Company computer networks inPennsylvaniacan now get prompt and economical remote technical support from Progent's certified network security support specialists to resolve the toughest security issues. The cost is affordable, billing is per minute, sign-up is fast, and support is unbeatable. Progent also offers assistance for long-term engagements that demand the services of seasoned security engineers with high-level industry certifications.
If yourPennsylvaniaoffice is based some distance from more populated metropolitan areas such asPhiladelphia, Pittsburgh, Allentown, or Erie, contact with nearby qualified network security consultants may be problematic when there's an emergency. This can result in a loss of revenue for your company, angry customers, unproductive employees, and defocused executives. By utilizing Progent, you can get in touch with a Certified security consultant who can provide expertise whenever you need it to keep your system operating and salvage your data.
Progent can help you in all your initiatives to guard your IT environment with support that ranges from security audits to creating a company-wide security plan. Progent offers affordable service to assist businesses of all sizes to set up and manage secure IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone devices.
Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security companies to deliver centralized control and comprehensive protection for your email traffic. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks most threats from reaching your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall.
Progent's certified experts are accessible online or on site to offer a variety of emergency or longer-term IT security services such as:
If your company has an urgent requirement for computer security support, refer to Progent's Emergency Online Technical Help.
- Perform automated security evaluations
- Recover promptly after serious security breaches
- Install hardware and software firewalls
- Configure secure techniques for remote and mobile access
- Deploy effective applications for automatic defense against spam and directory harvest attacks
- Develop a company-wide security strategy with proactive monitoring
- Provide comprehensive Help Desk Services
- Help Develop an effective backup and restore solution based on Microsoft Data Protection Manager backup capability
Progent's engineers can deliver world-class services in key areas of network protection including security assessment, firewall and VPN solutions, and high-level security consulting.
Progent's expert security engineers can assess the strength of your existing network protection environment through exhaustive remote automated testing via sophisticated utilities and proven procedures. Progent's experience in administering this service saves you time and money and offers a detailed picture of weaknesses. The information your company is provided can be used as the basis of a security plan that can permit your information system to operate safely and respond quickly to new threats.
Automated Network Vulnerability Assessment
Progent provides consulting in the application of security testing software such as Microsoft's MBSA and GFI LANguard for economically performing a set of programmed network auditing scans to uncover potential security holes. Progent has broad experience with additional security analysis tools including NMAP Port Scanner, AMAP, eEye, as well as utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.
Progent can help you design protection into your business operations, configure auditing software, plan and implement a protected network architecture, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement secure remote connectivity to email and business applications, and install VPN. Learn additional information about Progent's automated security evaluation.
Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory service packages designed to enable small businesses to get an objective network security assessment from a certified security specialist. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive test of your network from outside your firewalled perimeter to uncover possible weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a system scan from a secure machine within your company firewall to evaluate the risk to inside threats. The two security inventory packages are configured and executed from a protected remote location. The project is overseen by an engineer with high-level security accreditations and who produces a document that summarizes and analyzes the data collected by the security scan and suggests practical improvements if called for.
Network Security Penetration Testing Consulting
Stealth intrusion checking is an important part of any comprehensive network security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's in-house network support staff. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion incident warnings and event log monitoring are correctly set up and consistently checked. Learn more concerning Progent's network penetration analysis support services.
Progent's background in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with key networking certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your current PIX or ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access technology provide a full range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP qualifications who are able to assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Read additional information about Progent's Engineering Expertise for Cisco Security Technology and VPN Appliances.
Consulting Services for Additional Firewall and VPN Products
Progent offers small and medium size companies professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWall. Progent can help you design a comprehensive security strategy and choose the right technologies from multiple suppliers to support your security goals while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis technology to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to address the entire malware attack lifecycle including blocking, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides firewall protection, intrusion alerts, device control, and web filtering via leading-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP environment that addresses your company's specific needs and that helps you demonstrate compliance with government and industry data protection standards. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent's consultants can also help you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup processes and allows rapid restoration of critical data, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPAA, FIRPA, and PCI and, when necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to provide web-based control and comprehensive protection for your email traffic. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email that stays inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hardware solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect data related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can save as much as 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Any company ought to develop a thoroughly thought out security program that includes both proactive procedures and reaction planning. The proactive plan is a set of mechanisms designed to reduce vulnerabilities. The reactive plan helps your company's network security engineers to evaluate the damage resulting from a security penetration, repair the network, record the event, and get the IT network restored as rapidly as feasible.
Progent's certified information security engineers are available to assist your business to perform a complete risk evaluation and create a company-wide security plan to establish security policies and controls to mitigate ongoing assaults and threats.
CISM Accredited Information Security Support Services
The CISM organization defines the core capabilities and worldwide standards of performance that IT security managers are expected to learn. CISM provides business management the assurance that those who have earned their CISM certification have the background and knowledge to deliver effective security administration and consulting consulting. Progent can provide the expertise of CISM Premier security professionals to assist businesses with:
Learn more information concerning Progent's CISM Qualified Network Security Engineering Expertise.
- Information Security Processes
- Risk Management
- IS Security Program Management
- Information Security Management
- Response Planning
CISSP Accredited Security Engineering Services
CISSP recognizes mastery of a global standard for information security. The American National Standards Institute has granted certification accreditation in the area of information security defined by ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas including:
Find out more details about Progent's CISSP Qualified Information Security Support Services.
- Security Administration Practices
- Security Infrastructure and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture engineers are experts who have earned ISSAP Certification as a result of rigorous testing and extensive experience with network security design. The ISSAP certification represents proven skill in the most challenging demands of information system security architecture bounded by the wider field of information security knowledge required for CISSP certification. Progent's ISSAP-premier security experts can help your business with all aspects of secure network architecture such as.
Find out more details concerning Progent's ISSAP Certified Secure Network Architecture Consulting Services.
- Access Control Systems and Techniques
- Phone System and System Infrastructure Security
- Encryption/Decryption Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning and DRP
- Physical Security
CISA Accredited Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a prestigious qualification that represents expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo a comprehensive examination administered by the ISACA international professional group. Progent's CISA network security audit experts are available to help your IT organization with:
Learn more information concerning Progent's CISA Certified Information System Security Auditing Engineering Support.
- IS Audit Process
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- IT Support
- Protecting Information Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and carry out a workplace continuity strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a range of risk identification services such as:
Find out additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and review documentation to evaluate significant vulnerabilities
- Identify legal, industry, and business mandates and organizational policies associated with your network to determine their potential influence on your strategic goals
- Identify potential threats for your operational processes to help in analyzing your enterprise risk
- Develop a risk awareness program and provide training to ensure your stakeholders understand information system risk so they can assist with your risk control program
- Match identified risk vectors to related business procedures to help determine risk responsibility
- Determine risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
GIAC Qualified Information System Security Engineering Support
GIAC was established in 1999 to certify the skill of computer security professionals. GIAC's mission is to make sure that a certified security consultant possesses the knowledge necessary to deliver support in important areas of network, information, and application software security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit engineers are available to help your IT organization in the areas of:
Read additional details about Progent's GIAC Information Assurance Support.
- Auditing Networks
- Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Talk to a Security Expert
To see how you can contact a certified security consultant for online or onsite assistance in Pennsylvania, phone 1-800-993-9400 or visit Remote Network Support.