Small business information networks in North Carolina can depend on quick and affordable online technical support from Progent's qualified security consultants to help with critical security problems. Rates are reasonable, billing is per minute, engagement is fast, and service is unbeatable. Progent also offers assistance for complex engagements that demand the knowledge of seasoned security consultants with high-level industry certifications.
In case your North Carolina network is based outside of major urban neighborhoods such as Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, help from nearby qualified security engineers is often problematic when you have an urgent situation. This could mean a loss of income for your company, angry clients, idle employees, and defocused executives. By calling Progent, you can get in touch with a Certified security consultant who can offer expertise whenever you have to have it to get your computer network running and salvage your data.
Progent can help you in your efforts to guard your network with support ranging from security assessments to creating a company-wide security strategy. Progent offers affordable service to assist companies of any size to design and manage protected IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security companies to deliver centralized control and world-class security for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further level of inspection for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also enable Exchange Server to track and protect internal email traffic that stays inside your security perimeter.
Progent's security professionals are accessible online or in person to offer a variety of urgent or project-based computer security services including:
If your network has an immediate requirement for computer security support, refer to Progent's Emergency Online Network Support.
Progent's engineers can deliver world-class services in vital fields of computer protection including security assessment, firewall and VPN solutions, and advanced security consulting.
Progent's expert security engineers can assess the vulnerability of your existing computer security environment through exhaustive remote automated testing based on sophisticated software tools and proven procedures. Progent's experience in this service saves your company money and offers an accurate portrayal of security holes. The knowledge your business gains can make up the basis of a network protection strategy that will permit your network to run dependably and respond rapidly to new risks.
Automated Security Assessment
Progent provides expertise in the application of security evaluation products such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically running a variety of automatic network testing scans to uncover potential security vulnerabilities. Progent has extensive experience with additional security auditing products such as NMAP, AMAP application mapper, eEye, plus tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.
Progent can help you build protection into your company processes, install auditing tools, plan and deploy a protected system architecture, and recommend procedures to maximize the safety of your network. Progent's security engineers are available to help you set up a firewall, design safe remote access to email and data, and install VPN. Learn additional information about Progent's network security assessment.
Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning packages intended to enable small companies to get an impartial network security evaluation from a qualified security engineer. With Progent's External Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from outside your firewall to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from a secure machine inside your firewall to assess vulnerabilities to inside attacks. Both security inventory services are set up and executed from a secured external location. The process is overseen by a consultant with top security credentials and who generates a report that summarizes and interprets the data captured by the security scan and proposes practical improvements where called for.
Network Intrusion Testing Support Services
Stealth intrusion checking is an important component of any successful IT system security strategy. Progentís security professionals can perform thorough intrusion checks without the awareness of your company's internal network support resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion detection warnings and event log analysis are correctly configured and actively checked. Learn additional information on Progent's stealth penetration testing support services.
Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Security and Virtual Private Network Support Services
Cisco's security and remote access technology represent a full line of manageable security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Find out more information about Progent's Engineering Expertise for Cisco Security and VPN Appliances.
Consulting Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a detailed security strategy and select appropriate technologies from a variety of suppliers to achieve your security goals while staying within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to guard endpoint devices as well as servers and VMs against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to address the complete malware attack lifecycle including filtering, detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge technologies packaged within one agent managed from a single control. Progent's security and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that helps you prove compliance with government and industry data protection regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for immediate action. Progent's consultants can also assist your company to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and enables rapid restoration of critical files, apps and virtual machines that have become unavailable or damaged due to component failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR specialists can deliver world-class support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security companies to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage. Email Guard's onsite gateway device provides a further level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be ported immediately to an alternate hosting environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre making enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Consulting
Any company ought to have a thoroughly thought out security strategy that includes both preventive processes and response plans. The pre-attack plan is a collection of procedures intended to minimize vulnerabilities. The post-attack plan helps your IT security personnel to assess the impact resulting from an attack, fix the damage, record the experience, and get the IT network running as soon as possible.
Progent's certified IS security consultants can to help you to run a complete vulnerability assessment and define a computer security plan to establish security processes and mechanisms to minimize future assaults and dangers.
CISM Qualified Network Security Engineering Expertise
The Certified Information Security Manager (CISM) committee defines the basic competencies and international standards of performance that information security professionals are expected to master. CISM provides business management the assurance that those who have qualified for their CISM credential have the experience and knowledge to provide effective security management and support consulting. Progent offers the services of CISM Certified security professionals to help businesses with:
Read additional details about Progent's CISM Accredited Security Support Services.
- Network Security Governance
- Vulnerability Analysis
- IS Security Implementation Management
- IS Security Administration
- Response Management
CISSP Accredited Security Consulting Services
The CISSP credential denotes expertise with an international standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data protection stipulated by ISO 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a variety security fields such as:
Find out more information concerning Progent's CISSP-certified Network Security Support Professionals.
- Security Management Practices
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption Mechanisms
- Telecom, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Engineering Support
Progent's CISSP-ISSAP Certified IT architecture professionals are consultants who have earned ISSAP Certification through rigorous testing and extensive experience with network security architecture. The ISSAP credential indicates demonstrated mastery in the most challenging demands of information system security architecture within the wider field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture such as.
Find out more information about Progent's ISSAP Certified Secure Network Architecture Consulting Services.
- Access Control Systems and Techniques
- Telecom and Network Protection
- Cryptography Solutions
- Requirements Analysis and Security Criteria
- Business Continuity Planning and DRP
- Hardware Security
CISA Qualified Network Security Auditing Engineering Expertise
The CISA accreditation is a recognized qualification that represents expertise in IS security audit and control. Accredited by ANSI, the CISA credential requires that candidates pass an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit consultants can help your IT organization with:
Learn more details about Progent's CISA Certified Information System Security Auditing Engineering Expertise.
- IS Audit Process
- IT Governance
- Systems and Infrastructure Planned Useful Life
- Information Technology Support
- Protecting Information Assets
- Disaster Recovery Planning
The CRISC certification program was established by ISACA to verify a consultant's skills to plan, deploy, and maintain IS controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and execute a business continuity plan based on leading practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation specialists offer a variety of risk identification services such as:
Find out additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to identify major vulnerabilities
- Inventory legal, regulatory, and contractual requirements and organizational standards associated with your information system to determine their possible influence on your business objectives
- Identify potential threats for your business processes to help in evaluating your corporate risk
- Create a risk awareness program and provide training to make sure your organization understand IS risk so they can contribute to your risk management process
- Connect identified risk scenarios to related business processes to help determine risk ownership
- Determine risk tolerance with your senior leadership and key stakeholders to ensure they match
GIAC Accredited Security Engineering Services
GIAC was established in 1999 to certify the skill of network security engineers. GIAC's mission is to make sure that an accredited professional possesses the skills appropriate to provide support in vital areas of system, information, and application security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified IS security audit consultants can assist your company with:
Read more details concerning Progent's GIAC Information Assurance Support.
- Auditing IT Infrastructure
- Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Contact a Certified Security Engineer
To see how you can get in touch with a Progent security engineer for remote or on-premises expertise in North Carolina, phone 1-800-993-9400 or visit Remote Computer Help.