Small business networks in North Carolina now have fast and affordable online technical support from Progent's qualified security consultants to fix urgent security issues. The cost is reasonable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also provides help for long-term projects that demand the expertise of seasoned security consultants with high-level industry credentials.

In case your North Carolina business is situated outside of major metropolitan neighborhoods such as Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, help from nearby certified network security experts is often limited when there's a crisis. This could mean a drop in revenue for your company, upset customers, idle employees, and defocused management. By contacting Progent's online services, you can get in touch with a Premier security consultant who can provide help when you require it to keep your information system running and recover your data.

Progent can assist you in your initiatives to defend your network with support services that ranges from network security checks to creating a comprehensive security strategy. Progent provides economical service to help companies of any size to configure and maintain safe IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper level of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's certified professionals are accessible remotely or in person to offer a variety of emergency or longer-term IT security services such as:

  • Perform automated network security audits
  • Recover quickly after attacks
  • Install firewalls from multiple vendors
  • Configure secure solutions for remote and mobile connectivity
  • Deploy advanced applications for automatic defense against spam and DHAs
  • Develop a company-wide security strategy with proactive monitoring
  • Provide comprehensive Help Desk Support
  • Help Create an effective network backup and recovery strategy centered on System Center Data Protection Manager backup capability
If your business has an emergency need for computer security support, refer to Progent's Urgent Online Technical Support.

Progent's engineers provide world-class support in vital facets of computer security including security assessment, firewall and VPN solutions, and advanced security planning.

System Security Evaluation
Progent's expert security engineers can assess the effectiveness of your existing network protection implementation by performing comprehensive remote automated testing based on advanced utilities and proven procedures. Progent's experience in this service saves you consulting fees and offers an accurate picture of security holes. The information your business gains can make up the basis of a security plan that can allow your information system to operate dependably and respond quickly to new risks.

Automated Network Security Assessment
Progent provides consulting in the application of security testing software such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically running a set of automatic system auditing checks to uncover possible security problems. Progent has broad experience with additional network auditing utilities including NMAP Port Scanner, AMAP, eEye, as well as utilities such as Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.

Progent can help you build protection into your company operations, install auditing tools, plan and implement a secure network environment, and suggest policies to optimize the security of your IT system. Progent's security consultants are able to assist you to set up a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Learn more on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get an independent network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a network scan from an authorized machine inside your firewall to evaluate the risk to internal attacks. Both security inventory services are set up and executed from a protected external location. The project is managed by a consultant who has earned top security accreditations and who generates a report that summarizes and interprets the information captured by the scan and proposes cost-effective remediation where appropriate.

Stealth Penetration Analysis Support Services
Stealth penetration testing is an important component of any comprehensive IT system security strategy. Progentís security experts can run thorough penetration checks without the awareness of your company's in-house IT staff. Stealth penetration checking shows whether current security monitoring systems such as intrusion detection alerts and event history analysis are properly configured and actively monitored. Find out more concerning Progent's stealth security penetration analysis consulting.

Firewall/VPN Solutions
Progent's background in security technology includes in-depth field work with major firewalls and Virtual Private Network products offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Consulting Services
Cisco's security and offsite connection products provide a complete range of manageable security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Learn more details concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and medium size companies professional support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including WatchGuard, Juniper, and SonicWall. Progent can help you design a detailed security strategy and select the right products from a variety of suppliers to achieve your security goals while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis technology to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight ASM protects on-premises and cloud-based resources and offers a single platform to automate the complete threat progression including protection, detection, mitigation, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a unified console. Progent's data protection and virtualization consultants can assist you to design and configure a ProSight ESP deployment that meets your organization's unique needs and that allows you prove compliance with legal and industry data security regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of vital data, applications and VMs that have become unavailable or corrupted as a result of hardware failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can provide advanced support to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading information security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved easily to an alternate hardware environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard data about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can eliminate as much as 50% of time spent searching for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre making enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Network Security Planning
Every business should have a thoroughly thought out security program that incorporates both pre-attack processes and reaction plans. The pre-attack strategy is a set of mechanisms designed to reduce security weaknesses. The post-attack strategy helps your network security personnel to assess the damage caused by an attack, fix the network, document the experience, and get the IT network running as soon as possible.

Progent's expert IS security consultants can to assist your business to run a complete risk assessment and create a computer security plan to establish security processes and controls to minimize ongoing assaults and threats.

CISM Qualified Security Consulting Expertise
The Certified Information Security Manager (CISM) organization describes the core competencies and global standards of skill that information security managers are required to master. It provides business management the assurance that consultants who have earned their CISM certification have the experience and capability to provide effective security administration and consulting services. Progent offers the expertise of CISM Certified security professionals to assist companies with:

  • Information Security Governance
  • Risk Analysis
  • Network Security Implementation Management
  • Information Security Administration
  • Recovery Management
Learn additional details about Progent's CISM Qualified Security Engineering Professionals.

CISSP Accredited Security Consulting Services
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI has granted certification recognition in the field of information security defined by ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Learn additional details about Progent's CISSP-certified Security Consulting Professionals.

CISSP-ISSAP Qualified Secure Information System Architecture Consulting Services
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have been awarded ISSAP status through rigorous testing and significant work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most in-depth requirements of information system security architecture bounded by the broader scope of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security including.

  • Access Control Systems and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and DRP
  • Physical Security
Find out more information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.

CISA Accredited Network Security Auditing Consulting Services
The CISA accreditation is a globally recognized qualification that signifies expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA network security audit specialists are available to help your IT organization with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Preparedness
Get more details about Progent's CISA Qualified IS Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's skills to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and carry out a business continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation experts can provide a range of risk assessment services such as:

  • Collect data and study documentation to identify major risk scenarios
  • Inventory legal, industry, and business requirements and organizational policies related to your network to determine their potential influence on your strategic objectives
  • Point out potential vulnerabilities for your operational workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct training to make sure your stakeholders appreciate IS risk so they can assist with your risk management program
  • Connect key risk vectors to related operational processes to help assign risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to ensure they align
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of computer security experts. GIAC's goal is to assure that an accredited professional possesses the skills appropriate to deliver services in vital areas of system, data, and application software security. GIAC accreditations are acknowledged by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit engineers can assist your business with:

  • Auditing Networks
  • Security Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Engineer
To learn how you can access a certified security consultant for online or on-premises help in North Carolina, phone 1-800-993-9400 or go to Remote Computer Help.