Company networks inOhionow have quick and affordable remote help from Progent's qualified network security consultants to fix critical security problems. The cost is competitive, charges are per minute, engagement is fast, and service is world class. Progent also offers help for long-term projects that demand the knowledge of seasoned security engineers with high-level industry certifications.
If yourOhiosmall business is located far from larger metropolitan neighborhoods such asColumbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, support from local qualified network security consultants may be problematic during an urgent situation. This can cause a loss of revenue for your business, upset customers, idle employees, and defocused management. By utilizing Progent, you can get in touch with a Premier security consultant ready to offer help whenever you need it to keep your network on line and salvage your information.
Progent can assist you in all your efforts to protect your information system with support services that ranges from security audits to developing a comprehensive security plan. Progent provides affordable support to help small and midsize companies to set up and maintain protected networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also help you outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security companies to provide web-based management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from making it to your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.
Progent's security engineers are available remotely or in person to offer a range of emergency or project-based IT security services which include:
If your company has an immediate requirement for IT security help, go to Progent's Urgent Online Network Help.
- Run comprehensive security evaluations
- Recover quickly after serious security breaches
- Set up firewalls from multiple vendors
- Configure secure solutions for offsite and mobile connectivity
- Deploy effective utilities for automatic defense against spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 network monitoring
- Provide outsourced Help Desk Call Center Services
- Help Develop a practical network backup and disaster recovery plan based on Data Protection Manager (DPM) backup technology
Progent's security experts can deliver advanced support in vital facets of network security that include security evaluation, firewall/VPN support, and advanced security consulting.
System Security Evaluation
Progent's certified security engineers can assess the vulnerability of your current computer protection environment by performing comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's skill in administering this testing saves you money and offers an objective picture of weaknesses. The information your business gains can make up the basis of a security plan that can allow your information system to operate dependably and adapt rapidly to new threats.
Automated Network Vulnerability Evaluation
Progent provides consulting in the application of security auditing products including Microsoft Baseline Security Analyzer and LANguard from GFI for economically running a set of automatic network testing checks to uncover possible security weaknesses. Progent has extensive experience with additional security auditing utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can show you how to design security into your company operations, install auditing software, plan and implement a secure system environment, and suggest procedures to optimize the security of your IT system. Progent's security professionals are available to help you configure a firewall, implement safe remote access to email and business applications, and integrate virtual private network. Find out additional information about Progent's automated security audits.
Security Inventory Scanning Bundles for Small Businesses
Progent has put together two low-cost security inventory service packages designed to enable small businesses to get an objective network security assessment from a qualified security engineer. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a system scan from an authorized machine inside your firewall to evaluate vulnerabilities to inside attacks. The two security inventory services are set up and run from a protected external location. The process is directed by a consultant who has earned top security accreditations and who produces a report that details and interprets the data collected by the security scan and proposes practical improvements if called for.
Stealth Penetration Testing Consulting
Stealth penetration checking is a key component of any comprehensive IT system security strategy. Progentís security experts can run extensive penetration checks without the awareness of your company's in-house network support staff. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event history analysis are properly set up and actively monitored. Find out more about Progent's stealth penetration testing support services.
Progent's expertise in network security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) products from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your existing PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote access technology offer a comprehensive range of manageable security products to help safeguard your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Read additional details about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.
Support Expertise for Other Firewall and VPN Products
Progent offers small and mid-size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a comprehensive security strategy and select appropriate products from multiple suppliers to support your security objectives while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-based AV products. ProSight ASM safeguards local and cloud-based resources and offers a unified platform to automate the entire threat lifecycle including filtering, identification, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge technologies incorporated within a single agent managed from a unified control. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that meets your organization's specific needs and that helps you prove compliance with government and industry data security regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also help you to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and enables rapid restoration of vital data, apps and virtual machines that have become unavailable or corrupted due to hardware failures, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top information security companies to provide centralized control and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email that stays within your security perimeter. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard data related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can save up to half of time thrown away looking for critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Every company ought to have a carefully considered security program that incorporates both pre-attack procedures and reaction planning. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The reactive plan assists your network security engineers to assess the impact resulting from a security penetration, fix the damage, record the experience, and get business functions running as soon as feasible.
Progent's expert IT security engineers can to help your business to perform a full vulnerability assessment and define a network security plan to implement security processes and mechanisms to mitigate ongoing assaults and dangers.
CISM Accredited System Security Support Assistance
The Certified Information Security Manager (CISM) organization describes the basic competencies and international standards of performance that information security managers are expected to master. It provides executive management the confidence that consultants who have earned their CISM certification have the experience and knowledge to deliver efficient security management and support services. Progent offers the services of CISM Certified security consultants to assist businesses with:
Learn more information about Progent's CISM Accredited IS Security Consulting Services.
- Network Security Governance
- Vulnerability Analysis
- Network Security Implementation Management
- IS Security Administration
- Recovery Management
CISSP Qualified Security Engineering Assistance
CISSP certification denotes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of information protection under ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a broad range of security fields including:
Find out additional details about Progent's CISSP Accredited Information Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Premier information system architecture engineers are experts who have earned ISSAP status through thorough examination and extensive work with information security architecture. The ISSAP credential represents demonstrated skill in the most in-depth requirements of IS security architecture bounded by the broader field of IS security expertise needed for CISSP certification. Progent's ISSAP-premier security experts can assist your business with all aspects of architecture security including.
Learn additional information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Expertise.
- Access Management Mechanisms and Methodologies
- Telecom and System Infrastructure Security
- Cryptography Options
- Needs Evaluation and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Network Security Auditing Consulting Services
The CISA credential is a globally recognized achievement that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass a comprehensive test administered by the ISACA international professional association. Progent's CISA information security audit engineers are available to assist your company in the areas of:
Get additional details about Progent's CISA Qualified Security Auditing Consulting Services.
- Information Systems Audit Process
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Data Assets
- Business Continuity Preparedness
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation consultants offer a range of risk identification services including:
Get more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and review documentation to identify major vulnerabilities
- Identify statutory, regulatory, and contractual requirements and company standards related to your information system to assess their potential influence on your strategic goals
- Point out possible threats for your operational processes to help in analyzing your corporate risk
- Create a risk awareness initiative and conduct training to make sure your organization appreciate information system risk so they can contribute to your risk management process
- Connect key risk vectors to related operational processes to help assign risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they align
GIAC Accredited Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security experts. GIAC's goal is to make sure that a certified professional has the skills appropriate to provide support in key areas of system, information, and application software security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit engineers are available to help your company with:
Read more information concerning Progent's GIAC Information Assurance Support.
- Auditing Security Systems
- Incident Handling
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Get in Touch with a Progent Security Specialist
To find out how you can get in touch with a security engineer for online or onsite expertise in Ohio, phone 1-800-993-9400 or go to Remote Computer Help.