Pittsburgh Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Pittsburgh Metro Area.
Progent location in the Pittsburgh Metro Area
To get fast online assistance with computer security problems, companies in Pittsburgh, PA, have access to expert expertise by contacting Progent's security engineers. Progent's remote support consultants are available to provide efficient and economical help with security issues that are impacting the viability of your network. Progent's accredited security engineers are certified to provide help for systems based on Windows, Linux, Apple macOS and OS X, Sun, and popular versions of UNIX. Progent's wide array of services encompasses firewall expertise, email security, secure network infrastructure, and disaster recovery planning. Progent's support team has been awarded the world's top security credentials including Global Information Assurance Certification and Certified Information Systems Security Professional (CISSP).
Progent offers online security expertise on a per-minute model with no minimum call duration and no extra fees for setup or after hours service. By billing by the minute and by providing top-level expertise, Progent's pricing policy keeps expenses low and avoids situations where quick fixes turn into big charges.
Our System Has Been Hacked: What Do We Do?
If your business is now fighting a security emergency, go to Progent's Urgent Remote Technical Help to find out how to get fast aid. Progent maintains a team of seasoned cybersecurity specialists who offer remote and onsite assistance that includes containment, mitigation, restoration, forensics, and hardening of your cybersecurity defense to protect against future exploits.
For businesses who have prepared beforehand for a security breech, the formal post-attack response procedure promoted by GIAC is Progent's preferred method of reacting to a major security attack.
Introduction to Security Expertise
Managing network protection as well as staying ready for restoring vital information and functions after an attack requires an on-going effort involving a variety of technologies and processes. Progent's certified security experts can assist your business at whatever level in your attempt to secure your information system, from security evaluation to creating a complete security plan. Key areas supported by Progent's security engineers include Security Planning and Implementation, Information Restoration and Security Failure Analysis, and Managed Filtering of Email-Based Attacks.
Designing and Implementing Secure Networks
Any business should have a carefully thought out security plan that includes both preventive and reactive activity. The pre-attack plan is a set of steps that works to reduce security gaps. The reactive strategy specifies activities to assist security staff to assess the losses resulting from an attack, remediate the damage, record the event, and revive network activity as soon as feasible. Progent can show you how to design security into your business processes. Progent can install auditing software, create and build a secure IT architecture, and propose procedures and policies to maximize the protection of your network. Progent's security experts are ready to help you to configure a firewall, design secure offsite access to e-mail and data, and install an effective VPN.
If you are looking for an affordable way for outsourcing your security management, Progent's Round-the-clock Network Support Services include non-stop remote network tracking and fast response to emergencies.
Hybrid Cloud Solutions
Progent can assist your company you to design, deploy, administer and repair enterprise hybrid cloud solutions that include local and cloud-based resources and that are compliant with government and industry data security standards. (Learn about Progent's Office 365 Exchange Online integration with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
System Recovery and Failure Analysis
Progent provides expertise in restoring networks and devices that have been compromised, are quarantined, or have stopped working following a security breach. Progent can show you how to determine the damage caused by the assault, restore ordinary business operations, and retrieve information compromised as a result of the attack. Progent's security specialists can also manage a thorough forensic analysis by going over activity logs and using a variety of advanced assessment tools. Progent's experience with security problems reduces your off-air time and allows Progent to suggest effective measures to avoid or contain future attacks.
Ransomware Cleanup and Restoration Consulting
Progent offers the help of experienced ransomware recovery consultants with the skills to restore an IT network victimized by a ransomware cryptoworm like Ryuk, WannaCry, Hermes, or MongoLock. To learn more, see ransomware removal and restoration consulting.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior analysis tools to defend endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which routinely get by legacy signature-matching AV products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to automate the entire threat lifecycle including blocking, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver affordable in-depth security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint management, and web filtering via cutting-edge tools incorporated within one agent accessible from a single control. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP environment that addresses your organization's unique needs and that allows you prove compliance with legal and industry data protection regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate attention. Progent can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates and monitors your backup activities and enables fast recovery of vital files, apps and virtual machines that have become lost or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when needed, can help you to recover your critical information. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading data security vendors to deliver centralized management and world-class security for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved easily to a different hosting environment without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save as much as 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Specialized Security Services Available from Progent
Progent's seasoned engineers offer unique consulting support in vital areas of computer security such as:
Security Vulnerability Evaluation and Compliance Testing
Progent provides expertise with security auditing tools like Microsoft Baseline Security Analyzer or LANguard for conducting a set of comprehensive system tests to identify potential security gaps. Progent has broad skills with these utilities and can assist you to understand audit reports and react efficiently. Progent's security consultants also can perform web software testing and can conduct expert evaluation of enterprise-wide security to determine your company's compliance with important worldwide security standards including HIPAA, NIST, and ISO. In addition, Progent can evaluate the effectiveness of your wireless security covering in-place wireless appliances plus portable devices. Learn more information about Progent's Security Vulnerability Audits and Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wi-Fi Support
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco CCNP experts can deliver in-depth consulting support for Cisco's complete family of security and VPN solutions including PIX 500 Firewalls and ASA Series Firewalls, Catalyst Firewall Services Module (FWSM), secure high-speed and integrated services (IS) routers, Aironet wireless access points, Meraki cloud-managed access points, and Catalyst switches. Read more information about Cisco Security, VPN and Aironet Wireless Help.
