Company information networks in the state of Rhode Island now have fast and affordable online access to Progent's certified security support specialists to assist with urgent security issues. Rates are competitive, charges are by the minute, engagement is immediate, and service is world class. Progent also provides assistance for long-term engagements that requires the knowledge of seasoned security engineers with top industry credentials.
If your Rhode Island company is away from more populated urban areas including Providence, Warwick, or Cranston, support from nearby qualified security consultants could be problematic when there's an emergency. This could mean a drop in productivity for your business, upset customers, unproductive workers, and defocused management. By calling Progent's remote support, you have access to a Certified security consultant ready to deliver expertise when you have to have it to get your system operating and restore your information.
Progent can help you in a variety of ways in your efforts to defend your IT environment with support ranging from security audits to creating a comprehensive security plan. Progent provides affordable service to assist small and midsize companies to configure and maintain safe networks based on Windows and Cisco products and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security companies to deliver web-based control and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall.
Progent's certified consultants are available online or on site to offer a range of emergency or project-based IT security services such as:
If your business has an immediate need for IT security help, refer to Progent's Emergency Online Technical Help.
- Perform comprehensive security evaluations
- Clean up quickly after virus and worm attacks
- Set up hardware and software firewalls
- Configure secure solutions for offsite and mobile access
- Install advanced utilities for protection against viruses, spam and directory harvest attacks
- Help create a comprehensive security strategy with 24x7 network monitoring
- Offer comprehensive Call Center Support
- Help Create an effective data backup and business continuity strategy based on Data Protection Manager (DPM) automated backup technology
Progent's consultants offer advanced services in vital facets of system security that include security evaluation, firewall/VPN support, and advanced security consulting.
Progent's expert security engineers can evaluate the effectiveness of your current computer protection implementation by performing exhaustive remote automated analysis via sophisticated utilities and tested procedures. Progent's experience in this service saves your company money and offers an objective portrayal of gaps. The knowledge your IT organization gains can be used as the foundation of a security plan that can allow your information system to run safely and respond quickly to future risks.
Automated Security Assessment
Progent provides expertise in the use of security analysis packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a set of programmed network auditing checks to uncover possible security weaknesses. Progent has broad knowledge of other network auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.
Progent can show you how to build security into your company processes, install auditing tools, plan and implement a secure network architecture, and recommend policies to maximize the security of your IT system. Progent's security engineers are ready to help you configure a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Learn additional information about Progent's network security evaluation.
Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory bundles intended to allow small companies to receive an objective security assessment from a qualified security consultant. With Progent's External Network Security Inventory Checkup, an engineer runs an extensive test of your IT infrastructure from outside your company firewall to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, an engineer executes a network scan from a secure computer within your company firewall to assess the risk to internal threats. The two security inventory packages are configured and run from a secured external location. The project is managed by an engineer with high-level security credentials and who generates a report that summarizes and interprets the data collected by the security scan and proposes practical improvements where called for.
Network Penetration Testing Consulting
Stealth penetration testing is a key part of any serious network security strategy. Progentís security professionals can run extensive penetration checks without the knowledge of your company's internal IT staff. Stealth penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event log analysis are correctly configured and actively checked. Find out more about Progent's stealth penetration analysis support services.
Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology includes in-depth field work with leading firewalls and VPN technology offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, optimize, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services integration and debugging support.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite access products provide a complete line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP certifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Read additional details about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.
Support Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security plan and select the right products from a variety of vendors to achieve your security objectives while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to defend endpoints and servers and VMs against new malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to address the entire malware attack progression including protection, detection, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows VSS and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver economical multi-layer security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering via cutting-edge technologies incorporated within one agent managed from a single control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent action. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of critical files, apps and VMs that have become lost or damaged due to hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, when necessary, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security companies to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway device adds a further layer of inspection for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the system is virtualized, it can be moved easily to a different hardware environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save as much as half of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need the instant you need it. Find out more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Every business ought to develop a carefully thought out security strategy that includes both pre-attack procedures and response plans. The proactive strategy is a collection of mechanisms intended to minimize security weaknesses. The reactive strategy helps your company's network security personnel to assess the impact resulting from an attack, repair the damage, record the experience, and get the IT network operational as rapidly as feasible.
Progent's expert IT security engineers are available to help your business to run a comprehensive risk assessment and create a network security plan to establish security policies and mechanisms to minimize future assaults and dangers.
CISM Accredited Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of skill that information security managers are expected to master. CISM gives business management the assurance that consultants who have qualified for their CISM credential possess the background and capability to provide efficient security management and consulting services. Progent offers the services of CISM Certified security professionals to help businesses with:
Read more information about Progent's CISM Information Security Support Expertise.
- Information Security Governance
- Risk Management
- Network Security Program Management
- Information Security Management
- Recovery Management
CISSP Certified Security Consulting Assistance
CISSP recognizes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas including:
Find out additional information about Progent's CISSP Qualified Cybersecurity Consulting Services.
- Security Management Practices
- Security Architecture and Models
- Access Management Systems and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture professionals are consultants who have been awarded ISSAP Certification through thorough testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven mastery in the more challenging requirements of IS security architecture bounded by the wider field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your company with all phases of architecture security such as.
Learn more information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.
- Access Control Mechanisms and Methodologies
- Telecom and Network Infrastructure Security
- Encryption/Decryption Solutions
- Needs Analysis and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates mastery in network security audit and control. Accredited by ANSI, the CISA credential has candidates pass a comprehensive test administered by the ISACA international professional group. Progent's CISA network security audit engineers can help your company with:
Get more details concerning Progent's CISA Accredited IS Security Auditing Consulting Services.
- IS Audit Process
- IT Governance
- Network Assets and Architecture Planned Useful Life
- IT Support
- Protecting Information Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify an IT professional's skills to design, implement, and support information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk management engineers can provide a variety of risk identification services including:
Get more information about Progent's CRISC Risk Management Experts.
- Collect information and review documentation to evaluate major risk scenarios
- Inventory statutory, regulatory, and contractual requirements and company policies related to your information system to assess their potential influence on your business goals
- Identify possible threats for your operational workflows to assist in analyzing your enterprise risk
- Create a risk awareness initiative and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk control program
- Match identified risk scenarios to related business processes to help assign risk ownership
- Determine risk tolerance with your senior leadership and key stakeholders to make sure they align
GIAC Qualified Security Consulting Services
Find out additional information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of computer security experts. GIAC's mission is to assure that a certified security consultant has the skills needed to deliver support in important categories of system, information, and application software security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. NSA. Progent's GIAC-qualified IS security audit engineers can help your company in the areas of:
Talk to a Progent Security Expert
To find out how you can contact a security consultant for online or onsite assistance in Rhode Island, phone 1-800-993-9400 or go to Online Network Support.