Company IT networks inPennsylvaniacan have prompt and affordable remote access to Progent's qualified network security professionals to help with urgent security issues. Rates are competitive, billing is by the minute, sign-up is fast, and support is unbeatable. Progent also provides assistance for long-term projects that requires the services of seasoned security engineers with top security certifications.
If yourPennsylvanianetwork is located outside of larger metropolitan neighborhoods includingPhiladelphia, Pittsburgh, Allentown, or Erie, contact with nearby accredited security experts is often limited when you have an urgent situation. This could mean a loss of revenue for your company, upset clients, idle workers, and distracted executives. By calling Progent's remote support, you can get in touch with a Certified security professional ready to provide assistance when you need it to get your information system running and salvage your data.
Progent can help you at any level in your initiatives to protect your network with services that can range from network security assessments to developing a company-wide security strategy. Progent offers economical support to help businesses of all sizes to configure and maintain protected networks based on Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of top information security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.
Progent's security experts are available online or on site to offer a variety of emergency or longer-term network security services such as:
If your company has an emergency need for computer security support, refer to Progent's Emergency Remote Network Help.
- Run automated network security evaluations
- Clean up rapidly after attacks
- Install effective firewalls
- Implement secure solutions for offsite and mobile access
- Install effective utilities for automatic defense against spam and DHAs
- Develop a comprehensive security plan with 24x7 network monitoring
- Offer outsourced Help Desk Services
- Create a practical data backup and business continuity solution centered on Microsoft DPM backup/restore technology
Progent's support professionals provide advanced services in vital fields of network security including security assessment, firewalls and VPN, and advanced security consulting.
Progent's certified security consultants can evaluate the effectiveness of your existing computer security implementation by performing comprehensive remote automated analysis based on sophisticated utilities and proven procedures. Progent's skill in administering this testing saves your company money and offers an accurate portrayal of security holes. The knowledge your business is provided can make up the foundation of a network protection plan that will permit your information system to run safely and react rapidly to new risks.
Automated Network Security Analysis
Progent provides expertise in the use of security testing software including MBSA and GFI LANguard for affordably running a variety of programmed system testing checks to identify possible security vulnerabilities. Progent has broad knowledge of additional security auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can show you how to build protection into your business operations, install auditing applications, define and implement a protected network architecture, and recommend policies to optimize the security of your network. Progent's security professionals are ready to help you configure a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Learn additional information concerning Progent's automated security evaluation.
Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory service bundles designed to enable small businesses to get an impartial security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a security expert administers an extensive examination of your IT infrastructure from beyond your company firewall to determine possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized computer within your firewall to evaluate your exposure to inside threats. Both security inventory services are configured and run from a secured external site. The project is directed by an engineer with top security credentials and who produces a report that details and analyzes the information captured by the security scan and proposes practical remediation if appropriate.
Network Intrusion Testing Support Services
Stealth penetration testing is a key component of any comprehensive network security plan. Progentís security experts can run thorough intrusion checks without the awareness of your company's in-house IT resources. Stealth penetration testing shows whether existing security defense tools such as intrusion incident warnings and event history analysis are correctly set up and consistently checked. Find out more on Progent's network security penetration analysis consulting.
Progent's expertise in security technology includes in-depth familiarity with major firewalls and VPN products from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with key industry certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to maintain your current PIX or ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.
Cisco Security and VPN Engineering Services
Cisco's network security and offsite connection products represent a comprehensive range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Learn additional information concerning Progent's Engineering Expertise for Cisco Security Solutions and VPN Appliances.
Engineering Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWall. Progent can help you create a comprehensive security strategy and select the right technologies from multiple vendors to support your security objectives while sticking within your spending limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior analysis tools to guard endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to address the entire threat progression including blocking, identification, mitigation, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge technologies packaged within a single agent accessible from a unified control. Progent's data protection and virtualization experts can help your business to design and configure a ProSight ESP deployment that meets your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent's consultants can also assist your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of vital data, applications and VMs that have become lost or damaged due to hardware failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPAA, FINRA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading information security companies to deliver centralized control and world-class security for all your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper layer of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved easily to a different hardware solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect data about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can save as much as half of time wasted searching for vital information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre planning enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Find out more about ProSight IT Asset Management service.
Certified Network Security Consulting
Every business ought to develop a carefully considered security strategy that incorporates both pre-attack procedures and reaction plans. The pre-attack strategy is a set of steps that help to reduce security weaknesses. The post-attack plan assists your security engineers to evaluate the impact caused by a security penetration, fix the network, document the experience, and get the IT network running as soon as possible.
Progent's certified information security consultants can to help your business to run a complete vulnerability evaluation and create a network security plan to implement security policies and controls to mitigate future attacks and dangers.
CISM Certified Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and international standards of performance that IT security professionals are expected to learn. CISM provides executive management the confidence that those who have qualified for their CISM credential possess the background and capability to deliver effective security administration and support consulting. Progent offers the support of CISM Certified security consultants to help businesses with:
Read additional details concerning Progent's CISM Accredited IS Security Engineering Services.
- IS Security Governance
- Vulnerability Management
- Network Security Program Management
- IS Security Administration
- Response Management
CISSP Accredited Security Engineering Expertise
CISSP certification denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information security defined by ISO 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas including:
Find out additional details concerning Progent's CISSP Accredited Cybersecurity Support Professionals.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure Information System Architecture Consulting Assistance
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have earned ISSAP status as a result of thorough examination and extensive experience with information security design. The ISSAP certification indicates demonstrated skill in the most in-depth requirements of information security architecture within the wider field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture including.
Find out additional details about Progent's ISSAP Accredited Secure Information System Architecture Support Services.
- Access Management Mechanisms and Techniques
- Telecom and Network Infrastructure Security
- Data Encryption Options
- Requirements Analysis and Security Standards
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a recognized achievement that indicates mastery in IS security auditing. Certified by ANSI, the CISA credential requires that candidates undergo a comprehensive examination administered by the ISACA international professional group. Progent's CISA-qualified IS security audit specialists are available to assist your IT organization in the areas of:
Read more information concerning Progent's CISA Qualified Security Auditing Engineering Support.
- IS Audit Process
- Information Technology Administration
- Systems and Infrastructure Planned Useful Life
- IT Service Delivery
- Protecting Data Resources
- Business Continuity Planning
The CRISC program was established by ISACA to validate a consultant's skills to design, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and carry out a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a variety of risk identification services including:
Find out additional information about Progent's CRISC Risk Management Consultants.
- Collect data and study documentation to identify major vulnerabilities
- Identify legal, regulatory, and contractual mandates and organizational policies associated with your information system to determine their possible influence on your strategic goals
- Point out possible threats for your operational workflows to assist in analyzing your corporate risk
- Create a risk awareness program and conduct seminars to ensure your stakeholders understand IS risk so they can contribute to your risk control program
- Connect key risk vectors to your associated operational processes to help determine risk ownership
- Determine risk tolerance with your senior leadership and major stakeholders to ensure they are in agreement
GIAC Qualified Security Engineering Support
Global Information Assurance Certification was established in 1999 to validate the skill of network security professionals. GIAC's mission is to assure that a certified professional has the knowledge needed to deliver services in key categories of system, data, and software security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified IS security audit experts can help your business in the areas of:
Learn more details concerning Progent's GIAC Information Assurance Support.
- Auditing Perimeters
- Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Get in Touch with a Certified Security Specialist
To find out how to get in touch with a Progent security consultant for remote or on-premises expertise in Pennsylvania, phone 1-800-993-9400 or go to Online Network Help.