Company information networks in the state ofRhode Islandnow have quick and affordable remote technical support from Progent's qualified network security engineers to fix urgent security issues. The cost is reasonable, billing is by the minute, sign-up is immediate, and service is world class. Progent also offers assistance for complex engagements that requires the services of seasoned security consultants with high-level industry certifications.
In case yourRhode Islandorganization is outside of major metropolitan neighborhoods includingProvidence, Warwick, or Cranston, the availability of nearby accredited network security support specialists is often problematic during a crisis. This can result in a drop in productivity for your business, upset customers, idle workers, and defocused executives. By utilizing Progent's online services, you have access to a Premier security engineer who can provide help when you need it to get your computer network operating and recover your data.
Progent can assist you at any level in your initiatives to protect your information system with support ranging from security checks to developing a comprehensive security plan. Progent provides affordable support to assist businesses of all sizes to set up and maintain protected networks powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux operating systems as well as BYOD users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security vendors to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your corporate firewall.
Progent's security consultants are accessible remotely or in person to provide a variety of urgent or project-based IT security services including:
If your business has an immediate need for computer security help, refer to Progent's Emergency Remote Network Support.
Progent's engineers provide advanced support in vital facets of network security including security evaluation, firewall and VPN expertise, and high-level security consulting.
Progent's expert security consultants can assess the strength of your existing network protection environment by performing comprehensive remote automated testing based on advanced utilities and tested procedures. Progent's experience in administering this service saves your company time and money and offers an objective picture of security holes. The knowledge your company is provided can make up the foundation of a network protection strategy that can allow your information system to run safely and respond quickly to new threats.
Automated Network Vulnerability Analysis
Progent offers expertise in the use of security analysis products including Microsoft's MBSA and GFI LANguard NSS for economically performing a set of automatic system testing scans to uncover potential security problems. Progent has broad experience with other network auditing tools such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and respond appropriately.
Progent can help you design protection into your business operations, configure auditing applications, plan and implement a protected network architecture, and recommend procedures to maximize the safety of your network. Progent's security professionals are available to assist you to configure a firewall, implement secure remote connectivity to email and data, and install VPN. Find out additional information on Progent's network security assessment.
Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to enable small businesses to receive an independent network security evaluation from a certified security expert. With Progent's External Network Security Inventory Scan, an engineer administers a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to uncover potential weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from an authorized machine inside your company firewall to uncover your exposure to internal assaults. Both security inventory packages are set up and executed from a secured external site. The project is directed by a consultant with top security accreditations and who generates a report that summarizes and analyzes the data collected by the scan and suggests cost-effective improvements if called for.
Stealth Intrusion Testing Consulting
Stealth intrusion testing is an important component of any comprehensive IT system security strategy. Progentís security professionals can run thorough intrusion checks without the knowledge of your company's internal IT staff. Unannounced penetration testing shows whether current security defense tools such as intrusion incident alerts and event history monitoring are properly set up and actively monitored. Learn more on Progent's stealth security penetration testing consulting.
Firewall and Virtual Private Network Solutions
Progent's background in security technology encompasses extensive field work with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Security and VPN Consulting Services
Cisco's security and offsite access products represent a complete range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Find out additional information about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Engineering Expertise for Other Firewall and VPN Technology
Progent provides small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWall. Progent can show you how to create a detailed security strategy and select appropriate technologies from multiple vendors to achieve your security objectives while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to defend endpoints as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily escape legacy signature-matching AV products. ProSight ASM safeguards local and cloud-based resources and provides a unified platform to manage the entire malware attack progression including filtering, detection, containment, remediation, and forensics. Key capabilities include one-click rollback using Windows VSS and real-time system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device management, and web filtering through cutting-edge tools packaged within one agent accessible from a single control. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your company's specific requirements and that allows you prove compliance with legal and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent can also assist you to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates your backup processes and enables rapid recovery of critical data, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPAA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical information. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide web-based control and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage. Email Guard's on-premises security gateway device adds a further level of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved easily to a different hosting environment without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Any company ought to have a thoroughly considered security program that includes both pre-attack processes and reaction plans. The pre-attack strategy is a collection of steps that help to minimize vulnerabilities. The reactive plan helps your network security personnel to evaluate the damage resulting from a security penetration, fix the damage, document the event, and get business functions running as rapidly as possible.
Progent's expert information security engineers can to help your business to run a comprehensive vulnerability assessment and define a computer security strategy to implement security policies and controls to minimize ongoing assaults and dangers.
CISM Certified Information Security Consulting Expertise
The CISM committee describes the basic capabilities and international standards of skill that IT security managers are required to learn. It provides business management the confidence that consultants who have qualified for their CISM credential have the experience and capability to provide effective security administration and consulting services. Progent offers the services of CISM Premier security consultants to help businesses with:
Learn more information about Progent's CISM Qualified Information Security Engineering Services.
- Information Security Processes
- Vulnerability Management
- Network Security Implementation Management
- Network Security Administration
- Response Management
CISSP Certified Security Consulting Expertise
CISSP certification denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of information protection defined by ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a variety security fields including:
Find out more information concerning Progent's CISSP-certified Security Support Professionals.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Systems and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most complex demands of information system security architecture bounded by the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-premier security specialists can help your company with all aspects of secure network architecture including.
Learn additional information concerning Progent's ISSAP Certified Secure System Architecture Consulting Professionals.
- Access Management Mechanisms and Methodologies
- Phone System and Network Infrastructure Security
- Encryption/Decryption Options
- Needs Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Site Security
CISA Certified IS Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a globally recognized achievement that represents expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit experts can assist your business with:
Read the details concerning Progent's CISA Certified Security Auditing Engineering Services.
- Information Systems Audit Services
- Information Technology Enforcement
- Systems and Infrastructure Lifecycle Planning
- Information Technology Support
- Protecting Data Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to design, implement, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to develop and execute a business continuity plan that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers offer a range of risk evaluation services such as:
Read the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and study documentation to evaluate major vulnerabilities
- Identify statutory, industry, and contractual requirements and company standards related to your network to assess their possible impact on your strategic objectives
- Identify possible vulnerabilities for your operational processes to help in analyzing your corporate risk
- Create a risk awareness initiative and conduct training to ensure your stakeholders understand IS risk so they can assist with your risk control process
- Connect key risk vectors to your associated operational procedures to help assign risk ownership
- Validate risk tolerance with executive management and key stakeholders to make sure they align
GIAC Accredited Network Security Engineering Assistance
GIAC was established in 1999 to certify the skill of IT security experts. GIAC's mission is to verify that an accredited professional possesses the knowledge necessary to provide support in key categories of system, data, and application software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC information security audit specialists can assist your company with:
Learn more details about Progent's GIAC Information Assurance Expertise.
- Auditing Networks
- Security Incident Response
- Intrusion Detection
- Web Services Security
- SIEM solutions
Get in Touch with a Certified Progent Security Engineer
To find out how you can get in touch with a security engineer for remote or on-premises support in Rhode Island, phone 1-800-993-9400 or visit Online Computer Help.