For fast online help with computer security problems, companies in Pittsburgh, PA, can find world-class troubleshooting from Progent's security engineers. Progent's online support consultants are ready to provide fast and low-cost assistance with security problems that threaten the viability of your information system. Progent's accredited engineers are certified to support environments based on Microsoft, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's wide array of consulting services encompasses firewall technology, email security, protected system infrastructure, and business continuity preparedness. Progent's support staff has earned the industry's most advanced security credentials including CISA and Certified Information Systems Security Professional.
Progent offers remote security assistance on a per-minute basis without minimum minutes and without extra charges for setup or after hours service. By billing per minute and by providing world-class expertise, Progent's billing policy keeps expenses low and eliminates scenarios where quick fixes turn into major charges.
We've Been Attacked: What Should We Do Now?
If you are now faced with a security emergency, go to Progent's Emergency Online Computer Help to see how to get immediate aid. Progent has a team of veteran network security experts who offer remote and onsite support that includes containment, mitigation, restoration, forensics, and hardening of your security defense to protect against future attacks.
For organizations who have prepared carefully for an attack, the step-by-step post-attack handling model outlined by GIAC (Global Information Assurance Certification) is Progent's approved method of handling a major security penetration.
Introduction to Progent's Security Services
Coordinating computer security plus staying ready for restoring vital data and systems after a security breach requires a continual process involving an array of tools and processes. Progent's certified security consultants can support your business at any level in your efforts to secure your IT network, from security assessments to designing a complete security strategy. Key areas supported by Progent's security engineers include Planning and Prevention, Information Recovery and Security Failure Analysis, and Outsourced Protection from E-mail-Borne Threats.
Designing and Building Protected Networks
Any company should have a thoroughly thought out security plan that includes both proactive and reactive elements. The proactive strategy is a set of steps that works to minimize security gaps. The reactive plan specifies activities to assist security personnel to evaluate the damage caused by an attack, remediate the damage, document the experience, and restore network functions as quickly as possible. Progent can show you how to incorporate security into your business operations. Progent can configure auditing software, create and execute a safe IT architecture, and recommend procedures and policies to optimize the safety of your information system. Progent's security experts are available to help you to set up a firewall, deploy protected remote access to email and information, and configure an efficient VPN.
If you are interested in an economical way for outsourcing your security management, Progent's 24x7 Network Support Services feature automated online system tracking and fast response to emergencies.
Hybrid Cloud Solutions
Progent can assist your company you to plan, implement, administer and troubleshoot enterprise hybrid cloud solutions that include physical and cloud infrastructure and that are compliant with government and industry data security standards. (Learn about Progent's Office 365 Exchange Online integration with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
Data Recovery and Security Forensics
Progent offers skill in recovering systems and servers that have been hacked, are in question, or have ceased to function as a result of a security breakdown. Progent can show you how to assess the losses resulting from the attack, return your company to normal functions, and recover data compromised as a result of the attack. Progent's certified engineers can also oversee a thorough forensic evaluation by examining event logs and utilizing a variety of proven assessment tools. Progent's experience with security issues reduces your downtime and allows Progent to propose efficient strategies to prevent or mitigate future attacks.
Ransomware Removal and Restoration Consulting
Progent offers the services of experienced ransomware recovery consultants with the knowledge to reconstruct a network compromised by a ransomware cryptoworm like Ryuk, Dharma, Hermes, or Locky. To find out more, see ransomware cleanup and restoration services.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior machine learning tools to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching AV products. ProSight ASM protects on-premises and cloud resources and offers a single platform to manage the complete malware attack lifecycle including filtering, identification, mitigation, remediation, and forensics. Top features include single-click rollback with Windows VSS and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies incorporated within one agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to design and configure a ProSight ESP deployment that meets your organization's specific needs and that allows you demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent's consultants can also assist you to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical data, applications and virtual machines that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide advanced support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security companies to provide web-based control and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hosting environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard data about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time spent looking for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more details about ProSight IT Asset Management service.
Special Security Services Offered by Progent
Progent's certified security engineers offer world-class consulting support in vital facets of network security such as:
Information Risk Audits and Security Compliance Assessment
Progent offers expertise with information risk evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of comprehensive network tests to uncover possible security holes. Progent has extensive experience with scanning utilities and can help your company to understand assessment results and respond efficiently. Progent's security engineers also offer web application validation and can conduct expert assessments of corporate-wide security to determine your organization's compliance with key global security standards such as FISMA, PCI, and ISO 17799. In addition, Progent can assess the strength of your wireless security including stationary wireless appliances plus portable devices. Read additional information about Progent's Information Risk Evaluation and Security Compliance Testing.
