Company computer networks inOhiocan depend on quick and affordable online access to Progent's certified network security support specialists to fix urgent security issues. The cost is competitive, charges are per minute, engagement is immediate, and support is world class. Progent also offers assistance for complex engagements that demand the expertise of seasoned security consultants with top industry credentials.
If yourOhiooffice is located outside of larger metropolitan neighborhoods likeColumbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, help from local qualified network security professionals could be limited when there's a crisis. This can cause a loss of productivity for your business, upset customers, idle workers, and distracted executives. By contacting Progent, you have access to a Certified security engineer who can deliver expertise whenever you have to have it to keep your information system operating and salvage your data.
Progent can help you in your initiatives to defend your network with support services ranging from security audits to developing a company-wide security strategy. Progent offers economical support to assist small and midsize companies to set up and maintain protected IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security companies to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a further layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, DLP, and encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter.
Progent's certified professionals are available online or on premises to provide a range of emergency or project-based computer security services including:
If your business has an urgent requirement for computer security help, go to Progent's Urgent Online Technical Support.
Progent's security experts offer advanced services in key areas of computer protection that include security assessment, firewall/VPN support, and high-level security consulting.
Progent's expert security engineers can evaluate the effectiveness of your current computer protection systems through comprehensive remote automated testing via sophisticated software tools and proven techniques. Progent's skill in this service saves your company time and money and assures a detailed portrayal of security holes. The knowledge your company is provided can form the foundation of a network protection strategy that will permit your network to run dependably and adapt quickly to new risks.
Automated Security Audits
Progent offers expertise in the use of security analysis products such as Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a set of automatic system auditing scans to uncover possible security holes. Progent has broad experience with additional network auditing products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can show you how to design security into your business processes, install auditing tools, define and implement a protected system environment, and suggest policies to optimize the security of your IT system. Progent's security consultants are able to show you how to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Find out more about Progent's automated security audits.
Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to allow small companies to receive an objective security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive examination of your network from beyond your company firewall to uncover potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from a secure computer inside your company firewall to determine the risk to internal assaults. Both security inventory services are configured and executed from a protected external location. The project is overseen by a consultant who has earned top security credentials and who generates a report that details and analyzes the data captured by the security scan and suggests cost-effective improvements where called for.
Network Penetration Analysis Consulting
Stealth penetration checking is an important component of any serious IT system security plan. Progentís security experts can run thorough penetration checks without the knowledge of your company's internal IT resources. Stealth penetration testing shows whether current security monitoring systems such as intrusion incident alerts and event log monitoring are properly configured and actively monitored. Find out additional information on Progent's stealth security penetration analysis support services.
Firewalls and VPN Support
Progent's background in network security technology encompasses in-depth field work with major firewalls and Virtual Private Network products offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to manage your legacy PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Security and VPN Engineering Services
Cisco's network security and offsite access technology represent a complete line of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and CCNP certifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Find out more details about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWall. Progent can show you how to design a comprehensive security strategy and select the right technologies from a variety of suppliers to support your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior analysis technology to guard endpoint devices and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely evade traditional signature-based AV products. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the entire threat progression including blocking, infiltration detection, mitigation, remediation, and forensics. Key capabilities include one-click rollback using Windows VSS and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver economical in-depth security for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device control, and web filtering via cutting-edge tools packaged within one agent managed from a unified control. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP environment that meets your company's unique requirements and that helps you demonstrate compliance with legal and industry information security standards. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate attention. Progent can also help your company to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed service for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of vital files, apps and VMs that have become lost or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPAA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This reduces your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a further level of inspection for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be ported immediately to a different hosting environment without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard data about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Security Planning
Any company ought to develop a thoroughly considered security program that includes both preventive procedures and response plans. The pre-attack plan is a collection of procedures intended to reduce vulnerabilities. The post-attack strategy helps your security personnel to assess the impact resulting from an attack, repair the system, document the event, and get the IT network restored as soon as feasible.
Progent's certified IT security engineers can to help your business to perform a full vulnerability assessment and create a company-wide security plan to establish security processes and mechanisms to mitigate future assaults and dangers.
CISM Accredited Network Security Support Assistance
The CISM organization describes the core capabilities and international standards of performance that information security managers are expected to learn. It provides business management the assurance that those who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and consulting consulting. Progent can provide the services of CISM Certified security professionals to help companies with:
Read additional information about Progent's CISM Certified Information Security Consulting Expertise.
- Information Security Strategies
- Risk Management
- Network Security Program Management
- IS Security Management
- Response Planning
CISSP Certified Security Consulting Assistance
The CISSP credential recognizes expertise with a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential accreditation in the field of information security under ISO 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your business in a broad range of security areas including:
Find out more information concerning Progent's CISSP Security Consulting Services.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier system architecture engineers are experts who have earned ISSAP status as a result of thorough testing and significant experience with information security architecture. The ISSAP certification represents demonstrated mastery in the most complex demands of IS security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your company with all aspects of secure network architecture including.
Find out more information concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Expertise.
- Access Control Systems and Methodologies
- Phone System and System Infrastructure Protection
- Data Encryption Options
- Requirements Analysis and Security Standards
- BCP and Disaster Recovery Planning
- Hardware Security
CISA Accredited Network Security Auditing Consulting Services
The CISA credential is an important qualification that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA professional group. Progent's CISA-qualified network security audit engineers are available to help your IT organization in the areas of:
Learn additional details about Progent's CISA Certified Security Auditing Consulting Expertise.
- Information Systems Audit Services
- IT Administration
- Network Assets and Infrastructure Lifecycle
- IT Service Delivery
- Safeguarding Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's skills to design, implement, and support IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and execute a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management experts can provide a variety of risk evaluation services such as:
Get more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and review documentation to identify major vulnerabilities
- Identify statutory, industry, and contractual mandates and organizational standards related to your network to assess their possible influence on your strategic goals
- Identify possible vulnerabilities for your operational workflows to assist in analyzing your corporate risk
- Develop a risk awareness program and conduct seminars to make sure your stakeholders understand IS risk so they can assist with your risk management process
- Connect key risk vectors to related operational procedures to help assign risk responsibility
- Determine risk appetite with your senior management and key stakeholders to ensure they match
GIAC Accredited Security Engineering Expertise
Read additional details about Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of information technology security experts. GIAC's mission is to verify that an accredited professional possesses the skills needed to provide support in critical categories of network, data, and application program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit engineers are available to assist your IT organization with:
Contact a Security Expert
To find out how you can access a Progent security engineer for online or on-premises support in Ohio, call 1-800-993-9400 or visit Remote Network Support.