Business information networks in Pennsylvania can now get quick and economical online help from Progent's qualified network security engineers to assist with complex security problems. Rates are affordable, billing is per minute, engagement is fast, and service is world class. Progent also offers help for complex projects that requires the knowledge of seasoned security engineers with high-level industry credentials.
In case your Pennsylvania company is far from major urban neighborhoods like Philadelphia, Pittsburgh, Allentown, or Erie, support from nearby certified network security support specialists may be limited during an urgent situation. This can cause a loss of income for your business, angry clients, idle employees, and distracted management. By utilizing Progent, you have access to a Premier security professional ready to deliver help whenever you need it to keep your network operating and restore your data.
Progent can assist you in all your initiatives to defend your information system with support that ranges from security checks to creating a company-wide security strategy. Progent offers economical support to assist small and midsize companies to configure and maintain secure networks powered by Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver web-based control and world-class security for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.
Progent's certified professionals are accessible remotely or in person to provide a range of emergency or longer-term network security services which include:
If your network has an immediate need for computer security help, refer to Progent's Emergency Online Network Support.
Progent's support professionals provide advanced support in key fields of system protection including security evaluation, firewall/VPN support, and advanced security planning.
System Security Audits
Progent's certified security consultants can assess the vulnerability of your existing computer security systems through comprehensive remote automated testing via sophisticated utilities and tested techniques. Progent's skill in administering this service saves your company time and money and assures a detailed picture of gaps. The information your business gains can be used as the basis of a network protection plan that will allow your network to run safely and react quickly to new risks.
Automated Network Vulnerability Assessment
Progent provides expertise in the use of security testing utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically running a variety of automatic system auditing checks to uncover possible security vulnerabilities. Progent has broad experience with additional security auditing tools such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.
Progent can show you how to design protection into your business processes, configure auditing applications, define and implement a protected system environment, and recommend procedures to optimize the security of your network. Progent's security professionals are ready to help you set up a firewall, implement safe remote connectivity to email and data, and install VPN. Find out additional information on Progent's network security evaluation.
Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to allow small companies to get a professional security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from beyond your company firewall to determine potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a network scan from an authorized computer within your company firewall to uncover the risk to inside attacks. The two security inventory packages are set up and run from a protected external site. The project is directed by an engineer who has earned top security accreditations and who produces a document that summarizes and analyzes the data captured by the security scan and suggests cost-effective improvements where called for.
Stealth Penetration Testing Support Services
Stealth intrusion checking is an important component of any successful network security strategy. Progentís security experts can perform thorough intrusion checks without the knowledge of your organization's in-house IT staff. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion incident warnings and event log monitoring are properly set up and actively monitored. Find out additional information about Progent's stealth penetration testing support services.
Firewall and Virtual Private Network Expertise
Progent's expertise in security technology includes extensive field work with major firewalls and VPN technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants with important industry accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist you to manage your existing PIX or Cisco ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and remote access technology represent a full range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's VPN product family features switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Read additional details about Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.
Support Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and Symantec. Progent can help you create a comprehensive security plan and select appropriate products from a variety of suppliers to achieve your security objectives while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely get by traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to automate the complete threat progression including protection, infiltration detection, containment, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge tools packaged within one agent managed from a single control. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that allows you prove compliance with government and industry information security standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent action. Progent can also assist your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup processes and enables rapid restoration of vital files, apps and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to provide web-based management and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper level of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hosting solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data about your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time spent trying to find vital information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Every business should develop a carefully thought out security program that incorporates both pre-attack procedures and response plans. The pre-attack strategy is a collection of steps that help to reduce vulnerabilities. The post-attack plan helps your company's network security personnel to evaluate the impact resulting from an attack, repair the system, record the event, and get business functions operational as soon as feasible.
Progent's certified information security consultants are available to assist your company to run a comprehensive vulnerability assessment and create a company-wide security strategy to implement security processes and mechanisms to mitigate future attacks and threats.
CISM Certified System Security Consulting Assistance
The CISM organization describes the core competencies and international standards of performance that information security professionals are required to master. CISM gives executive management the assurance that those who have qualified for their CISM credential have the background and capability to deliver efficient security management and consulting consulting. Progent offers the services of CISM Certified security professionals to help companies with:
Find out additional details concerning Progent's CISM Accredited Security Consulting Expertise.
- Information Security Processes
- Vulnerability Analysis
- Network Security Program Management
- Information Security Administration
- Response Management
CISSP Qualified Security Consulting Services
CISSP certification denotes expertise with a global standard for information security. ANSI has awarded the CISSP credential accreditation in the field of information security defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security areas such as:
Learn more information about Progent's CISSP Accredited Cybersecurity Consulting Expertise.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP Certified system architecture engineers are consultants who have been awarded ISSAP Certification through thorough examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more challenging demands of information system security architecture within the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of architecture security such as.
Find out more details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Services.
- Access Management Systems and Methodologies
- Telecommunications and Network Protection
- Cryptography Options
- Needs Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Network Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that represents mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test given by the ISACA international professional association. Progent's CISA-certified information security audit consultants are available to help your company with:
Learn more details about Progent's CISA Qualified IS Security Auditing Engineering Support.
- IS Audit Services
- Information Technology Governance
- Network Assets and Architecture Lifecycle Planning
- IT Support
- Protecting Information Assets
- Business Continuity Preparedness
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity plan that follows leading practices identified by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation consultants can provide a variety of risk evaluation services including:
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to identify major vulnerabilities
- Identify legal, industry, and business requirements and organizational standards related to your network to determine their possible influence on your strategic goals
- Point out possible threats for your business processes to help in evaluating your corporate risk
- Develop a risk awareness initiative and provide seminars to ensure your stakeholders understand IT risk so they can assist with your risk control program
- Match key risk scenarios to your associated business processes to help assign risk ownership
- Validate risk appetite with executive management and key stakeholders to make sure they match
GIAC Certified IS Security Consulting Services
Global Information Assurance Certification was founded in 1999 to validate the skill of computer security professionals. GIAC's mission is to verify that a certified security consultant possesses the skills appropriate to provide support in key areas of network, data, and application software security. GIAC certifications are acknowledged by companies and institutions around the world including and the United States NSA. Progent's GIAC-qualified network security audit experts are available to help your company with:
Read more information about Progent's GIAC Information Assurance Expertise.
- Assessing Networks
- Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Contact a Progent Security Engineer
To find out how you can contact a Progent security engineer for remote or on-premises support in Pennsylvania, phone 1-800-993-9400 or visit Remote Computer Help.