Small business information networks in North Dakota can have prompt and economical online technical support from Progent's certified security support specialists to resolve urgent security issues. Rates are reasonable, billing is by the minute, sign-up is immediate, and support is world class. Progent also offers assistance for complex engagements that requires the services of seasoned security consultants with top security credentials.
If your North Dakota office is outside of larger metropolitan neighborhoods including Fargo, Bismark, or Grand Forks, help from local accredited security professionals is often limited during a security disaster. This can cause a drop in revenue for your company, upset clients, unproductive employees, and distracted management. By utilizing Progent's remote support, you have access to a Premier security engineer ready to offer help whenever you require it to get your system running and recover your information.
Progent can help you in a variety of ways in your efforts to defend your IT environment with support services that ranges from network security audits to creating a company-wide security strategy. Progent provides affordable support to help small and midsize companies to design and manage secure IT environments powered by Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security companies to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.
Progent's security professionals are available remotely or in person to offer a range of urgent or project-based computer security services such as:
If your business has an urgent requirement for computer security support, refer to Progent's Emergency Remote Technical Help.
Progent's security experts offer world-class support in vital facets of network protection that include security assessment, firewall and VPN expertise, and high-level security consulting.
System Security Evaluation
Progent's expert security consultants can assess the strength of your existing computer security environment through comprehensive remote automated testing via advanced utilities and proven procedures. Progent's experience in administering this testing saves your company consulting fees and offers an accurate picture of weaknesses. The knowledge your IT organization is provided can be used as the foundation of a security strategy that can allow your information system to operate safely and adapt rapidly to new risks.
Automated Network Security Analysis
Progent provides expertise in the use of security auditing utilities including MBSA and LANguard from GFI for affordably performing a set of programmed network auditing scans to uncover potential security problems. Progent has broad knowledge of other network auditing tools including NMAP, AMAP Application Scanner, eEye, plus utilities such as Metasploit, Netcat, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can show you how to build security into your company processes, configure scanning applications, plan and implement a protected network environment, and recommend policies to maximize the security of your IT system. Progent's security consultants are ready to help you configure a firewall, implement safe remote access to email and data, and integrate VPN. Find out additional information about Progent's automated security assessment.
Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory service packages intended to allow small businesses to receive an objective security evaluation from a certified security expert. With Progent's External Security Inventory Scan, a security expert administers a comprehensive test of your network from beyond your firewall to uncover potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from a secure computer inside your firewall to determine the risk to internal threats. Both security inventory services are set up and executed from a secured remote location. The project is managed by an engineer who has earned top security credentials and who produces a report that details and analyzes the information collected by the security scan and suggests practical improvements where called for.
Network Intrusion Testing Support Services
Stealth penetration testing is an important component of any comprehensive network security plan. Progentís security experts can run thorough intrusion checks without the knowledge of your organization's internal IT staff. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event history analysis are properly set up and consistently monitored. Learn more on Progent's stealth penetration analysis support services.
Firewalls and VPN Solutions
Progent's expertise in security technology encompasses extensive field work with leading firewalls and Virtual Private Network technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your existing PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.
Cisco Security and VPN Engineering Expertise
Cisco's network security and remote connection technology offer a comprehensive range of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Find out additional details about Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.
Engineering Services for Additional Firewall and VPN Products
Progent provides small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right technologies from multiple suppliers to support your security goals while staying within your spending limits.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning technology to guard endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to address the complete malware attack lifecycle including blocking, identification, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools packaged within one agent managed from a unified console. Progent's data protection and virtualization experts can help you to design and implement a ProSight ESP environment that meets your company's unique requirements and that allows you prove compliance with government and industry information security regulations. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent attention. Progent's consultants can also help you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup activities and enables fast restoration of vital files, apps and virtual machines that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical data. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security vendors to deliver centralized management and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hardware solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or domains. By updating and managing your network documentation, you can eliminate up to 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Every company ought to have a carefully thought out security program that incorporates both pre-attack processes and response plans. The pre-attack plan is a set of mechanisms that help to reduce security weaknesses. The post-attack strategy helps your security personnel to assess the impact caused by a security penetration, repair the network, record the experience, and get business functions running as soon as feasible.
Progent's expert IS security consultants can to help your company to perform a comprehensive risk evaluation and define a computer security plan to establish security processes and controls to minimize ongoing attacks and threats.
CISM Accredited Network Security Engineering Services
The CISM organization defines the basic capabilities and global standards of skill that IT security professionals are required to learn. CISM provides business management the assurance that those who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and support services. Progent can provide the expertise of CISM Certified security consultants to assist companies with:
Learn more details about Progent's CISM Qualified Network Security Engineering Professionals.
- Information Security Processes
- Vulnerability Management
- Information Security Program Management
- IS Security Administration
- Response Management
CISSP Certified Security Consulting Support
CISSP certification denotes mastery of an international standard for data security. The American National Standards Institute has granted certification recognition in the field of data security under ISO 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security fields including:
Read additional information concerning Progent's CISSP Qualified Security Support Professionals.
- Security Management Procedures
- Security Infrastructure and Models
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure IT Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have earned ISSAP status as a result of rigorous testing and significant experience with information security architecture. The ISSAP credential indicates proven competence in the most complex demands of information security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-premier security experts can help your business with all phases of architecture security such as.
Find out more details about Progent's ISSAP Qualified Secure Network Architecture Consulting Services.
- Access Control Mechanisms and Methodologies
- Telecom and System Infrastructure Security
- Data Encryption Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Accredited Network Security Auditing Consulting Expertise
The CISA accreditation is a recognized qualification that signifies mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA-certified network security audit experts can help your business with:
Read additional details concerning Progent's CISA Accredited Security Auditing Engineering Assistance.
- IS Audit Services
- Information Technology Governance
- Network Assets and Architecture Lifecycle Planning
- Information Technology Support
- Protecting Information Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to validate an IT professional's ability to design, implement, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to create and carry out a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation specialists offer a range of risk identification services such as:
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to evaluate significant vulnerabilities
- Inventory statutory, industry, and contractual mandates and company policies associated with your information system to assess their possible influence on your business objectives
- Point out possible vulnerabilities for your operational workflows to help in evaluating your enterprise risk
- Create a risk awareness program and conduct training to make sure your organization understand information system risk so they can assist with your risk control program
- Connect key risk vectors to related business procedures to help determine risk ownership
- Determine risk appetite with executive management and key stakeholders to ensure they match
GIAC Certified IS Security Consulting Support
Find out more information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security experts. GIAC's goal is to assure that a certified professional has the skills necessary to provide services in important areas of system, data, and application program security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States NSA. Progent's GIAC network security audit experts can help your company with:
Talk to a Certified Progent Security Expert
To learn how you can get in touch with a Progent security engineer for remote or on-premises assistance in North Dakota, call 1-800-993-9400 or visit Online Computer Help.