Company networks in North Dakota now have quick and economical remote technical support from Progent's certified network security professionals to assist with complex security problems. The cost is competitive, charges are per minute, engagement is fast, and support is world class. Progent also offers help for long-term engagements that requires the knowledge of senior security consultants with high-level industry credentials.

In case your North Dakota small business is located away from larger metropolitan neighborhoods like Fargo, Bismark, or Grand Forks, help from local qualified network security consultants is often limited during an urgent situation. This can cause a drop in income for your business, angry customers, unproductive workers, and distracted management. By contacting Progent's online services, you have access to a Certified security professional who can provide expertise when you need it to get your information system running and restore your information.

Progent can assist you in your initiatives to protect your information system with support that can range from security checks to developing a company-wide security strategy. Progent offers affordable support to help companies of any size to design and manage safe networks based on Microsoft Windows and Cisco technology and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to provide web-based management and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a further level of inspection for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's security consultants are accessible remotely or on site to provide a variety of urgent or project-based computer security services which include:

If your business has an emergency requirement for computer security support, refer to Progent's Emergency Remote Network Support.

Progent's security experts offer world-class services in key areas of network security that include security assessment, firewalls and VPN, and advanced security consulting.

System Security Audits
Progent's certified security engineers can assess the strength of your current computer security environment through exhaustive remote automated analysis based on advanced software tools and tested procedures. Progent's skill in administering this service saves you time and money and assures a detailed portrayal of system vulnerability. The knowledge your IT organization is provided can make up the foundation of a network protection strategy that can allow your network to operate dependably and respond quickly to future threats.

Automated Vulnerability Audits
Progent provides expertise in the use of security evaluation packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically running a set of automatic network testing scans to uncover possible security gaps. Progent has extensive experience with other network auditing products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to build security into your business processes, install scanning tools, plan and deploy a protected network architecture, and suggest policies to optimize the security of your network. Progent's security engineers are ready to assist you to configure a firewall, design safe remote access to email and data, and integrate virtual private network. Learn more concerning Progent's network security analysis.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory service bundles intended to allow small companies to receive an independent security assessment from a qualified security consultant. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from an authorized computer within your company firewall to uncover your exposure to inside threats. Both security inventory services are configured and executed from a secured remote location. The process is overseen by an engineer with high-level security accreditations and who generates a document that summarizes and analyzes the data captured by the scan and suggests practical remediation if called for.

Network Security Penetration Testing Support Services
Stealth intrusion testing is a key part of any serious IT system security strategy. Progentís security experts can perform extensive penetration checks without the awareness of your organization's internal network support resources. Unannounced penetration checking uncovers whether current security defense systems such as intrusion detection warnings and event log monitoring are properly configured and actively monitored. Learn more concerning Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in network security technology includes extensive field work with major firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned important networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and Virtual Private Network Consulting Services
Cisco's network security and offsite access technology offer a full range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Learn more details about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.

Engineering Expertise for Other Firewall and VPN Solutions
Progent offers small and mid-size companies professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you create a detailed security strategy and select appropriate technologies from a variety of suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based machine learning tools to defend endpoints and servers and VMs against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to address the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback using Windows VSS and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services offer affordable in-depth protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP offers firewall protection, intrusion alarms, device control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can help you to design and implement a ProSight ESP deployment that addresses your company's unique needs and that helps you demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent's consultants can also assist your company to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates your backup processes and enables fast restoration of critical files, applications and VMs that have become lost or corrupted as a result of hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security vendors to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a further layer of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard information about your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can save as much as 50% of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Security Planning
Any company ought to develop a carefully considered security program that incorporates both pre-attack processes and response planning. The proactive plan is a collection of procedures that help to minimize security weaknesses. The post-attack strategy helps your company's network security personnel to evaluate the impact resulting from a security penetration, repair the network, record the experience, and get business functions restored as soon as possible.

Progent's expert IT security consultants are available to help your company to perform a comprehensive risk evaluation and create a computer security strategy to establish security policies and controls to minimize ongoing attacks and dangers.

CISM Accredited Security Consulting Assistance
The CISM organization describes the basic capabilities and global standards of skill that IT security professionals are required to master. CISM provides business management the confidence that those who have qualified for their CISM certification have the background and knowledge to provide effective security administration and consulting services. Progent offers the expertise of CISM Certified security consultants to assist businesses with:

  • IS Security Strategies
  • Vulnerability Management
  • IS Security Program Management
  • Network Security Administration
  • Recovery Planning
Learn more information concerning Progent's CISM Certified Network Security Support Expertise.

CISSP Certified Security Consulting Services
The CISSP credential denotes mastery of a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the field of information security under ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional information concerning Progent's CISSP-certified Cybersecurity Consulting Professionals.

CISSP-ISSAP Qualified Secure Network Architecture Engineering Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough testing and extensive work with information security design. The ISSAP credential indicates proven mastery in the more challenging requirements of information system security architecture within the wider scope of IS security knowledge required for CISSP certification. Progent's ISSAP-premier security consultants can help your company with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Protection
  • Cryptography Options
  • Needs Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning
  • Hardware Security
Find out additional details about Progent's ISSAP Accredited Secure IT Architecture Engineering Services.

CISA Qualified IS Security Auditing Engineering Expertise
The CISA credential is a recognized achievement that signifies mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates pass an extensive examination given by the ISACA professional association. Progent's CISA-qualified security audit specialists are available to help your business with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Find out more information about Progent's CISA Accredited Network Security Auditing Engineering Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, deploy, and support IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation engineers offer a range of risk identification services including:

  • Collect information and review documentation to evaluate significant vulnerabilities
  • Inventory statutory, industry, and contractual mandates and company standards associated with your information system to assess their possible influence on your strategic objectives
  • Identify potential threats for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to make sure your stakeholders appreciate IS risk so they can contribute to your risk control program
  • Connect identified risk vectors to your associated operational procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to ensure they are in agreement
Read more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security engineers. GIAC's mission is to ensure that a certified security consultant possesses the knowledge necessary to deliver services in key areas of network, data, and application program security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit specialists are available to help your business with:

  • Assessing IT Infrastructure
  • Security Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out more information concerning Progent's GIAC Information Assurance Services.

Contact a Progent Security Expert
To see how you can contact a security consultant for online or onsite assistance in North Dakota, phone 1-800-993-9400 or visit Remote Network Support.