Company information networks in the state of Ohio can now get fast and economical online access to Progent's certified security support specialists to assist with urgent security issues. The cost is reasonable, charges are by the minute, sign-up is fast, and support is world class. Progent also provides help for long-term projects that demand the services of senior security engineers with high-level security certifications.
If your Ohio business is based some distance from major metropolitan areas such as Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, support from local qualified network security support specialists could be limited during a crisis. This can result in lost productivity for your company, upset clients, idle workers, and defocused executives. By utilizing Progent's online services, you have access to a Certified security professional ready to offer assistance whenever you need it to get your computer network running and salvage your information.
Progent can help you at any level in your initiatives to guard your information system with support that can range from security audits to developing a comprehensive security plan. Progent provides economical service to help businesses of all sizes to set up and manage secure IT environments based on Microsoft Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter.
Progent's security engineers are available online or on premises to provide a variety of emergency or longer-term IT security services including:
If your company has an immediate need for computer security help, refer to Progent's Urgent Remote Technical Help.
Progent's consultants offer world-class services in key areas of network security including security assessment, firewalls and VPN, and high-level security consulting.
Progent's expert security engineers can evaluate the strength of your existing network security environment by performing exhaustive remote automated testing based on advanced utilities and tested procedures. Progent's skill in this testing saves you time and money and offers an objective picture of weaknesses. The information your business gains can make up the basis of a security strategy that will allow your network to operate dependably and respond quickly to future risks.
Automated Security Evaluation
Progent provides consulting in the use of security analysis products such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a variety of programmed network testing checks to uncover possible security holes. Progent has extensive experience with other network analysis tools such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.
Progent can show you how to build security into your business processes, configure scanning applications, plan and implement a secure network architecture, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are ready to assist you to configure a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Learn more on Progent's automated security evaluation.
Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles designed to allow small businesses to receive a professional network security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, a security engineer runs an extensive examination of your IT infrastructure from outside your firewalled perimeter to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from an authorized machine within your company firewall to determine vulnerabilities to inside attacks. Both security inventory packages are configured and executed from a secured remote location. The process is directed by an engineer with top security credentials and who produces a document that summarizes and analyzes the information captured by the security scan and proposes cost-effective improvements where appropriate.
Network Intrusion Testing Support Services
Stealth penetration checking is a key part of any serious network security plan. Progentís security experts can perform extensive penetration tests without the awareness of your organization's in-house network support staff. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion incident alerts and event history monitoring are correctly configured and actively monitored. Learn additional information concerning Progent's network security penetration testing consulting.
Progent's expertise in network security solutions encompasses in-depth familiarity with leading firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, configure, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower Services integration and troubleshooting support.
Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote connection products provide a full range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Read additional information about Progent's Consulting Services for Cisco Security and VPN Products.
Engineering Expertise for Other Firewall and VPN Products
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and select the right products from a variety of vendors to achieve your security objectives while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based machine learning tools to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily evade traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a single platform to address the complete malware attack progression including blocking, identification, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering through cutting-edge technologies packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can help you to design and implement a ProSight ESP deployment that meets your company's unique requirements and that allows you demonstrate compliance with government and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent's consultants can also help you to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates your backup processes and allows rapid recovery of critical data, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver advanced support to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your critical information. Learn more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to provide web-based management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway device provides a further level of inspection for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved easily to a different hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect data related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can eliminate as much as 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Any business ought to have a carefully thought out security program that incorporates both proactive procedures and response plans. The proactive strategy is a set of mechanisms designed to reduce security weaknesses. The reactive plan helps your company's IT security engineers to evaluate the impact caused by a security penetration, fix the network, document the experience, and get business functions restored as quickly as possible.
Progent's expert IS security engineers can to help your business to perform a full vulnerability evaluation and create a network security plan to establish security policies and mechanisms to reduce future attacks and dangers.
CISM Certified Information Security Support Services
The CISM organization defines the core capabilities and global standards of performance that IT security managers are expected to learn. It provides executive management the assurance that consultants who have qualified for their CISM credential possess the background and capability to provide effective security management and support consulting. Progent offers the support of CISM Certified security professionals to help companies with:
Find out additional details about Progent's CISM IS Security Engineering Professionals.
- IS Security Strategies
- Risk Management
- Information Security Program Management
- IS Security Administration
- Response Planning
CISSP Accredited Security Consulting Services
CISSP certification recognizes expertise with a global standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the field of data security stipulated by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas including:
Read additional information concerning Progent's CISSP-certified Information Security Consulting Expertise.
- Security Administration Practices
- Security Architecture and Models
- Access Management Systems and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecommunications, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified IT architecture professionals are experts who have been awarded ISSAP status as a result of rigorous examination and significant experience with network security architecture. The ISSAP certification indicates proven competence in the more challenging requirements of information system security architecture within the broader field of IS security expertise required for CISSP accreditation. Progent's ISSAP-premier security consultants can help your company with all aspects of architecture security such as.
Find out more details concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.
- Access Control Systems and Methodologies
- Telecom and System Infrastructure Security
- Data Encryption Solutions
- Requirements Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Accredited Information System Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a globally recognized qualification that represents expertise in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive examination given by the ISACA professional group. Progent's CISA security audit consultants can assist your business in the areas of:
Read the details concerning Progent's CISA Certified Information System Security Auditing Engineering Assistance.
- IS Audit Process
- IT Enforcement
- Network Assets and Infrastructure Lifecycle Planning
- IT Service Delivery
- Safeguarding Information Assets
- Business Continuity Planning
The CRISC certification program was initiated by ISACA to validate an IT professional's ability to design, deploy, and maintain IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and execute a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation experts offer a variety of risk identification services including:
Find out more details concerning Progent's CRISC Risk Management Consultants.
- Gather information and study documentation to evaluate major risk scenarios
- Identify legal, regulatory, and business requirements and organizational policies related to your network to assess their potential influence on your business goals
- Identify potential threats for your operational workflows to help in analyzing your enterprise risk
- Develop a risk awareness initiative and provide training to ensure your organization appreciate information system risk so they can assist with your risk control program
- Match key risk vectors to related operational procedures to help assign risk ownership
- Validate risk appetite with your senior management and major stakeholders to ensure they are in agreement
GIAC Qualified Security Engineering Services
Read additional information about Progent's GIAC Information Assurance Expertise.
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to make sure that an accredited security consultant has the skills needed to provide services in key areas of system, information, and application software security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit consultants are available to assist your IT organization in the areas of:
Contact a Progent Security Specialist
To find out how you can get in touch with a Progent security engineer for remote or onsite assistance in Ohio, call 1-800-993-9400 or go to Remote Network Help.