Small business IT networks in North Carolina can now get fast and affordable online help from Progent's certified security support specialists to assist with critical security problems. The cost is competitive, billing is per minute, engagement is fast, and service is world class. Progent also offers help for long-term engagements that requires the services of seasoned security engineers with top security credentials.
In case your North Carolina office is situated some distance from larger metropolitan neighborhoods including Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, support from local certified security engineers may be problematic during a crisis. This can cause a loss of revenue for your company, angry clients, idle employees, and distracted executives. By calling Progent, you have access to a Certified security engineer who can deliver expertise whenever you need it to get your information system operating and recover your data.
Progent can help you in a variety of ways in your initiatives to protect your network with services that can range from security audits to creating a comprehensive security plan. Progent offers economical service to help businesses of all sizes to set up and maintain safe networks based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux operating systems as well as mobile users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to provide web-based control and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays within your corporate firewall.
Progent's security experts are accessible remotely or on premises to offer a range of emergency or longer-term computer security services such as:
If your network has an urgent need for computer security support, refer to Progent's Emergency Online Network Support.
- Perform comprehensive network security evaluations
- Recuperate promptly after virus and worm attacks
- Configure hardware and software firewalls
- Implement secure methods for offsite and mobile access
- Install effective software for protection against viruses, spam and DHAs
- Help create a company-wide security plan with round-the-clock monitoring
- Provide comprehensive Call Center Services
- Help Create an effective network backup and recovery strategy built around Data Protection Manager (DPM) backup capability
Progent's consultants provide advanced support in vital facets of computer protection including security assessment, firewall and VPN expertise, and advanced security planning.
Progent's certified security consultants can evaluate the effectiveness of your current network protection implementation by performing comprehensive remote automated testing via sophisticated utilities and proven procedures. Progent's experience in administering this service saves you time and money and assures an objective picture of gaps. The information your IT organization is provided can be used as the basis of a network protection plan that can permit your network to run safely and respond rapidly to new risks.
Automated Network Security Assessment
Progent offers expertise in the use of security testing utilities including MBSA and GFI LANguard Network Security Scanner for economically running a set of automatic system testing checks to identify possible security weaknesses. Progent has extensive knowledge of other security analysis products such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react effectively.
Progent can help you design security into your business operations, configure auditing applications, define and implement a secure network environment, and recommend policies to maximize the security of your network. Progent's security consultants are able to show you how to set up a firewall, implement safe remote access to email and business applications, and install VPN. Learn more on Progent's network security analysis.
Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory service packages intended to allow small companies to get an objective security assessment from a qualified security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your network from beyond your firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from an authorized machine within your company firewall to evaluate the risk to inside threats. The two security inventory packages are configured and executed from a protected remote location. The project is directed by a consultant with high-level security credentials and who generates a report that details and analyzes the information collected by the security scan and proposes practical improvements where appropriate.
Network Penetration Testing Support Services
Stealth penetration checking is a key part of any successful IT system security plan. Progentís security professionals can run extensive penetration checks without the knowledge of your organization's in-house network support staff. Stealth penetration testing shows whether current security defense tools such as intrusion detection alerts and event log monitoring are properly set up and consistently checked. Learn more concerning Progent's stealth penetration testing consulting.
Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
Cisco Security and VPN Engineering Expertise
Cisco's security and remote connection products offer a comprehensive range of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Find out additional information concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.
Consulting Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and Symantec. Progent can help you create a detailed security plan and select appropriate products from multiple suppliers to achieve your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely escape traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to manage the complete malware attack lifecycle including blocking, detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device management, and web filtering via cutting-edge technologies incorporated within one agent managed from a unified control. Progent's security and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that meets your organization's unique requirements and that helps you demonstrate compliance with legal and industry data protection regulations. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require urgent attention. Progent can also help you to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates your backup processes and allows fast recovery of critical data, apps and VMs that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical information. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security vendors to provide centralized control and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's onsite gateway device adds a further level of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hosting solution without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard data about your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can eliminate up to half of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need when you need it. Find out more about ProSight IT Asset Management service.
Certified Security Design
Any business ought to have a carefully considered security program that includes both pre-attack processes and response planning. The pre-attack plan is a collection of procedures intended to minimize vulnerabilities. The post-attack strategy assists your network security engineers to assess the damage resulting from a security penetration, repair the system, record the event, and get business functions operational as rapidly as feasible.
Progent's expert information security engineers are available to assist your business to run a full risk evaluation and create a network security strategy to implement security policies and controls to mitigate future assaults and dangers.
CISM Certified Security Consulting Services
The CISM committee defines the basic competencies and worldwide standards of performance that information security professionals are required to learn. CISM gives business management the confidence that those who have qualified for their CISM certification have the experience and capability to provide efficient security administration and support services. Progent can provide the services of CISM Premier security consultants to assist companies with:
Find out additional information about Progent's CISM Accredited Information Security Consulting Professionals.
- IS Security Strategies
- Risk Analysis
- Information Security Program Management
- Information Security Administration
- Response Planning
CISSP Qualified Security Consulting Expertise
CISSP certification recognizes mastery of a global standard for data security. ANSI (American National Standards Institute) has granted certification recognition in the field of information security defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields such as:
Find out more information concerning Progent's CISSP Information Security Consulting Expertise.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Technology
- Telecom, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Network Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier network architecture engineers are experts who have been awarded ISSAP status through rigorous testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the more in-depth demands of information system security architecture within the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-premier security consultants can assist your business with all phases of secure network architecture such as.
Learn additional information concerning Progent's ISSAP Accredited Secure Information System Architecture Engineering Services.
- Access Control Mechanisms and Methodologies
- Phone System and Network Infrastructure Protection
- Data Encryption Options
- Requirements Analysis and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Information System Security Auditing Consulting Services
The CISA accreditation is a globally recognized qualification that represents expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive test administered by the ISACA international professional group. Progent's CISA information security audit experts can help your company with:
Find out additional details concerning Progent's CISA Certified Information System Security Auditing Consulting Services.
- IS Audit Process
- IT Enforcement
- Network Assets and Architecture Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Data Assets
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify a consultant's skills to design, deploy, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk management experts can provide a variety of risk assessment services including:
Find out additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and review documentation to identify major risk scenarios
- Identify legal, industry, and business requirements and company standards associated with your information system to determine their potential influence on your strategic objectives
- Point out potential threats for your business workflows to assist in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
- Connect key risk vectors to your associated business procedures to help determine risk responsibility
- Validate risk tolerance with your senior management and major stakeholders to make sure they match
GIAC Qualified Network Security Consulting Expertise
Find out additional information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of IT security experts. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge necessary to deliver support in key areas of network, data, and software security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC security audit experts can assist your business with:
Talk to a Progent Security Expert
To find out how to contact a certified Progent security engineer for online or on-premises assistance in North Carolina, call 1-800-993-9400 or go to Remote Network Support.