Cisco Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver in-depth consulting services for Cisco's entire family of protection and Virtual Private Network (VPN) solutions including PIX Series Firewalls and ASA 5500 Series Firewalls, the Catalyst FWSM, protected broadband and IS routers, wireless access points, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Read more details concerning Cisco Protection, VPN and Wireless Help.
Additional Firewall and Virtual Private Network (VPN) Technologies
Stealth Intrusion Checking Consulting
As well as supporting a broad range of protection technologies available from Microsoft and Cisco, Progent can provide businesses of all sizes advanced consulting for products from other important firewall and Virtual Private Network (VPN) vendors. Progent's engineers offer:
Unannounced penetration checking is a key technique for helping companies to determine how vulnerable their information systems are to real-world threats by revealing how thoroughly network security procedures and technologies stand up to planned but unpublicized intrusion attempts launched by veteran security specialists utilizing the latest intrusion methods. Read the details concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Support Services
CISM identifies the fundamental skills and worldwide standards of performance that computer security professionals are expected to achieve. It offers business management the assurance that those who have been awarded their certification possess the experience and knowledge to offer effective security administration and consulting support. Progent can offer a CISM-certified expert to help your organization in critical security areas such as data protection governance, risk management, information security process control, and crisis handling support.
Read more details about Progent's Certified Information Security Manager (CISM) Security Support Expertise.
Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity engineers who have earned CISSP accreditation as a result of demonstrated experience, extensive study, and exhaustive testing. CISSP qualification recognizes mastery of an international standard for information security. American National Standards Institute has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of knowledge included under CISSP include cybersecurity administration practices, security design and models, connection control systems, software development security, business processes security, physical security, cryptography, telecommunications, Internet security, and business continuity planning.
Read additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
CISSP-ISSAP Premier Consultants for Secure System Architecture
Progent's ISSAP Certified security consultants have earned ISSAP accreditation following thorough testing and extensive hands-on work with information security design. ISSAP consultants have comprehensive knowledge of access control mechanisms and techniques, phone system and network protection, cryptography, needs evaluation, BCP and disaster recovery, and physical security integration. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security.
Find out the details concerning Progent's ISSAP Accredited Secure System Architecture Engineering Support.
CISSP-ISSEP Certified Cybersecurity Engineering Consultants
Network Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide large organizations with the services associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the skills of a certified CISSP-ISSEP network security expert to help your organization to follow modern system security engineering principles and techniques in system development, evaluate system security designs according to cybersecurity engineering leading practices, produce viable system designs that include compliant cybersecurity mechanisms for all critical system functions, define efficient design strategies to deliver operational security, perform comprehensive risk analysis, and recommend practical security solutions that balance your operational goals with your organization's risk tolerance.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
Certified Information Systems Auditor (CISA) Professional Expertise
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass an extensive test administered by the ISACA international professional association. Progent can provide the services of a CISA-Premier security audit engineer able to assist companies in the fields of IS audit process, IT governance, systems and architecture planned useful life, IT support, safeguarding information assets, and disaster recovery preparedness.
Learn more information about Progent's CISA Support Services.
CRISC Network Risk Mitigation Experts
The CRISC certification program was initiated by ISACA in 2010 to validate a consultant's skills to plan, implement, and support information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's risk mitigation expertise is a good fit the services available from Progent's CISA-Certified consultants for impartially assessing your IS control design and also with the services of Progent's CISM experts for implementing security policies.
Learn additional information about Progent's CRISC Risk Mitigation Support.
GIAC (Global Information Assurance Certification) Support Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security experts. GIAC's mission is to verify that a certified professional has the skills appropriate to provide support in vital areas of network, information, and application security. GIAC certifications are recognized by businesses and government organizations throughout the world including United States NSA. Progent offers the support of GIAC certified professionals for any of the network security services covered within GIAC certification programs including assessing security systems, security incident response, traffic analysis, web application security, and security information and event management (SIEM) solutions.
Read more details concerning Progent's GIAC Information Assurance Support.
Contact Progent for Computer Security Consulting Services
If your organization is situated in Pittsburgh or anywhere in the state of Pennsylvania and you need computer security consulting, call Progent at 800-993-9400 or see Contact Progent.
Pittsburgh Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Pittsburgh Metro Area.
Progent location in the Pittsburgh Metro Area