Company computer networks in the state of South Carolina can have fast and economical online access to Progent's qualified network security experts to resolve the toughest security issues. Rates are reasonable, charges are per minute, sign-up is immediate, and service is world class. Progent also provides assistance for long-term engagements that demand the services of seasoned security engineers with high-level security certifications.
If your South Carolina office is located far from larger metropolitan neighborhoods like Columbia, Charleston, Rock Hill, or Greenville, help from nearby certified security support specialists is often problematic when you have a security disaster. This can result in a loss of income for your company, angry customers, idle employees, and defocused executives. By contacting Progent's online services, you can get in touch with a Premier security consultant who can deliver help when you require it to keep your system operating and restore your data.
Progent can help you in a variety of ways in your initiatives to defend your network with support that ranges from network security checks to developing a comprehensive security strategy. Progent provides economical support to assist small and midsize companies to design and manage protected IT environments powered by Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also show you how to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to provide centralized management and world-class protection for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.
Progent's security professionals are available remotely or in person to offer a variety of urgent or longer-term computer security services such as:
If your network has an immediate requirement for IT security help, go to Progent's Emergency Online Technical Support.
- Perform thorough security audits
- Recuperate quickly after serious security breaches
- Set up effective firewalls
- Implement safe methods for remote and mobile connectivity
- Install advanced utilities for protection against spam and DHAs
- Develop a comprehensive security strategy with 24x7 security monitoring
- Provide comprehensive Call Center Support
- Create an effective network backup and business continuity plan built around Microsoft DPM backup/restore capability
Progent's support professionals provide advanced support in key areas of computer protection including analysis, firewalls and VPN, and high-level security planning.
Progent's expert security engineers can assess the vulnerability of your current computer security systems by performing comprehensive remote automated testing based on advanced utilities and proven procedures. Progent's skill in this testing saves you money and offers an accurate picture of system vulnerability. The information your business gains can form the foundation of a security plan that will allow your information system to operate dependably and adapt quickly to future risks.
Automated Network Security Assessment
Progent offers consulting in the application of security auditing software including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a set of programmed system testing scans to identify possible security holes. Progent has extensive knowledge of other security analysis utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Netcat, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can show you how to design security into your company operations, configure scanning applications, plan and deploy a secure system architecture, and suggest policies to maximize the security of your network. Progent's security engineers are able to assist you to configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's network security analysis.
Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles designed to enable small businesses to receive an independent network security assessment from a certified security expert. With Progent's External Security Inventory Checkup, a security expert runs an extensive examination of your IT infrastructure from beyond your company firewall to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from an authorized computer within your firewall to assess the risk to internal attacks. Both security inventory services are set up and run from a secured external location. The process is managed by a consultant who has earned top security accreditations and who generates a report that details and analyzes the information captured by the scan and suggests practical remediation where appropriate.
Stealth Penetration Analysis Support Services
Stealth intrusion testing is a key part of any serious network security plan. Progentís security professionals can run extensive penetration checks without the knowledge of your organization's internal IT resources. Unannounced penetration checking uncovers whether existing security defense tools such as intrusion detection alerts and event log analysis are correctly set up and actively monitored. Learn more about Progent's stealth security penetration testing support services.
Progent's expertise in security technology includes extensive field work with leading firewalls and Virtual Private Network (VPN) products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers with important networking certifications including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to manage your existing PIX or ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.
Cisco Security and VPN Support Expertise
Cisco's network security and offsite access products represent a comprehensive line of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and CCNP qualifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Find out more information about Progent's Support Services for Cisco Security and VPN Appliances.
Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose the right products from a variety of suppliers to achieve your security objectives while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to defend endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which routinely escape legacy signature-matching anti-virus products. ProSight ASM protects local and cloud resources and provides a unified platform to automate the complete malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer security for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device control, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization consultants can assist you to design and configure a ProSight ESP environment that meets your organization's unique requirements and that allows you prove compliance with legal and industry data security regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent can also help your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates and monitors your backup processes and allows fast restoration of critical data, apps and virtual machines that have become unavailable or corrupted due to hardware failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery specialists can deliver advanced support to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to deliver centralized management and world-class protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as half of time wasted searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Learn more about ProSight IT Asset Management service.
Certified Network Security Consulting
Any business should have a thoroughly considered security strategy that includes both proactive procedures and reaction planning. The proactive plan is a set of steps that help to minimize security weaknesses. The post-attack plan helps your security personnel to assess the damage caused by a security penetration, fix the system, document the experience, and get business functions operational as quickly as possible.
Progent's certified information security engineers can to assist you to run a complete vulnerability assessment and create a computer security plan to establish security processes and mechanisms to minimize future attacks and dangers.
CISM Accredited Information Security Engineering Assistance
The CISM organization describes the basic capabilities and global standards of performance that information security professionals are required to learn. CISM provides business management the confidence that those who have earned their CISM certification have the background and knowledge to deliver effective security management and support services. Progent offers the services of CISM Premier security consultants to assist businesses with:
Learn additional details concerning Progent's CISM Security Consulting Expertise.
- Network Security Governance
- Vulnerability Management
- IS Security Program Management
- Network Security Management
- Response Planning
CISSP Qualified Security Engineering Expertise
CISSP recognizes expertise with an international standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data protection under ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a broad range of security fields such as:
Read additional details about Progent's CISSP-certified Security Consulting Expertise.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Technology
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous examination and extensive work with information security design. The ISSAP credential indicates proven competence in the most complex demands of information system security architecture bounded by the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-premier security experts can assist your company with all aspects of architecture security such as.
Learn additional details concerning Progent's ISSAP Certified Secure Network Architecture Support Expertise.
- Access Control Mechanisms and Techniques
- Phone System and Network Protection
- Cryptography Solutions
- Requirements Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive test administered by the ISACA international professional group. Progent's CISA IS security audit consultants are available to help your IT organization with:
Read more information concerning Progent's CISA Qualified Network Security Auditing Engineering Services.
- Information Systems Audit Process
- IT Enforcement
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Support
- Safeguarding Information Resources
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's ability to design, implement, and maintain IS controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified IT risk management experts offer a variety of risk evaluation services such as:
Read more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and review documentation to evaluate significant vulnerabilities
- Inventory legal, regulatory, and contractual mandates and organizational policies associated with your network to assess their possible impact on your business objectives
- Identify potential vulnerabilities for your operational processes to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct seminars to make sure your organization appreciate IT risk so they can contribute to your risk control program
- Connect identified risk vectors to related business processes to help assign risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they match
GIAC Certified IS Security Consulting Support
Learn additional information concerning Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to verify that an accredited security consultant possesses the skills appropriate to deliver services in vital areas of system, data, and application program security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC-certified information security audit experts are available to assist your IT organization in the areas of:
Talk to a Security Specialist
To learn how you can get in touch with a certified Progent security consultant for remote or onsite assistance in South Carolina, phone 1-800-993-9400 or go to Remote Computer Support.