Company computer networks inNorth Carolinacan depend on quick and affordable remote access to Progent's accredited network security engineers to fix complex security problems. Rates are affordable, charges are by the minute, engagement is immediate, and support is world class. Progent also offers help for complex projects that demand the knowledge of senior security consultants with top security credentials.
If yourNorth Carolinasmall business is based away from major urban neighborhoods likeCharlotte, Raleigh, Greensboro, Durham, or Winston-Salem, access to nearby certified security engineers may be limited during a security disaster. This can result in a drop in income for your business, upset customers, idle workers, and defocused executives. By utilizing Progent, you have access to a Certified security engineer ready to provide assistance when you have to have it to keep your computer network on line and restore your information.
Progent can assist you at any level in your initiatives to guard your information system with services that ranges from network security assessments to developing a company-wide security plan. Progent provides economical service to assist businesses of all sizes to configure and manage protected networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux operating systems as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to provide centralized management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further level of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall.
Progent's certified professionals are accessible remotely or in person to provide a variety of urgent or project-based IT security services such as:
If your business has an immediate requirement for IT security help, refer to Progent's Emergency Remote Technical Help.
Progent's engineers offer advanced support in key areas of network security that include security evaluation, firewalls and VPN, and advanced security consulting.
Progent's expert security engineers can assess the vulnerability of your current computer protection implementation through exhaustive remote automated analysis based on advanced utilities and proven procedures. Progent's experience in administering this service saves your company money and assures an objective portrayal of weaknesses. The information your business is provided can be used as the foundation of a network protection plan that will allow your network to run safely and respond quickly to new threats.
Automated Security Assessment
Progent provides expertise in the use of security analysis products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a set of programmed network auditing checks to identify possible security gaps. Progent has broad experience with other network auditing products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Netcat, and Nikto. Progent can show you how to understand testing reports and react effectively.
Progent can help you build protection into your company processes, configure scanning tools, plan and deploy a protected network architecture, and suggest policies to maximize the security of your IT system. Progent's security consultants are ready to help you set up a firewall, design safe remote access to email and business applications, and install VPN. Learn more about Progent's automated security analysis.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles intended to enable small businesses to get an objective security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive test of your network from outside your company firewall to uncover potential weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from a secure computer within your firewall to assess the risk to inside attacks. Both security inventory packages are configured and run from a protected remote location. The process is overseen by a consultant with high-level security credentials and who produces a document that details and analyzes the data captured by the security scan and suggests cost-effective remediation where appropriate.
Network Penetration Testing Support Services
Stealth penetration testing is an important part of any comprehensive network security plan. Progentís security experts can run thorough penetration tests without the awareness of your organization's internal network support resources. Stealth penetration testing shows whether existing security defense systems such as intrusion incident warnings and event log monitoring are properly set up and consistently monitored. Learn more on Progent's network penetration analysis consulting.
Progent's expertise in network security technology includes extensive field work with leading firewalls and Virtual Private Network (VPN) products from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote access technology provide a full line of manageable security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company goals. Find out more details concerning Progent's Consulting Services for Cisco Security Solutions and VPN Products.
Engineering Expertise for Other Firewall and VPN Products
Progent provides small and mid-size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWall. Progent can help you design a comprehensive security strategy and select appropriate products from a variety of vendors to support your security goals while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior machine learning technology to guard endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-based anti-virus products. ProSight ASM safeguards local and cloud-based resources and offers a single platform to automate the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge technologies packaged within one agent accessible from a single console. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your company's unique requirements and that allows you achieve and demonstrate compliance with government and industry data security standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent action. Progent can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical data, apps and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading data security companies to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and blocks most threats from making it to your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved immediately to a different hardware solution without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard information about your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Every company should develop a thoroughly considered security strategy that incorporates both proactive processes and response planning. The pre-attack plan is a set of steps that help to reduce security weaknesses. The reactive strategy assists your IT security engineers to assess the impact caused by a security penetration, repair the damage, document the event, and get the IT network running as rapidly as feasible.
Progent's certified IT security consultants can to assist your company to run a comprehensive risk assessment and create a network security strategy to establish security processes and mechanisms to reduce future assaults and threats.
CISM Certified Network Security Support Assistance
The CISM organization defines the core capabilities and global standards of performance that IT security managers are required to master. CISM gives executive management the assurance that those who have earned their CISM credential possess the background and capability to deliver effective security administration and consulting consulting. Progent offers the services of CISM Certified security consultants to help businesses with:
Read additional details concerning Progent's CISM Security Engineering Expertise.
- Network Security Processes
- Risk Analysis
- Network Security Program Management
- IS Security Administration
- Recovery Planning
CISSP Qualified Security Consulting Services
The CISSP credential denotes expertise with a worldwide standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information security defined by ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a variety security areas including:
Read additional details concerning Progent's CISSP-certified Information Security Consulting Professionals.
- Security Management Practices
- Security Infrastructure and Models
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have earned ISSAP Certification through rigorous examination and extensive work with information security architecture. The ISSAP certification represents proven mastery in the most complex demands of information security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security including.
Read more details concerning Progent's ISSAP Certified Secure Information System Architecture Support Expertise.
- Access Control Mechanisms and Techniques
- Phone System and Network Infrastructure Security
- Encryption/Decryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Physical Security
CISA Certified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that signifies mastery in information system security auditing. Accredited by ANSI, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA professional group. Progent's CISA-certified IS security audit engineers are available to assist your company with:
Read more details concerning Progent's CISA Accredited IS Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Enforcement
- Network Assets and Architecture Planned Useful Life
- IT Service Delivery
- Protecting Data Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to validate an IT professional's ability to design, deploy, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation consultants can provide a variety of risk identification services such as:
Find out the details concerning Progent's CRISC Risk Management Consultants.
- Collect information and study documentation to identify significant vulnerabilities
- Identify statutory, regulatory, and contractual requirements and organizational policies associated with your network to determine their potential influence on your business objectives
- Point out possible vulnerabilities for your business workflows to help in evaluating your enterprise risk
- Create a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate information system risk so they can contribute to your risk control program
- Connect identified risk vectors to your associated operational processes to help assign risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they match
GIAC Qualified Information System Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of computer security professionals. GIAC's goal is to make sure that a certified security consultant has the knowledge needed to deliver support in important areas of network, information, and application program security. GIAC certifications are acknowledged by businesses and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-certified network security audit experts are available to assist your company in the areas of:
Read additional information concerning Progent's GIAC Information Assurance Support.
- Auditing Networks
- Security Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Specialist
To see how to get in touch with a certified security engineer for remote or onsite support in North Carolina, phone 1-800-993-9400 or go to Remote Network Help.