Business computer networks inPennsylvanianow have prompt and affordable online access to Progent's qualified network security engineers to fix the toughest security problems. The cost is affordable, billing is by the minute, engagement is immediate, and support is unbeatable. Progent also provides assistance for complex projects that requires the knowledge of seasoned security engineers with high-level security credentials.
If yourPennsylvaniacompany is away from more populated urban neighborhoods such asPhiladelphia, Pittsburgh, Allentown, or Erie, contact with local accredited security professionals is often problematic during an emergency. This can cause a loss of productivity for your company, angry clients, idle workers, and defocused management. By contacting Progent, you have access to a Certified security engineer ready to deliver expertise when you have to have it to get your network running and salvage your data.
Progent can help you in your efforts to defend your IT environment with support that can range from security checks to developing a comprehensive security strategy. Progent provides affordable support to help small and midsize companies to set up and manage protected IT environments based on Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security platform that uses the technology of top data security companies to provide web-based control and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a deeper layer of analysis for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, DLP, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter.
Progent's certified experts are accessible remotely or on premises to provide a range of emergency or longer-term IT security services including:
If your business has an emergency requirement for computer security help, go to Progent's Urgent Online Technical Help.
Progent's support professionals can deliver world-class support in key fields of computer security including auditing, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can assess the strength of your current computer security implementation through exhaustive remote automated testing based on sophisticated utilities and tested techniques. Progent's skill in administering this service saves your company money and offers a detailed portrayal of gaps. The information your company gains can form the foundation of a network protection strategy that can permit your information system to run dependably and adapt rapidly to new threats.
Automated Vulnerability Audits
Progent offers expertise in the application of security auditing products such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically performing a variety of automatic system auditing scans to uncover potential security holes. Progent has broad knowledge of other network analysis products including NMAP Port Scanner, AMAP, eEye, plus tools like SolarWinds, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.
Progent can show you how to build security into your business operations, install scanning software, plan and implement a secure network architecture, and suggest policies to maximize the security of your IT system. Progent's security consultants are available to assist you to set up a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Learn more concerning Progent's automated security assessment.
Security Inventory Service Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get an objective network security assessment from an accredited security engineer. With Progent's External Network Security Inventory Checkup, a security expert runs an extensive examination of your network from beyond your firewall to uncover potential weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from a secure machine within your firewall to assess the risk to internal assaults. Both security inventory packages are set up and run from a secured remote site. The process is overseen by an engineer who has earned high-level security accreditations and who generates a report that details and analyzes the data captured by the scan and proposes practical remediation if appropriate.
Stealth Intrusion Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive IT system security plan. Progentís security professionals can run thorough penetration checks without the knowledge of your company's in-house network support staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident warnings and event log monitoring are properly configured and consistently checked. Find out more concerning Progent's network security penetration analysis support services.
Firewall And Virtual Private Network (VPN) Support
Progent's background in network security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of engineers with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote connection products represent a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Find out additional information about Progent's Consulting Expertise for Cisco Security and VPN Appliances.
Support Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and select appropriate products from a variety of vendors to achieve your security objectives while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning technology to defend endpoints and servers and VMs against modern malware assaults such as ransomware and email phishing, which easily escape traditional signature-based AV tools. ProSight ASM safeguards local and cloud-based resources and provides a single platform to manage the entire malware attack progression including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alerts, endpoint control, and web filtering through cutting-edge tools packaged within a single agent managed from a single control. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP deployment that addresses your company's specific requirements and that helps you prove compliance with legal and industry data security standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent action. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end service for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital files, applications and VMs that have become unavailable or corrupted due to component failures, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide world-class support to configure ProSight DPS to to comply with regulatory standards like HIPAA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your critical information. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security companies to deliver centralized control and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and safeguard data about your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as half of time spent trying to find vital information about your network. ProSight IT Asset Management features a common repository for holding and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Expert Network Security Design
Every business should develop a thoroughly thought out security program that includes both proactive processes and reaction planning. The proactive strategy is a collection of procedures intended to reduce security weaknesses. The post-attack plan assists your IT security personnel to assess the damage resulting from an attack, fix the network, record the experience, and get the IT network running as rapidly as feasible.
Progent's expert IT security consultants can to help your company to run a full vulnerability evaluation and define a network security strategy to implement security processes and controls to reduce future assaults and threats.
CISM Certified Network Security Engineering Expertise
The CISM committee describes the basic capabilities and worldwide standards of skill that IT security professionals are expected to master. CISM provides business management the confidence that consultants who have earned their CISM credential possess the experience and capability to deliver effective security management and support consulting. Progent can provide the support of CISM Premier security professionals to assist companies with:
Find out additional information about Progent's CISM Accredited IS Security Support Services.
- Network Security Processes
- Risk Management
- Network Security Implementation Management
- Information Security Management
- Response Planning
CISSP Certified Security Consulting Assistance
The CISSP credential recognizes mastery of a worldwide standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of data protection under ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your business in a variety security areas including:
Find out additional details about Progent's CISSP Information Security Consulting Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecom, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier information system architecture engineers are experts who have been awarded ISSAP status through thorough testing and extensive experience with information security design. The ISSAP certification represents demonstrated skill in the most challenging demands of information system security architecture within the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your business with all phases of secure network architecture such as.
Read more details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Services.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Security
- Data Encryption Solutions
- Requirements Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Information System Security Auditing Consulting Expertise
The CISA accreditation is a recognized achievement that signifies expertise in IS security audit and control. Certified by ANSI, the CISA credential has candidates pass a comprehensive examination given by the ISACA international professional group. Progent's CISA security audit consultants can help your IT organization in the areas of:
Read additional information concerning Progent's CISA Qualified Network Security Auditing Consulting Assistance.
- IS Audit Services
- IT Governance
- Systems and Architecture Lifecycle
- IT Support
- Protecting Information Assets
- Disaster Recovery Planning
The CRISC program was established by ISACA in 2010 to verify a consultant's ability to design, deploy, and maintain IS control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation consultants can provide a variety of risk evaluation services such as:
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and study documentation to identify major risk scenarios
- Inventory legal, regulatory, and contractual mandates and company standards associated with your network to determine their potential influence on your business goals
- Identify possible threats for your operational workflows to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct training to make sure your stakeholders appreciate IS risk so they can contribute to your risk management program
- Connect key risk vectors to related business procedures to help assign risk responsibility
- Determine risk appetite with executive management and major stakeholders to ensure they are in agreement
GIAC Certified Information System Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of network security experts. GIAC's mission is to ensure that a certified professional possesses the skills needed to deliver support in key categories of network, information, and application software security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. NSA. Progent's GIAC-certified security audit consultants can assist your IT organization with:
Find out more details concerning Progent's GIAC Information Assurance Services.
- Auditing Networks
- Incident Response
- Traffic Analysis
- Web Services Security
- SIEM solutions
Talk to a Progent Security Specialist
To learn how to get in touch with a certified security consultant for remote or onsite expertise in Pennsylvania, phone 1-800-993-9400 or visit Remote Computer Help.