
- Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
GIAC Qualified Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security engineers. GIAC's goal is to make sure that an accredited security consultant has the knowledge necessary to deliver support in key areas of network, data, and software security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-certified network security audit engineers can assist your business with:
Find out additional details about Progent's GIAC Information Assurance Services.
- Assessing Perimeters
- Incident Response
- Traffic Analysis
- Web Services Security
- SIEM solutions
Get in Touch with a Progent Security Expert
To learn how you can access a certified Progent security engineer for online or onsite help in New Hampshire, phone 1-800-993-9400 or visit Remote Network Help.