Company information networks in South Dakota can depend on prompt and economical remote technical support from Progent's accredited security engineers to resolve critical security problems. Rates are competitive, billing is per minute, engagement is fast, and support is unbeatable. Progent also offers assistance for complex projects that demand the services of seasoned security engineers with high-level industry certifications.
In case your South Dakota company is some distance from larger urban areas like Sioux Falls, Rapid City, or Aberdeen, support from nearby accredited network security professionals may be limited when you have an urgent situation. This could mean a loss of revenue for your company, upset clients, idle employees, and distracted executives. By calling Progent, you have access to a Certified security engineer who can deliver assistance whenever you require it to get your information system running and salvage your information.
Progent can assist you in all your initiatives to protect your network with support ranging from network security checks to developing a comprehensive security plan. Progent provides affordable service to help businesses of all sizes to design and maintain safe IT environments powered by Microsoft Windows and Cisco technology and that may include computers based on UNIX or Linux operating systems plus BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the technology of top information security vendors to provide centralized management and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.
Progent's certified consultants are available remotely or on site to offer a variety of urgent or longer-term computer security services which include:
If your network has an urgent need for computer security support, refer to Progent's Emergency Remote Network Help.
- Perform extensive security audits
- Clean up quickly after attacks
- Configure effective firewalls
- Implement secure solutions for offsite and mobile connectivity
- Install effective solutions for defense against spam and directory harvest attacks
- Help create a comprehensive security strategy with proactive monitoring
- Provide comprehensive Call Center Support
- Help Develop a practical network backup and restore plan centered on Microsoft DPM backup/restore capability
Progent's engineers provide world-class support in key fields of network protection including security evaluation, firewall and VPN solutions, and high-level security planning.
System Security Audits
Progent's certified security consultants can assess the vulnerability of your existing network protection systems by performing exhaustive remote automated testing based on sophisticated software tools and proven techniques. Progent's experience in administering this testing saves you time and money and assures an accurate picture of security holes. The knowledge your IT organization gains can be used as the basis of a network protection strategy that will allow your network to operate safely and adapt quickly to new threats.
Automated Network Vulnerability Audits
Progent offers consulting in the application of security testing software including MBSA and GFI LANguard Network Security Scanner for affordably performing a variety of automatic network testing scans to uncover potential security weaknesses. Progent has broad experience with additional network analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.
Progent can help you design security into your company processes, configure auditing tools, define and deploy a protected system architecture, and recommend policies to maximize the security of your IT system. Progent's security engineers are available to help you configure a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Learn additional information concerning Progent's network security audits.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two low-cost security inventory scanning packages intended to enable small companies to get a professional security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive test of your IT infrastructure from beyond your firewall to determine possible weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a system scan from an authorized machine inside your firewall to uncover the risk to inside assaults. The two security inventory services are set up and run from a secured external site. The process is managed by an engineer who has earned high-level security credentials and who produces a report that details and interprets the data captured by the security scan and proposes practical remediation if called for.
Network Security Penetration Testing Consulting
Stealth penetration checking is a key part of any successful network security plan. Progentís security experts can perform extensive penetration tests without the awareness of your organization's in-house network support staff. Stealth penetration testing shows whether existing security monitoring systems such as intrusion detection warnings and event history monitoring are properly set up and consistently monitored. Learn more concerning Progent's network penetration testing consulting.
Progent's background in network security technology includes extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology from multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key networking certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to maintain your current PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, optimize, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower Services integration and debugging support.
Cisco Security and VPN Engineering Services
Cisco's network security and remote connection products offer a complete line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and CCNP certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Find out additional details concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.
Engineering Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a detailed security strategy and choose the right technologies from multiple vendors to support your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based analysis technology to defend endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to address the complete malware attack lifecycle including filtering, identification, mitigation, remediation, and forensics. Key features include single-click rollback with Windows VSS and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge tools incorporated within one agent accessible from a single control. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP deployment that meets your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry information security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent can also assist your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of critical data, applications and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security vendors to deliver web-based management and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper level of inspection for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email that stays inside your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the apps. Because the system is virtualized, it can be moved easily to a different hosting solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time spent looking for vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Every company ought to have a thoroughly thought out security program that includes both preventive processes and reaction plans. The proactive plan is a set of steps designed to minimize security weaknesses. The post-attack plan helps your IT security personnel to evaluate the impact caused by a security penetration, fix the system, document the event, and get the IT network restored as soon as feasible.
Progent's expert IT security consultants can to assist your business to perform a comprehensive risk evaluation and define a computer security plan to establish security policies and controls to mitigate future attacks and threats.
CISM Certified Security Engineering Services
The Certified Information Security Manager (CISM) committee defines the core competencies and global standards of skill that IT security professionals are expected to master. It gives executive management the assurance that those who have earned their CISM credential have the background and capability to deliver effective security management and support consulting. Progent can provide the support of CISM Premier security professionals to help businesses with:
Learn more information concerning Progent's CISM Certified Network Security Engineering Expertise.
- IS Security Processes
- Risk Management
- IS Security Program Management
- Information Security Management
- Recovery Management
CISSP Accredited Security Consulting Assistance
CISSP certification denotes expertise with an international standard for information security. ANSI has awarded the CISSP credential recognition in the field of data security defined by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:
Read additional information concerning Progent's CISSP Cybersecurity Support Services.
- Security Administration Procedures
- Security Architecture and Models
- Access Control Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have been awarded ISSAP status as a result of thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the most complex requirements of information system security architecture within the wider field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security such as.
Find out additional details about Progent's ISSAP Accredited Secure System Architecture Consulting Expertise.
- Access Control Systems and Methodologies
- Phone System and Network Security
- Encryption/Decryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Site Security
CISA Accredited Network Security Auditing Engineering Support
The CISA credential is a globally recognized qualification that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination given by the ISACA professional association. Progent's CISA-certified security audit specialists can help your IT organization with:
Learn more information about Progent's CISA Qualified Security Auditing Engineering Assistance.
- IS Audit Services
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support information system controls to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and carry out a business continuity plan based on industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation consultants can provide a range of risk identification services such as:
Read additional information about Progent's CRISC Risk Management Experts.
- Gather information and review documentation to help identify major vulnerabilities
- Inventory statutory, industry, and business mandates and organizational policies related to your information system to assess their possible impact on your business objectives
- Point out possible threats for your business workflows to assist in analyzing your corporate risk
- Create a risk awareness program and conduct training to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
- Match key risk scenarios to your associated business procedures to help assign risk ownership
- Validate risk appetite with your senior management and key stakeholders to make sure they are in agreement
GIAC Qualified Information System Security Engineering Assistance
Learn more details concerning Progent's GIAC Information Assurance Expertise.
Global Information Assurance Certification was founded in 1999 to validate the skill of computer security professionals. GIAC's mission is to make sure that an accredited professional possesses the knowledge appropriate to provide support in important categories of network, information, and program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit engineers are available to assist your IT organization in the areas of:
Get in Touch with a Security Expert
To see how to get in touch with a security engineer for remote or onsite assistance in South Dakota, call 1-800-993-9400 or visit Remote Computer Support.