Small business IT networks in the state of Rhode Island can have prompt and economical online technical support from Progent's accredited security support specialists to fix complex security problems. The cost is affordable, charges are per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for long-term engagements that demand the knowledge of seasoned security engineers with high-level security certifications.
If your Rhode Island business is far from larger urban neighborhoods such as Providence, Warwick, or Cranston, help from local accredited security experts may be problematic when there's a security disaster. This can cause lost income for your business, angry customers, idle workers, and defocused management. By calling Progent's online services, you can get in touch with a Certified security consultant ready to offer expertise whenever you have to have it to get your computer network running and salvage your information.
Progent can assist you in your efforts to guard your information system with support services that can range from network security checks to developing a company-wide security plan. Progent provides affordable service to assist small and midsize companies to design and maintain secure networks based on Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to provide centralized control and world-class protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper layer of analysis for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall.
Progent's security engineers are available remotely or on site to offer a range of emergency or longer-term network security services including:
If your business has an immediate requirement for computer security support, refer to Progent's Urgent Remote Network Help.
Progent's consultants provide world-class support in vital fields of network security including auditing, firewall and VPN solutions, and high-level security planning.
Progent's certified security consultants can evaluate the effectiveness of your existing network protection implementation through exhaustive remote automated testing via advanced utilities and tested techniques. Progent's experience in administering this service saves you time and money and assures a detailed picture of security holes. The knowledge your company is provided can be used as the foundation of a network protection strategy that can allow your information system to operate dependably and respond quickly to future risks.
Automated Security Analysis
Progent provides consulting in the use of security analysis packages including Microsoft Baseline Security Analyzer and GFI LANguard for economically performing a variety of automatic system testing scans to uncover potential security holes. Progent has broad experience with other network analysis utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can show you how to design protection into your business operations, configure auditing applications, define and implement a secure system architecture, and recommend procedures to maximize the security of your network. Progent's security consultants are able to show you how to set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn additional information about Progent's automated security audits.
Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory service bundles designed to enable small companies to get a professional network security evaluation from a certified security expert. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive test of your network from outside your firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized machine inside your company firewall to assess the risk to internal assaults. The two security inventory services are configured and executed from a protected external site. The project is managed by an engineer who has earned high-level security credentials and who generates a report that summarizes and analyzes the information captured by the scan and proposes practical remediation where called for.
Network Intrusion Testing Consulting
Stealth penetration testing is an important part of any successful IT system security strategy. Progentís security experts can run thorough penetration tests without the awareness of your organization's in-house IT resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event log monitoring are properly configured and consistently checked. Find out additional information on Progent's network security penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's background in network security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology from a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Consulting Expertise
Cisco's security and offsite access technology offer a full range of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company objectives. Learn additional details concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Products.
Support Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select appropriate technologies from multiple vendors to achieve your security objectives while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based machine learning technology to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to manage the complete malware attack lifecycle including blocking, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to security threats from all vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your organization's unique needs and that allows you prove compliance with government and industry data protection regulations. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent's consultants can also assist your company to set up and test a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical data, applications and VMs that have become lost or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading information security vendors to provide centralized control and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a further layer of analysis for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that stays within your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and safeguard information about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Network Security Consulting
Every business should develop a carefully thought out security strategy that includes both preventive processes and reaction plans. The proactive strategy is a set of steps that help to reduce vulnerabilities. The reactive strategy assists your company's IT security engineers to assess the impact resulting from a security penetration, fix the network, record the event, and get the IT network operational as quickly as possible.
Progent's expert IT security consultants can to assist your business to perform a complete risk evaluation and create a computer security plan to implement security processes and mechanisms to reduce ongoing assaults and threats.
CISM Qualified Network Security Consulting Expertise
The CISM organization describes the basic competencies and global standards of skill that IT security managers are required to learn. It provides business management the assurance that those who have qualified for their CISM credential possess the experience and capability to provide efficient security administration and consulting services. Progent can provide the support of CISM Certified security professionals to help businesses with:
Find out additional details concerning Progent's CISM Certified Network Security Support Expertise.
- Information Security Strategies
- Vulnerability Management
- IS Security Program Management
- IS Security Administration
- Recovery Management
CISSP Certified Security Engineering Expertise
The CISSP credential denotes mastery of a worldwide standard for network security. The American National Standards Institute has granted certification accreditation in the area of data security stipulated by ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security fields such as:
Find out additional information concerning Progent's CISSP Qualified Network Security Consulting Services.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Mechanisms
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Premier network architecture engineers are consultants who have earned ISSAP Certification through rigorous testing and extensive experience with network security architecture. The ISSAP certification indicates proven competence in the most complex demands of information security architecture bounded by the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-premier security specialists can help your company with all aspects of architecture security including.
Read more details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Professionals.
- Access Control Systems and Methodologies
- Telecom and System Infrastructure Security
- Encryption/Decryption Options
- Requirements Evaluation and Security Criteria
- Business Continuity Planning (BCP) and DRP
- Hardware Security
CISA Certified Network Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants pass a comprehensive test administered by the ISACA international professional group. Progent's CISA-certified IS security audit consultants are available to help your IT organization with:
Get the details concerning Progent's CISA Accredited Security Auditing Engineering Assistance.
- Information Systems Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle Planning
- Information Technology Support
- Protecting Information Assets
- Business Continuity Planning
The CRISC certification program was established by ISACA to validate an IT professional's skills to plan, implement, and maintain IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to assist you to create and carry out a business continuity plan based on leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management experts can provide a variety of risk assessment services including:
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and review documentation to evaluate major risk scenarios
- Identify statutory, industry, and contractual mandates and company policies associated with your information system to determine their possible impact on your strategic objectives
- Point out possible vulnerabilities for your business workflows to help in analyzing your corporate risk
- Create a risk awareness initiative and provide seminars to make sure your organization appreciate IT risk so they can contribute to your risk control program
- Match identified risk vectors to related operational procedures to help assign risk responsibility
- Validate risk appetite with executive leadership and major stakeholders to make sure they match
GIAC Certified IS Security Engineering Assistance
Read more information about Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to verify that an accredited security consultant has the knowledge needed to provide support in important categories of system, information, and application security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit specialists are available to help your business with:
Get in Touch with a Certified Progent Security Engineer
To see how to access a certified security consultant for online or onsite support in Rhode Island, phone 1-800-993-9400 or go to Remote Computer Help.