Other Firewall and Virtual Private Network (VPN) Solutions
Stealth Intrusion Checking Consulting
As well as supporting a broad array of security solutions available from Microsoft and Cisco, Progent can provide businesses of all sizes advanced support for solutions from other major firewall and VPN suppliers. Progent's engineers can provide:
Stealth intrusion testing is a key technique for allowing organizations to understand how exposed their IT environments are to serious attacks by showing how well corporate security processes and mechanisms stand up against planned but unpublicized intrusion attempts instigated by veteran security specialists utilizing the latest hacking methods. Find out additional information about Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Support Services
Certified Information Security Manager defines the core skills and worldwide standards of service that information security professionals are required to master. CISM offers executive management the confidence that those who have earned their CISM have the experience and skill to provide effective security management and consulting support. Progent can provide a CISM expert to help your enterprise in key security disciplines such as data security governance, vulnerability management, information security program management, and crisis response management.
Find out additional information about Progent's CISM Security Support Expertise.
CISSP Security Support Expertise
Progent's CISSP experts are security specialists who have been awarded CISSP certification through verified professional work, extensive study, and formal examination. CISSP Certification recognizes expertise in a worldwide standard for IT security. ANSI has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include cybersecurity management practices, security architecture and test systems, access control methodology, applications development security, business processes security, hardware security, cryptography, communications, network security, and disaster recovery planning.
Find out additional information concerning Progent's CISSP Consulting Expertise.
CISSP-ISSAP Certified Experts for Secure System Architecture
Progent's ISSAP qualified security consultants have earned ISSAP certification following rigorous testing and extensive hands-on work with information security design. ISSAP security experts have in-depth understanding of access control mechanisms and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-certified security experts can help your company with all phases of architecture security.
Get more details concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Support.
CISSP-ISSEP Qualified Cybersecurity Engineering Consultants
Network Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide large organizations with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the skills of a certified CISSP-ISSEP network security consultant to help your enterprise to utilize current system security engineering theory and techniques in system development, review and evaluate system security designs based on security engineering best practices, produce viable system designs that include compliant cybersecurity features for all critical system functions, define effective design and configuration strategies to provide operational security, perform comprehensive risk analysis, and recommend realistic cybersecurity models that balance your operational goals with your company's tolerance for risk.
Learn the details about Progent's CISSP-ISSEP Network Security Engineering Consulting.
Certified Information Systems Auditor (CISA) Consulting Expertise
The CISA credential is a recognized qualification that signifies mastery in IS security auditing. Certified by ANSI, the CISA credential requires that candidates undergo a comprehensive test overseen by the ISACA international professional association. Progent offers the services of a CISA-certified security audit consultant able to help companies in the areas of information systems audit process, information technology governance, network assets and infrastructure lifecycle, information technology support, protecting information assets, and business continuity planning.
Read more information concerning Progent's CISA Support Expertise.
CRISC-certified Network Risk Mitigation Experts
The CRISC program was established by ISACA in 2010 to validate a consultant's ability to plan, implement, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help you to develop and execute a business continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's risk management expertise is a good fit the services provided by Progent's CISA-qualified security engineers for objectively auditing your IS management design and with the services of Progent's CISM-certified experts for implementing company-wide security policies and procedures.
Read more details concerning Progent's CRISC Risk Mitigation Services.
GIAC (Global Information Assurance Certification) Consulting Services
GIAC was founded in 1999 to validate the skill of network security experts. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge necessary to provide services in vital categories of system, data, and program security. GIAC certifications are recognized by businesses and institutions all over the world including United States National Security Agency. Progent can provide the support of certified professionals for all of the security disciplines addressed within GIAC accreditation programs such as assessing networks, incident response, intrusion detection, web-based application security, and security information and event management (SIEM) solutions.
Find out additional details concerning Progent's GIAC Information Assurance Services.
Contact Progent for Computer Security Expertise
If your organization is located in Pittsburgh or anywhere in Pennsylvania and you're trying to find cybersecurity expertise, phone Progent at 800-993-9400 or see Contact Progent.