Small business networks in the state ofSouth Carolinacan have quick and economical online access to Progent's certified security engineers to resolve urgent security issues. The cost is competitive, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also offers help for long-term engagements that demand the knowledge of seasoned security consultants with high-level security credentials.
If yourSouth Carolinasmall business is outside of larger metropolitan areas likeColumbia, Charleston, Rock Hill, or Greenville, the availability of local accredited security support specialists could be limited when there's a crisis. This can result in lost productivity for your business, angry customers, unproductive employees, and distracted executives. By calling Progent's remote support, you can get in touch with a Certified security consultant ready to offer help whenever you need it to keep your information system on line and restore your information.
Progent can help you at any level in your efforts to defend your information system with support services that ranges from network security checks to developing a company-wide security plan. Progent provides affordable service to assist small and midsize companies to set up and maintain protected networks powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to provide web-based control and world-class security for all your email traffic. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further level of inspection for inbound email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also enable Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall.
Progent's security experts are accessible online or in person to provide a range of emergency or project-based network security services including:
If your business has an immediate requirement for IT security help, refer to Progent's Urgent Online Network Support.
- Run automated network security evaluations
- Clean up rapidly after virus and worm attacks
- Install effective firewalls
- Implement secure techniques for remote and mobile connectivity
- Install advanced utilities for automatic defense against spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 security monitoring
- Offer outsourced Help Desk Call Center Services
- Develop a practical network backup and disaster recovery plan centered on Microsoft DPM backup capability
Progent's security experts can deliver advanced services in vital areas of network security that include analysis, firewalls and VPN, and high-level security planning.
System Security Audits
Progent's expert security engineers can assess the effectiveness of your current network protection implementation by performing exhaustive remote automated testing via advanced utilities and tested procedures. Progent's skill in administering this service saves your company consulting fees and offers an objective picture of system vulnerability. The information your IT organization gains can make up the basis of a security plan that can allow your network to run dependably and respond quickly to new threats.
Automated Network Vulnerability Evaluation
Progent provides consulting in the use of security evaluation products such as Microsoft's MBSA and GFI LANguard for economically running a variety of automatic system auditing scans to uncover potential security vulnerabilities. Progent has broad knowledge of other security auditing products including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can help you design security into your company operations, configure scanning tools, define and deploy a secure system architecture, and recommend policies to optimize the security of your network. Progent's security consultants are able to help you configure a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Find out more concerning Progent's network security analysis.
Security Inventory Service Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages designed to allow small businesses to get an objective security evaluation from an accredited security expert. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from beyond your company firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a system scan from a secure computer within your firewall to evaluate the risk to internal threats. Both security inventory packages are set up and run from a secured remote location. The project is directed by an engineer with high-level security credentials and who generates a report that details and analyzes the information collected by the security scan and suggests cost-effective remediation if appropriate.
Stealth Security Penetration Analysis Support Services
Stealth penetration testing is an important component of any comprehensive IT system security plan. Progentís security experts can run extensive penetration tests without the awareness of your organization's internal network support resources. Stealth penetration testing shows whether current security defense systems such as intrusion incident alerts and event log analysis are correctly set up and actively checked. Learn more about Progent's stealth penetration testing support services.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower integration and debugging support.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite connection technology represent a comprehensive range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business goals. Find out additional details about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Support Expertise for Additional Firewall and VPN Products
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from multiple vendors to support your security objectives while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily escape traditional signature-based AV products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to manage the entire malware attack lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering through cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate attention. Progent's consultants can also help you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of vital data, apps and virtual machines that have become unavailable or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPAA, FIRPA, and PCI and, whenever necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading information security companies to deliver centralized management and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a further level of inspection for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the environment is virtualized, it can be moved easily to a different hosting environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time spent looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Any business should develop a carefully considered security strategy that includes both preventive processes and reaction planning. The pre-attack strategy is a set of steps designed to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to assess the impact resulting from a security penetration, fix the damage, document the event, and get business functions restored as quickly as possible.
Progent's certified information security engineers are available to assist your company to run a complete vulnerability evaluation and create a computer security strategy to establish security policies and mechanisms to reduce ongoing attacks and threats.
CISM Certified Security Support Services
The CISM organization describes the basic capabilities and international standards of performance that information security managers are expected to learn. It gives executive management the confidence that those who have qualified for their CISM credential have the experience and knowledge to deliver effective security administration and consulting services. Progent offers the expertise of CISM Certified security consultants to assist companies with:
Learn more details concerning Progent's CISM Certified Security Support Professionals.
- Network Security Processes
- Vulnerability Management
- Information Security Program Management
- IS Security Administration
- Recovery Planning
CISSP Accredited Security Consulting Assistance
CISSP denotes mastery of a worldwide standard for information security. ANSI has granted certification accreditation in the area of data security under ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security fields such as:
Find out additional information concerning Progent's CISSP-certified Information Security Support Services.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Technology
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure System Architecture Consulting Services
Progent's CISSP-ISSAP Certified system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and significant experience with information security design. The ISSAP credential represents demonstrated mastery in the more challenging demands of information security architecture within the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-premier security experts can help your business with all phases of secure network architecture such as.
Find out more information concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Services.
- Access Management Systems and Techniques
- Telecom and Network Protection
- Encryption/Decryption Options
- Needs Evaluation and Security Standards
- BCP and DRP
- Site Security
CISA Qualified IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a prestigious qualification that represents expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential has candidates pass a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified security audit consultants are available to help your company with:
Find out more details about Progent's CISA Certified Network Security Auditing Engineering Expertise.
- IS Audit Services
- Information Technology Enforcement
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Service Delivery
- Safeguarding Information Resources
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to plan, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and carry out a business continuity or disaster recovery strategy that follows leading practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation experts offer a variety of risk assessment services including:
Read more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to evaluate significant risk scenarios
- Identify statutory, industry, and contractual requirements and organizational standards associated with your information system to assess their potential influence on your strategic goals
- Identify possible vulnerabilities for your operational processes to assist in analyzing your corporate risk
- Develop a risk awareness initiative and provide training to make sure your organization appreciate IS risk so they can assist with your risk control process
- Connect key risk scenarios to related business processes to help determine risk responsibility
- Determine risk appetite with your senior leadership and major stakeholders to make sure they align
GIAC Accredited Information System Security Engineering Services
Global Information Assurance Certification was established in 1999 to validate the skill of IT security professionals. GIAC's goal is to ensure that a certified security consultant possesses the skills appropriate to deliver services in vital areas of system, information, and software security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC-qualified network security audit consultants can assist your business in the areas of:
Find out additional information concerning Progent's GIAC Information Assurance Support.
- Auditing Networks
- Incident Response
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Talk to a Security Expert
To see how to access a certified security engineer for online or onsite help in South Carolina, call 1-800-993-9400 or visit Online Network Help.