Business IT networks in Pennsylvania can have fast and economical remote help from Progent's accredited security experts to resolve critical security problems. The cost is competitive, billing is by the minute, sign-up is fast, and support is unbeatable. Progent also offers help for long-term projects that demand the knowledge of senior security engineers with top security credentials.

In case your Pennsylvania organization is based outside of more populated metropolitan areas like Philadelphia, Pittsburgh, Allentown, or Erie, contact with nearby accredited security consultants may be limited when there's an urgent situation. This can result in a loss of revenue for your company, angry customers, idle employees, and defocused management. By utilizing Progent's online services, you can get in touch with a Certified security engineer who can deliver assistance when you have to have it to get your computer network operating and recover your information.

Progent can assist you at any level in your initiatives to defend your information system with support services that ranges from network security checks to developing a company-wide security strategy. Progent offers affordable support to help companies of any size to design and manage protected networks based on Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to deliver centralized control and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a deeper level of analysis for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also enable Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.

Progent's security professionals are available online or on site to provide a variety of urgent or project-based computer security services including:

If your network has an emergency need for IT security help, go to Progent's Emergency Online Technical Support.

Progent's engineers offer world-class support in vital fields of network protection including security assessment, firewall and VPN solutions, and high-level security consulting.

System Security Evaluation
Progent's expert security engineers can assess the strength of your current computer protection environment through comprehensive remote automated analysis via sophisticated utilities and proven procedures. Progent's skill in this testing saves you money and offers an accurate picture of system vulnerability. The information your business gains can be used as the basis of a network protection plan that can permit your information system to operate safely and adapt quickly to future risks.

Automated Network Vulnerability Evaluation
Progent provides expertise in the use of security auditing utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a variety of programmed network auditing checks to identify potential security weaknesses. Progent has extensive experience with other security analysis tools including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can help you build security into your company operations, configure auditing tools, plan and implement a secure network environment, and recommend procedures to optimize the safety of your network. Progent's security professionals are available to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and install VPN. Find out more about Progent's network security analysis.

Security Inventory Service Packages for Small Companies
Progent has put together two low-cost security inventory bundles intended to enable small companies to get an impartial security assessment from an accredited security consultant. With Progent's External Security Inventory Checkup, a security engineer runs an extensive examination of your IT infrastructure from outside your firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer runs a network scan from a secure machine within your company firewall to uncover vulnerabilities to internal threats. Both security inventory services are configured and executed from a secured remote location. The project is overseen by an engineer with high-level security accreditations and who generates a report that details and interprets the information collected by the security scan and suggests practical remediation where called for.

Stealth Security Penetration Analysis Consulting
Stealth penetration checking is an important part of any comprehensive IT system security plan. Progentís security professionals can perform thorough penetration checks without the knowledge of your company's in-house IT resources. Stealth penetration checking shows whether current security monitoring tools such as intrusion incident warnings and event history analysis are correctly configured and actively checked. Learn additional information concerning Progent's network penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote access products represent a full range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business goals. Find out additional information concerning Progent's Support Expertise for Cisco Security Technology and VPN Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security plan and choose the right technologies from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis technology to guard endpoints as well as servers and VMs against new malware assaults like ransomware and email phishing, which routinely evade traditional signature-matching AV products. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to address the complete threat progression including filtering, identification, containment, remediation, and forensics. Key capabilities include one-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies packaged within one agent managed from a unified console. Progent's security and virtualization experts can assist your business to plan and configure a ProSight ESP environment that addresses your organization's unique needs and that helps you demonstrate compliance with government and industry information security standards. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also help you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates your backup activities and allows fast restoration of critical data, applications and virtual machines that have become lost or damaged due to component failures, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when needed, can assist you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to deliver centralized management and world-class security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Design
Every business ought to develop a thoroughly thought out security strategy that incorporates both proactive processes and reaction planning. The proactive plan is a set of steps intended to minimize security weaknesses. The post-attack plan assists your company's security personnel to assess the impact resulting from an attack, fix the network, record the experience, and get business functions operational as quickly as feasible.

Progent's expert IT security consultants can to help your company to perform a full risk assessment and define a computer security plan to establish security processes and controls to minimize future attacks and dangers.

CISM Certified Security Consulting Assistance
The CISM committee describes the core competencies and global standards of performance that IT security professionals are expected to learn. CISM provides business management the assurance that those who have qualified for their CISM certification possess the experience and capability to provide efficient security administration and consulting services. Progent can provide the expertise of CISM Certified security consultants to help businesses with:

  • Network Security Strategies
  • Risk Management
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Management
Read additional information about Progent's CISM Accredited IS Security Engineering Expertise.

CISSP Certified Security Engineering Assistance
CISSP certification recognizes expertise with an international standard for network security. ANSI has awarded the CISSP credential recognition in the area of information security stipulated by ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Preparedness
Find out additional details concerning Progent's CISSP Network Security Consulting Expertise.

CISSP-ISSAP Accredited Secure Network Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough testing and extensive experience with information security design. The ISSAP certification represents demonstrated skill in the most complex demands of information security architecture bounded by the wider scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security consultants can help your business with all aspects of secure network architecture such as.

  • Access Management Systems and Methodologies
  • Phone System and Network Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Read more details about Progent's ISSAP Qualified Secure Information System Architecture Engineering Professionals.

CISA Certified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is an important achievement that signifies mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive test given by the ISACA professional association. Progent's CISA network security audit specialists are available to assist your IT organization in the areas of:

  • IS Audit Process
  • IT Administration
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Preparedness
Find out the details about Progent's CISA Qualified Information System Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's skills to design, deploy, and maintain information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation specialists offer a variety of risk evaluation services including:

  • Gather information and study documentation to identify significant risk scenarios
  • Inventory legal, regulatory, and business requirements and company policies associated with your network to determine their possible impact on your strategic goals
  • Identify potential vulnerabilities for your operational processes to assist in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to make sure your organization appreciate IS risk so they can contribute to your risk control program
  • Match identified risk vectors to your associated operational procedures to help determine risk ownership
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they align
Read more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Engineering Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to make sure that an accredited professional has the skills appropriate to provide services in important categories of system, information, and application program security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC IS security audit engineers can assist your company with:

  • Auditing Perimeters
  • Security Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn additional details about Progent's GIAC Information Assurance Support.

Talk to a Certified Security Specialist
To see how to contact a Progent security engineer for online or on-premises assistance in Pennsylvania, call 1-800-993-9400 or visit Remote Network Support.