Business information networks in the state of Ohio can depend on fast and affordable online access to Progent's qualified security engineers to help with complex security issues. The cost is affordable, charges are per minute, engagement is immediate, and service is world class. Progent also provides assistance for complex projects that requires the services of seasoned security consultants with top security credentials.
If your Ohio network is situated outside of major metropolitan neighborhoods such as Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, help from nearby certified network security engineers could be problematic during an urgent situation. This can cause a loss of income for your business, upset customers, idle employees, and distracted executives. By calling Progent's online services, you have access to a Certified security consultant ready to provide assistance whenever you have to have it to keep your information system operating and recover your information.
Progent can help you in all your initiatives to defend your information system with support services that can range from security audits to creating a company-wide security strategy. Progent provides economical support to assist small and midsize companies to design and maintain safe networks based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple iPhones and iPads or Google Android or Windows Phone devices.
Progent can also show you how to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter.
Progent's security professionals are accessible remotely or on site to offer a range of emergency or longer-term network security services including:
If your business has an urgent requirement for computer security support, refer to Progent's Emergency Online Technical Help.
- Run comprehensive network security evaluations
- Clean up quickly after serious security breaches
- Configure effective firewalls
- Implement safe techniques for offsite and mobile connectivity
- Deploy advanced applications for defense against spam and directory harvest attacks
- Help create a comprehensive security plan with 24x7 network monitoring
- Offer comprehensive Help Desk Call Center Support
- Develop an effective backup and business continuity strategy centered on Data Protection Manager (DPM) backup technology
Progent's engineers offer advanced support in key areas of system protection that include security evaluation, firewalls and VPN, and high-level security planning.
System Security Audits
Progent's certified security consultants can assess the strength of your current network protection environment through comprehensive remote automated testing based on sophisticated utilities and proven techniques. Progent's skill in administering this testing saves you consulting fees and offers a detailed picture of security holes. The knowledge your IT organization gains can be used as the basis of a network protection plan that can allow your information system to operate safely and respond quickly to future risks.
Automated Network Security Assessment
Progent provides expertise in the use of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a set of automatic system testing checks to identify potential security vulnerabilities. Progent has extensive experience with additional network auditing products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can help you design protection into your business operations, install auditing tools, plan and deploy a secure system environment, and recommend procedures to maximize the safety of your network. Progent's security professionals are able to show you how to set up a firewall, design secure remote access to email and data, and integrate VPN. Find out additional information on Progent's network security analysis.
Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles designed to allow small companies to receive an objective network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive examination of your network from beyond your firewalled perimeter to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from an authorized computer inside your company firewall to determine the risk to internal threats. Both security inventory packages are set up and executed from a secured remote site. The project is overseen by a consultant who has earned high-level security accreditations and who generates a report that details and interprets the data captured by the security scan and proposes practical remediation where called for.
Network Penetration Testing Consulting
Stealth penetration checking is a key component of any comprehensive IT system security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your company's internal network support staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident alerts and event log analysis are properly configured and consistently monitored. Learn more concerning Progent's network security penetration testing support services.
Firewalls and VPN Support
Progent's background in network security technology encompasses in-depth field work with leading firewalls and VPN technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry accreditations such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, tune, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite access technology offer a full range of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business goals. Read additional information concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.
Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size companies professional consulting for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select the right technologies from multiple suppliers to support your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior analysis tools to guard endpoint devices and physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily escape legacy signature-based AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to automate the complete threat progression including protection, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint management, and web filtering through leading-edge tools packaged within one agent managed from a unified control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP environment that meets your company's unique needs and that helps you demonstrate compliance with government and industry data security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for immediate action. Progent's consultants can also help your company to set up and verify a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates your backup activities and allows fast restoration of vital files, apps and VMs that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can help you to recover your critical information. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to deliver web-based control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of analysis for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By updating and organizing your network documentation, you can eliminate up to 50% of time wasted searching for vital information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every company ought to have a thoroughly considered security strategy that includes both proactive processes and reaction plans. The proactive strategy is a collection of steps intended to minimize vulnerabilities. The reactive strategy assists your security engineers to evaluate the damage resulting from an attack, repair the system, document the experience, and get the IT network running as rapidly as feasible.
Progent's certified IT security engineers can to help your business to run a full risk evaluation and define a network security plan to implement security policies and mechanisms to reduce future assaults and dangers.
CISM Certified System Security Consulting Services
The CISM organization defines the basic capabilities and global standards of performance that information security managers are expected to learn. CISM provides executive management the assurance that consultants who have earned their CISM certification possess the background and knowledge to provide efficient security administration and support services. Progent offers the expertise of CISM Certified security consultants to help businesses with:
Read additional details concerning Progent's CISM Network Security Support Services.
- Network Security Strategies
- Risk Analysis
- IS Security Implementation Management
- IS Security Management
- Recovery Planning
CISSP Certified Security Consulting Services
CISSP recognizes mastery of a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential accreditation in the field of information security stipulated by ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security areas including:
Read additional details concerning Progent's CISSP-certified Network Security Consulting Services.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP Certified system architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most complex requirements of IS security architecture within the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-premier security consultants can assist your business with all phases of secure network architecture such as.
Find out more details concerning Progent's ISSAP Accredited Secure System Architecture Support Expertise.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Protection
- Data Encryption Options
- Needs Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is a prestigious achievement that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants pass a comprehensive examination administered by the ISACA international professional group. Progent's CISA-qualified information security audit experts are available to assist your IT organization in the areas of:
Find out additional details about Progent's CISA Accredited Security Auditing Consulting Support.
- IS Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle
- Information Technology Support
- Protecting Information Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's ability to design, implement, and maintain information system controls to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and execute a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation specialists can provide a variety of risk evaluation services such as:
Read additional information concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to evaluate significant vulnerabilities
- Identify statutory, regulatory, and contractual mandates and organizational policies associated with your information system to assess their potential influence on your business objectives
- Point out potential vulnerabilities for your business workflows to help in evaluating your corporate risk
- Create a risk awareness program and conduct training to make sure your organization appreciate IS risk so they can assist with your risk management process
- Connect identified risk vectors to related business processes to help assign risk responsibility
- Determine risk appetite with your senior management and major stakeholders to ensure they align
GIAC Qualified Security Consulting Expertise
Find out additional details about Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was founded in 1999 to certify the skill of computer security professionals. GIAC's goal is to make sure that an accredited professional possesses the knowledge necessary to provide services in key areas of network, data, and application program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit experts are available to assist your company in the areas of:
Talk to a Certified Security Expert
To learn how to get in touch with a certified Progent security consultant for remote or on-premises expertise in Ohio, phone 1-800-993-9400 or visit Online Network Support.