Company computer networks in the state of North Carolina can now get quick and affordable remote technical support from Progent's qualified security engineers to help with urgent security problems. The cost is competitive, billing is by the minute, sign-up is immediate, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the expertise of seasoned security engineers with high-level industry certifications.

If your North Carolina small business is located outside of major metropolitan areas such as Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, access to nearby qualified network security engineers may be problematic during an urgent situation. This can cause a loss of revenue for your business, angry clients, idle workers, and distracted management. By calling Progent, you can get in touch with a Certified security professional ready to offer help whenever you have to have it to get your system operating and restore your data.

Progent can assist you at any level in your efforts to guard your IT environment with support that can range from network security checks to developing a comprehensive security strategy. Progent offers economical support to help businesses of all sizes to design and maintain safe networks based on Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of top information security vendors to provide centralized management and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further layer of inspection for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall.

Progent's security professionals are available remotely or on premises to offer a variety of emergency or longer-term IT security services including:

  • Run comprehensive security audits
  • Recover promptly after serious security breaches
  • Configure and troubleshoot firewalls
  • Configure secure solutions for remote and mobile connectivity
  • Deploy effective utilities for protection against spam and directory harvest attacks
  • Help create a company-wide security plan with 24x7 network monitoring
  • Offer outsourced Help Desk Services
  • Help Develop an effective data backup and recovery plan centered on Microsoft Data Protection Manager backup capability
If your network has an emergency need for computer security support, refer to Progent's Urgent Online Network Help.

Progent's support professionals provide world-class support in vital areas of computer security including analysis, firewall and VPN expertise, and high-level security consulting.

System Assessment
Progent's certified security consultants can assess the strength of your existing computer security environment by performing comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's skill in administering this testing saves you consulting fees and offers an objective portrayal of security holes. The knowledge your IT organization gains can form the foundation of a security strategy that will permit your information system to run safely and adapt rapidly to future threats.

Automated Network Vulnerability Assessment
Progent offers consulting in the application of security analysis packages such as Microsoft Baseline Security Analyzer and LANguard from GFI for economically running a variety of automatic network testing checks to identify possible security gaps. Progent has broad knowledge of other network analysis products including NMAP, AMAP Application Scanner, eEye, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.

Progent can show you how to design protection into your company operations, install auditing tools, define and deploy a protected system architecture, and suggest procedures to optimize the safety of your network. Progent's security professionals are available to help you configure a firewall, design safe remote access to email and data, and integrate virtual private network. Find out more on Progent's network security evaluation.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to enable small companies to receive an impartial security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from beyond your company firewall to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from a secure machine within your company firewall to uncover vulnerabilities to internal assaults. Both security inventory services are configured and executed from a protected external site. The project is managed by a consultant who has earned top security credentials and who generates a document that details and interprets the information collected by the scan and proposes practical remediation if called for.

Stealth Intrusion Testing Support Services
Stealth penetration testing is an important part of any comprehensive network security strategy. Progentís security professionals can run thorough penetration tests without the knowledge of your company's internal IT resources. Stealth penetration testing shows whether current security monitoring tools such as intrusion detection alerts and event history analysis are correctly configured and consistently monitored. Learn additional information about Progent's stealth security penetration testing consulting.

Firewalls and VPN Support
Progent's expertise in security technology encompasses extensive field work with major firewalls and Virtual Private Network products offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants with key networking certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access technology represent a complete line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and CCNP certifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business objectives. Read additional information concerning Progent's Consulting Services for Cisco Security Technology and VPN Appliances.

Consulting Expertise for Other Firewall and VPN Technology
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior analysis technology to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and offers a unified platform to manage the complete malware attack lifecycle including filtering, infiltration detection, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows VSS and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge tools incorporated within one agent accessible from a unified control. Progent's data protection and virtualization experts can help your business to design and implement a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with legal and industry information protection regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate action. Progent can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of vital files, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top data security companies to provide web-based control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that stays inside your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported immediately to an alternate hardware environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect data related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save up to 50% of time wasted trying to find critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Design
Any business should develop a thoroughly thought out security strategy that includes both preventive processes and reaction planning. The proactive plan is a collection of mechanisms designed to minimize security weaknesses. The post-attack plan assists your network security engineers to evaluate the impact caused by a security penetration, fix the damage, record the experience, and get the IT network operational as soon as possible.

Progent's expert information security engineers can to assist your business to run a full vulnerability assessment and create a computer security plan to implement security policies and mechanisms to reduce ongoing assaults and threats.

CISM Qualified Network Security Consulting Services
The Certified Information Security Manager (CISM) committee describes the core competencies and global standards of performance that IT security professionals are required to learn. It provides business management the assurance that those who have earned their CISM certification possess the experience and knowledge to deliver effective security management and support services. Progent can provide the support of CISM Certified security consultants to assist companies with:

  • Information Security Strategies
  • Vulnerability Analysis
  • Information Security Implementation Management
  • Information Security Management
  • Response Planning
Find out additional details about Progent's CISM Network Security Consulting Services.

CISSP Certified Security Engineering Services
CISSP certification denotes mastery of a global standard for information security. The American National Standards Institute has awarded certification accreditation in the field of data protection defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Find out additional details concerning Progent's CISSP Information Security Support Professionals.

CISSP-ISSAP Certified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier system architecture engineers are consultants who have been awarded ISSAP Certification as a result of rigorous testing and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the more in-depth demands of IS security architecture within the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Security
  • Cryptography Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Read more details concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Services.

CISA Certified Security Auditing Consulting Assistance
The Certified Information Systems Auditor credential is a prestigious achievement that represents expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass an extensive test given by the ISACA professional group. Progent's CISA-certified network security audit experts can assist your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle
  • IT Support
  • Safeguarding Information Resources
  • Business Continuity Planning
Get more details about Progent's CISA Certified Information System Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's skills to design, implement, and support information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and carry out a business continuity strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk management experts can provide a range of risk evaluation services such as:

  • Collect information and study documentation to help identify major risk scenarios
  • Inventory legal, regulatory, and contractual mandates and organizational standards associated with your information system to determine their possible impact on your strategic goals
  • Identify potential threats for your operational workflows to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to make sure your organization appreciate IT risk so they can assist with your risk control program
  • Match identified risk vectors to related business procedures to help assign risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to ensure they align
Get the details concerning Progent's CRISC Risk Management Consultants.

GIAC Accredited Information System Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security experts. GIAC's mission is to verify that an accredited security consultant has the knowledge necessary to provide support in key categories of network, data, and application program security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC security audit engineers can help your company in the areas of:

  • Assessing Security Systems
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Find out more details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Engineer
To see how to get in touch with a security engineer for online or on-premises assistance in North Carolina, call 1-800-993-9400 or visit Remote Computer Help.