Company computer networks in the state of Pennsylvania now have fast and affordable remote access to Progent's accredited network security support specialists to assist with complex security issues. Rates are affordable, billing is by the minute, engagement is fast, and service is world class. Progent also provides help for long-term engagements that requires the knowledge of seasoned security consultants with top industry credentials.
If your Pennsylvania business is situated away from major urban neighborhoods such as Philadelphia, Pittsburgh, Allentown, or Erie, the availability of nearby qualified network security consultants may be problematic when you have an emergency. This can cause lost revenue for your company, upset clients, unproductive employees, and distracted executives. By utilizing Progent, you have access to a Premier security consultant who can deliver expertise whenever you need it to get your information system on line and restore your information.
Progent can help you at any level in your initiatives to defend your network with support services ranging from network security checks to creating a comprehensive security strategy. Progent offers economical service to assist small and midsize companies to configure and maintain safe IT environments powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security vendors to deliver web-based management and world-class security for your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter.
Progent's security experts are available remotely or in person to provide a range of emergency or longer-term computer security services which include:
If your business has an emergency need for computer security support, go to Progent's Urgent Online Technical Help.
- Run comprehensive network security evaluations
- Recover promptly after attacks
- Configure and troubleshoot firewalls
- Implement secure methods for offsite and mobile connectivity
- Install advanced solutions for automatic protection against spam and DHAs
- Help create a company-wide security strategy with round-the-clock security monitoring
- Offer comprehensive Help Desk Call Center Services
- Help Create an effective network backup and restore solution based on Microsoft DPM backup technology
Progent's consultants can deliver world-class support in key areas of computer protection including security assessment, firewall/VPN support, and advanced security planning.
Progent's certified security engineers can assess the vulnerability of your existing computer security environment through comprehensive remote automated analysis via sophisticated software tools and proven techniques. Progent's experience in this service saves you time and money and assures an objective portrayal of gaps. The information your IT organization is provided can make up the foundation of a security plan that will allow your information system to operate dependably and react quickly to future threats.
Automated Security Analysis
Progent offers expertise in the application of security auditing packages including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a variety of automatic network testing checks to identify possible security holes. Progent has broad experience with other network auditing utilities such as NMAP, AMAP, eEye, as well as utilities such as SolarWinds, Hydra, and Nikto. Progent can show you how to understand audit reports and react effectively.
Progent can help you design security into your company operations, configure auditing software, plan and implement a protected system architecture, and recommend policies to maximize the safety of your network. Progent's security consultants are available to help you configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Find out additional information about Progent's network security audits.
Security Inventory Scanning Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages intended to enable small companies to receive a professional security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive examination of your network from outside your firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a network scan from a secure machine inside your firewall to evaluate the risk to inside attacks. The two security inventory packages are set up and run from a protected external location. The process is directed by a consultant with high-level security credentials and who generates a report that details and interprets the data captured by the scan and proposes cost-effective improvements if called for.
Stealth Security Penetration Testing Support Services
Stealth intrusion testing is an important component of any comprehensive IT system security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your organization's internal IT staff. Stealth penetration checking shows whether existing security defense systems such as intrusion incident warnings and event log analysis are properly configured and consistently checked. Learn additional information about Progent's stealth penetration testing consulting.
Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) products from multiple companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to manage your legacy PIX or ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services configuration and debugging services.
Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and offsite connection products represent a complete range of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and CCNP certifications who can help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Read additional details about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.
Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security plan and choose the right technologies from multiple suppliers to achieve your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning tools to guard endpoints as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a single platform to manage the entire threat lifecycle including protection, infiltration detection, containment, remediation, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge tools incorporated within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to plan and implement a ProSight ESP environment that meets your organization's specific requirements and that helps you demonstrate compliance with government and industry data protection standards. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for immediate attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical files, applications and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can provide advanced support to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to deliver web-based management and comprehensive protection for all your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway device adds a deeper level of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hardware environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as half of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any business should have a thoroughly considered security strategy that incorporates both preventive processes and reaction planning. The pre-attack plan is a set of mechanisms that help to minimize security weaknesses. The post-attack strategy assists your company's network security personnel to evaluate the impact caused by a security penetration, fix the damage, document the event, and get the IT network operational as quickly as possible.
Progent's expert IT security engineers are available to help your business to run a full risk evaluation and define a computer security strategy to implement security processes and controls to mitigate ongoing assaults and dangers.
CISM Qualified Information Security Support Expertise
The CISM committee describes the core competencies and global standards of skill that IT security managers are required to learn. It gives executive management the assurance that those who have earned their CISM credential have the experience and capability to deliver effective security administration and consulting services. Progent offers the support of CISM Certified security professionals to assist companies with:
Find out more details about Progent's CISM Accredited IS Security Support Expertise.
- Network Security Governance
- Vulnerability Management
- IS Security Program Management
- IS Security Management
- Response Management
CISSP Qualified Security Consulting Expertise
CISSP certification denotes mastery of an international standard for information security. ANSI has awarded certification recognition in the area of data protection defined by ISO 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:
Read more details about Progent's CISSP Accredited Information Security Support Services.
- Security Administration Practices
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP Certified IT architecture professionals are consultants who have been awarded ISSAP status through thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the most in-depth requirements of information security architecture bounded by the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all aspects of secure network architecture including.
Read additional information about Progent's ISSAP Qualified Secure IT Architecture Engineering Professionals.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Data Encryption Solutions
- Requirements Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA-certified security audit experts are available to assist your business with:
Learn more details concerning Progent's CISA Accredited Network Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Administration
- Systems and Architecture Lifecycle Planning
- IT Support
- Safeguarding Data Resources
- Disaster Recovery Planning
The CRISC program was established by ISACA to validate an IT professional's skills to plan, implement, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity plan based on industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk management specialists can provide a variety of risk evaluation services such as:
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to evaluate significant vulnerabilities
- Identify legal, industry, and contractual requirements and organizational standards related to your information system to assess their possible influence on your business goals
- Identify potential threats for your operational workflows to assist in evaluating your enterprise risk
- Create a risk awareness program and provide training to make sure your stakeholders appreciate IT risk so they can contribute to your risk management program
- Match identified risk scenarios to your associated business procedures to help determine risk ownership
- Determine risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
GIAC Accredited IS Security Consulting Assistance
Find out additional information about Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's mission is to make sure that a certified security consultant has the skills necessary to deliver services in important categories of system, information, and software security. GIAC certifications are acknowledged by companies and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-certified IS security audit specialists are available to assist your IT organization in the areas of:
Talk to a Progent Security Engineer
To learn how to contact a Progent security consultant for online or on-premises help in Pennsylvania, phone 1-800-993-9400 or go to Remote Network Support.