Small business networks in the state of South Dakota now have quick and affordable online technical support from Progent's accredited network security experts to fix critical security problems. Rates are reasonable, charges are by the minute, sign-up is quick, and service is world class. Progent also offers assistance for complex engagements that demand the expertise of senior security engineers with high-level industry certifications.

If your South Dakota office is situated away from larger metropolitan areas like Sioux Falls, Rapid City, or Aberdeen, access to local accredited network security professionals could be limited during an emergency. This could mean a loss of revenue for your business, upset clients, idle employees, and defocused management. By contacting Progent, you can get in touch with a Premier security engineer who can deliver expertise when you have to have it to keep your system operating and salvage your information.

Progent can help you in a variety of ways in your efforts to defend your network with support that can range from network security assessments to creating a company-wide security strategy. Progent provides economical support to help companies of any size to set up and maintain secure networks based on Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver centralized control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the local security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.

Progent's certified experts are accessible online or on premises to offer a variety of urgent or longer-term IT security services such as:

If your company has an urgent requirement for computer security help, go to Progent's Urgent Remote Technical Support.

Progent's support professionals can deliver world-class support in vital fields of computer security including auditing, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection environment through comprehensive remote automated analysis via advanced utilities and proven procedures. Progent's skill in administering this service saves your company consulting fees and offers an objective picture of security holes. The knowledge your business is provided can be used as the basis of a network protection plan that can permit your network to operate dependably and adapt quickly to new risks.

Automated Network Security Analysis
Progent offers consulting in the application of security evaluation products such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a variety of automatic system testing scans to uncover possible security gaps. Progent has extensive knowledge of additional network auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye, plus utilities such as Metasploit Framework, Netcat, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can show you how to build protection into your business processes, install scanning software, plan and implement a secure system environment, and recommend policies to maximize the safety of your network. Progent's security consultants are able to help you set up a firewall, implement safe remote connectivity to email and data, and install virtual private network. Find out more about Progent's automated security audits.

Security Inventory Scanning Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages intended to allow small businesses to receive an independent security evaluation from a certified security expert. With Progent's External Network Security Inventory Scan, an engineer administers an extensive examination of your IT infrastructure from beyond your company firewall to uncover potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from an authorized machine within your firewall to assess the risk to internal attacks. The two security inventory packages are configured and run from a protected external site. The process is overseen by a consultant with top security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and suggests cost-effective improvements if appropriate.

Network Intrusion Analysis Consulting
Stealth intrusion checking is an important part of any serious IT system security plan. Progentís security experts can run extensive penetration tests without the knowledge of your organization's internal IT staff. Stealth penetration testing shows whether existing security monitoring tools such as intrusion incident alerts and event log analysis are properly set up and actively monitored. Find out additional information about Progent's network security penetration testing support services.

Firewall and Virtual Private Network Support
Progent's background in network security technology includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite access products represent a full line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company objectives. Learn more details concerning Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and select appropriate products from multiple vendors to support your security objectives while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis technology to defend endpoint devices and servers and VMs against new malware attacks like ransomware and email phishing, which routinely escape legacy signature-based AV tools. ProSight ASM protects local and cloud resources and offers a single platform to manage the complete malware attack progression including filtering, identification, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows VSS and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools incorporated within a single agent managed from a single console. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP environment that addresses your organization's specific needs and that allows you demonstrate compliance with government and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent action. Progent can also help you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid recovery of critical files, apps and VMs that have become unavailable or damaged as a result of component failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your business-critical data. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading data security companies to deliver centralized management and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save as much as 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Security Design
Any business should have a carefully considered security program that incorporates both preventive procedures and reaction planning. The proactive strategy is a collection of procedures that help to minimize security weaknesses. The reactive strategy helps your company's IT security personnel to assess the impact caused by an attack, repair the damage, record the experience, and get the IT network running as quickly as feasible.

Progent's certified IT security consultants can to assist your company to run a comprehensive risk assessment and define a computer security strategy to establish security policies and mechanisms to mitigate ongoing attacks and threats.

CISM Accredited Network Security Consulting Expertise
The CISM committee defines the basic competencies and global standards of skill that information security managers are required to master. CISM gives executive management the confidence that those who have qualified for their CISM credential possess the background and capability to deliver efficient security administration and support services. Progent can provide the support of CISM Premier security consultants to assist businesses with:

  • IS Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Administration
  • Response Planning
Learn more details concerning Progent's CISM Accredited IS Security Engineering Expertise.

CISSP Accredited Security Engineering Support
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Find out more information about Progent's CISSP-certified Cybersecurity Support Expertise.

CISSP-ISSAP Certified Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more challenging demands of IS security architecture bounded by the wider field of information security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecom and System Infrastructure Security
  • Cryptography Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more information about Progent's ISSAP Qualified Secure Information System Architecture Engineering Expertise.

CISA Certified Information System Security Auditing Engineering Services
The CISA credential is a globally recognized qualification that signifies mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants pass an extensive examination given by the ISACA professional association. Progent's CISA-certified network security audit consultants are available to help your company with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Systems and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Resources
  • Business Continuity Preparedness
Get additional details about Progent's CISA Accredited Network Security Auditing Engineering Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's skills to plan, deploy, and maintain information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC network risk mitigation engineers offer a range of risk assessment services such as:

  • Collect information and review documentation to identify significant vulnerabilities
  • Inventory legal, regulatory, and business requirements and company policies related to your network to determine their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your business processes to assist in analyzing your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your organization understand IS risk so they can assist with your risk control program
  • Connect identified risk scenarios to your associated business procedures to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to make sure they match
Find out more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Consulting Support
Global Information Assurance Certification was founded in 1999 to certify the knowledge of information technology security experts. GIAC's mission is to verify that an accredited security consultant has the skills appropriate to deliver services in important categories of network, information, and application security. GIAC certifications are recognized by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified IS security audit engineers can help your IT organization with:

Find out additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Security Specialist
To see how you can access a certified security consultant for remote or on-premises expertise in South Dakota, phone 1-800-993-9400 or visit Online Network Help.