Company IT networks in Ohio now have fast and affordable online help from Progent's qualified network security professionals to assist with complex security issues. Rates are reasonable, billing is per minute, engagement is fast, and support is unbeatable. Progent also provides assistance for complex engagements that demand the services of senior security consultants with high-level security certifications.
In case your Ohio company is far from major metropolitan neighborhoods like Columbus, Cleveland, Cincinnati, Toledo, Akron, or Dayton, the availability of local certified network security consultants may be limited during an urgent situation. This could mean a drop in productivity for your business, angry customers, idle workers, and defocused management. By utilizing Progent, you have access to a Premier security professional ready to deliver expertise whenever you require it to keep your information system on line and recover your information.
Progent can assist you in your initiatives to defend your IT environment with services ranging from network security checks to developing a comprehensive security strategy. Progent offers affordable support to assist businesses of all sizes to design and manage safe IT environments based on Windows and Cisco technology and that can include computers running UNIX or Linux operating systems as well as mobile users with Apple handhelds or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to provide web-based control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.
Progent's security experts are available remotely or on site to provide a range of urgent or longer-term IT security services such as:
If your business has an urgent requirement for IT security help, refer to Progent's Emergency Online Technical Support.
- Perform automated network security audits
- Clean up rapidly after virus and worm attacks
- Configure and troubleshoot firewalls
- Implement safe techniques for offsite and mobile connectivity
- Install advanced software for defense against viruses, spam and directory harvest attacks
- Develop a comprehensive security plan with proactive security monitoring
- Offer comprehensive Help Desk Call Center Services
- Help Develop an effective data backup and business continuity strategy based on Microsoft DPM automated backup technology
Progent's security experts provide advanced support in key areas of computer security including security assessment, firewalls and VPN, and advanced security consulting.
Progent's certified security engineers can assess the vulnerability of your existing network security environment by performing comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in administering this service saves you money and assures a detailed picture of gaps. The knowledge your IT organization gains can be used as the foundation of a security plan that will permit your network to operate safely and react rapidly to future threats.
Automated Network Security Audits
Progent provides expertise in the use of security evaluation products such as MBSA and GFI LANguard NSS for economically performing a variety of automatic network auditing checks to uncover possible security vulnerabilities. Progent has broad knowledge of additional security auditing utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can show you how to design security into your company operations, install auditing software, plan and implement a secure network architecture, and suggest procedures to maximize the safety of your network. Progent's security consultants are able to show you how to set up a firewall, design safe remote connectivity to email and data, and install virtual private network. Learn additional information on Progent's automated security audits.
Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small businesses to receive an objective network security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive test of your IT infrastructure from outside your firewall to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from an authorized computer within your company firewall to assess your exposure to internal attacks. Both security inventory packages are set up and executed from a protected remote site. The project is directed by a consultant who has earned high-level security credentials and who generates a report that summarizes and interprets the data captured by the scan and suggests practical improvements if called for.
Network Intrusion Testing Support Services
Stealth intrusion testing is a key part of any comprehensive network security strategy. Progentís security professionals can run thorough penetration tests without the knowledge of your organization's internal IT staff. Unannounced penetration testing shows whether existing security defense systems such as intrusion detection alerts and event history analysis are correctly set up and consistently monitored. Find out additional information about Progent's stealth security penetration analysis consulting.
Firewalls and VPN Support
Progent's background in security technology encompasses extensive familiarity with leading firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite connection technology represent a full line of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business objectives. Learn additional information concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.
Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWall. Progent can show you how to design a detailed security plan and choose appropriate products from a variety of vendors to achieve your security objectives while staying within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior-based analysis tools to defend endpoints and physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily escape legacy signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to automate the complete threat lifecycle including filtering, detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer security for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device control, and web filtering via cutting-edge tools incorporated within one agent accessible from a single console. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP deployment that meets your company's unique needs and that helps you demonstrate compliance with legal and industry information security regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent can also help you to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of vital files, applications and virtual machines that have become lost or corrupted due to hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide advanced support to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security companies to deliver centralized control and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs or warranties. By updating and organizing your IT documentation, you can eliminate up to 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre making enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Network Security Consulting
Any business should have a thoroughly considered security program that incorporates both proactive processes and reaction planning. The proactive plan is a set of steps that help to minimize security weaknesses. The reactive strategy helps your company's security engineers to evaluate the damage caused by a security penetration, repair the damage, document the event, and get business functions operational as soon as possible.
Progent's expert IT security engineers can to help your business to run a complete risk evaluation and create a network security plan to implement security processes and mechanisms to mitigate ongoing assaults and threats.
CISM Certified System Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and international standards of performance that IT security managers are expected to master. It provides executive management the confidence that consultants who have qualified for their CISM credential possess the background and capability to deliver efficient security management and consulting consulting. Progent offers the support of CISM Certified security professionals to assist companies with:
Find out additional details concerning Progent's CISM IS Security Support Services.
- Network Security Strategies
- Risk Management
- IS Security Program Management
- Information Security Management
- Response Planning
CISSP Qualified Security Consulting Expertise
CISSP certification denotes mastery of a worldwide standard for information security. The American National Standards Institute has awarded certification recognition in the field of information security stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas such as:
Read additional details concerning Progent's CISSP Cybersecurity Consulting Expertise.
- Security Management Practices
- Security Infrastructure and Models
- Access Management Solutions and Processes
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have earned ISSAP status through thorough testing and extensive experience with network security design. The ISSAP certification indicates proven skill in the more in-depth requirements of IS security architecture within the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture including.
Read additional details concerning Progent's ISSAP Accredited Secure Information System Architecture Support Expertise.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Infrastructure Security
- Encryption/Decryption Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Hardware Security
CISA Accredited Information System Security Auditing Consulting Support
The CISA credential is a prestigious qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA information security audit consultants can assist your business in the areas of:
Learn additional information about Progent's CISA Qualified Network Security Auditing Engineering Assistance.
- Information Systems Audit Process
- Information Technology Enforcement
- Network Assets and Architecture Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was initiated by ISACA to verify an IT professional's ability to design, implement, and maintain IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation engineers offer a variety of risk assessment services such as:
Read more details concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to help identify significant risk scenarios
- Identify statutory, regulatory, and business requirements and company standards related to your information system to determine their possible influence on your strategic objectives
- Identify potential vulnerabilities for your operational processes to help in analyzing your corporate risk
- Develop a risk awareness initiative and provide training to ensure your organization appreciate information system risk so they can assist with your risk control process
- Match key risk scenarios to related operational procedures to help assign risk ownership
- Determine risk appetite with your senior leadership and key stakeholders to make sure they are in agreement
GIAC Qualified Security Engineering Support
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to make sure that an accredited professional has the skills necessary to provide support in critical areas of system, information, and application program security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit specialists are available to assist your business in the areas of:
Learn additional details concerning Progent's GIAC Information Assurance Support.
- Assessing Perimeters
- Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Talk to a Certified Progent Security Engineer
To see how you can access a certified security engineer for remote or on-premises expertise in Ohio, call 1-800-993-9400 or go to Online Computer Help.