Small business computer networks in the state of Rhode Island can depend on fast and affordable remote help from Progent's accredited security consultants to assist with urgent security problems. Rates are affordable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex engagements that requires the knowledge of seasoned security engineers with top industry credentials.

If your Rhode Island network is situated far from larger urban areas including Providence, Warwick, or Cranston, help from local certified security professionals may be problematic when there's a crisis. This could mean a loss of income for your company, upset clients, idle workers, and distracted management. By contacting Progent's remote support, you can get in touch with a Premier security engineer ready to provide assistance whenever you require it to keep your computer network on line and restore your information.

Progent can assist you in a variety of ways in your initiatives to guard your IT environment with support that can range from security checks to creating a company-wide security plan. Progent provides economical service to assist small and midsize companies to configure and maintain secure IT environments powered by Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to provide web-based management and comprehensive security for all your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall.

Progent's security experts are accessible online or on premises to offer a variety of urgent or project-based network security services including:

If your business has an immediate requirement for IT security help, refer to Progent's Emergency Remote Network Support.

Progent's consultants can deliver advanced support in vital facets of system protection including security assessment, firewall and VPN solutions, and advanced security consulting.

System Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your current computer security systems through comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in administering this testing saves you consulting fees and offers an objective portrayal of security holes. The information your IT organization is provided can form the basis of a network protection strategy that can permit your information system to run safely and adapt rapidly to new risks.

Automated Vulnerability Assessment
Progent provides consulting in the application of security evaluation packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a set of automatic network testing scans to identify potential security vulnerabilities. Progent has broad knowledge of other network auditing tools including NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react effectively.

Progent can show you how to design protection into your business processes, configure auditing applications, plan and deploy a protected network environment, and recommend procedures to maximize the security of your IT system. Progent's security engineers are able to show you how to configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Find out more concerning Progent's automated security assessment.

Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory bundles intended to enable small businesses to receive an impartial network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive test of your network from outside your firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized machine within your company firewall to determine vulnerabilities to inside assaults. Both security inventory packages are set up and executed from a protected external site. The process is overseen by a consultant with high-level security credentials and who generates a document that summarizes and analyzes the information captured by the scan and proposes cost-effective remediation where appropriate.

Network Intrusion Testing Support Services
Stealth penetration checking is a key component of any comprehensive IT system security strategy. Progentís security experts can perform extensive penetration tests without the awareness of your company's internal network support resources. Unannounced penetration checking uncovers whether current security defense systems such as intrusion detection alerts and event log monitoring are properly set up and consistently checked. Find out additional information concerning Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security solutions includes extensive field work with leading firewalls and Virtual Private Network technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with key networking accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Engineering Expertise
Cisco's network security and remote access products represent a complete range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company goals. Learn additional information concerning Progent's Support Services for Cisco Security and VPN Products.

Consulting Expertise for Other Firewall and VPN Products
Progent offers small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security plan and select appropriate technologies from multiple suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to defend endpoint devices as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight ASM protects local and cloud-based resources and offers a single platform to automate the entire malware attack progression including filtering, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering via cutting-edge tools packaged within one agent managed from a unified console. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your company's specific needs and that helps you demonstrate compliance with legal and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent's consultants can also help your company to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical files, apps and virtual machines that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, when necessary, can help you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hardware environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard information about your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to half of time wasted searching for critical information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more about ProSight IT Asset Management service.

Expert Security Design
Any business should develop a carefully considered security strategy that includes both proactive processes and response planning. The proactive plan is a set of steps intended to minimize vulnerabilities. The reactive plan assists your company's IT security engineers to assess the damage caused by a security penetration, fix the network, document the event, and get the IT network running as soon as feasible.

Progent's certified IS security engineers are available to help your business to run a full risk assessment and create a network security plan to establish security policies and controls to reduce ongoing assaults and threats.

CISM Qualified Network Security Consulting Expertise
The CISM committee defines the core capabilities and international standards of skill that information security managers are required to master. CISM gives executive management the confidence that those who have qualified for their CISM credential have the experience and capability to provide efficient security administration and support services. Progent offers the services of CISM Certified security professionals to assist companies with:

  • Network Security Governance
  • Risk Analysis
  • Network Security Implementation Management
  • Network Security Administration
  • Response Management
Read additional information about Progent's CISM Network Security Support Professionals.

CISSP Accredited Security Consulting Support
CISSP certification denotes mastery of a worldwide standard for data security. ANSI has granted certification recognition in the field of data protection defined by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a variety security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Learn additional details concerning Progent's CISSP Information Security Consulting Professionals.

CISSP-ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have earned ISSAP status as a result of rigorous examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the most challenging demands of IS security architecture bounded by the wider scope of IS security expertise needed for CISSP certification. Progent's ISSAP-premier security consultants can help your business with all phases of secure network architecture including.

  • Access Management Systems and Techniques
  • Phone System and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Find out more details about Progent's ISSAP Qualified Secure IT Architecture Consulting Expertise.

CISA Certified Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that represents mastery in IS security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive test given by the ISACA international professional association. Progent's CISA IS security audit consultants can help your business in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Read more information concerning Progent's CISA Accredited Information System Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's skills to design, deploy, and support IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a business continuity strategy based on leading practices identified by CRISC and crafted to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers offer a variety of risk evaluation services including:

  • Gather information and review documentation to help identify major vulnerabilities
  • Inventory legal, regulatory, and contractual mandates and organizational standards associated with your network to determine their possible impact on your business objectives
  • Identify possible threats for your business workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide training to ensure your organization appreciate information system risk so they can contribute to your risk control process
  • Connect key risk scenarios to your associated business processes to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and major stakeholders to make sure they are in agreement
Get more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Consulting Services
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's mission is to assure that a certified professional has the knowledge needed to provide services in critical categories of system, data, and application program security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified IS security audit specialists are available to assist your IT organization with:

Read additional information about Progent's GIAC Information Assurance Services.

Contact a Progent Security Engineer
To find out how you can contact a certified security engineer for remote or on-premises expertise in Rhode Island, call 1-800-993-9400 or go to Online Network Help.