Business information networks in the state of South Dakota can depend on prompt and affordable remote access to Progent's accredited security support specialists to assist with the toughest security problems. The cost is competitive, billing is per minute, sign-up is quick, and service is world class. Progent also provides help for long-term engagements that demand the services of seasoned security consultants with high-level industry certifications.
In case your South Dakota office is away from larger urban areas including Sioux Falls, Rapid City, or Aberdeen, help from local qualified security engineers may be limited when you have a crisis. This can result in a loss of income for your company, angry customers, idle workers, and distracted management. By utilizing Progent's online services, you have access to a Certified security consultant ready to offer help when you need it to keep your computer network operating and restore your information.
Progent can help you in a variety of ways in your efforts to guard your information system with services that can range from security assessments to creating a company-wide security plan. Progent offers affordable service to help companies of any size to design and maintain protected IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX or Linux platforms as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security companies to deliver centralized control and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.
Progent's security consultants are accessible remotely or on premises to provide a variety of urgent or longer-term network security services such as:
If your network has an immediate need for IT security help, go to Progent's Urgent Online Network Help.
Progent's consultants offer advanced support in vital facets of computer security that include analysis, firewall and VPN expertise, and high-level security consulting.
Progent's expert security engineers can assess the effectiveness of your current network security implementation by performing comprehensive remote automated testing via advanced utilities and tested procedures. Progent's skill in administering this service saves you consulting fees and offers an objective portrayal of security holes. The knowledge your IT organization is provided can be used as the foundation of a security strategy that will allow your information system to run safely and respond quickly to new threats.
Automated Network Security Evaluation
Progent offers consulting in the use of security testing software such as Microsoft's MBSA and GFI LANguard for affordably running a variety of programmed system auditing scans to identify potential security vulnerabilities. Progent has extensive knowledge of additional security auditing products such as NMAP Port Scanner, AMAP, eEye, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.
Progent can help you design protection into your business processes, configure auditing applications, define and deploy a secure system architecture, and recommend policies to optimize the security of your network. Progent's security professionals are ready to show you how to configure a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn additional information on Progent's automated security evaluation.
Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages designed to allow small companies to get a professional security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your network from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from a secure machine inside your firewall to uncover your exposure to inside threats. Both security inventory packages are configured and run from a secured external location. The process is directed by a consultant who has earned high-level security accreditations and who produces a report that details and analyzes the information collected by the security scan and proposes cost-effective improvements if appropriate.
Stealth Penetration Testing Support Services
Stealth intrusion checking is a key part of any comprehensive IT system security strategy. Progentís security experts can run extensive intrusion tests without the awareness of your organization's internal IT resources. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident warnings and event log analysis are correctly set up and consistently checked. Learn more on Progent's network security penetration analysis support services.
Firewall and Virtual Private Network Support
Progent's expertise in security technology encompasses extensive field work with leading firewalls and VPN products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key networking certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and offsite connection products represent a complete range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and CCNP qualifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business objectives. Find out additional details about Progent's Consulting Services for Cisco Security Solutions and VPN Products.
Consulting Expertise for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size companies expert support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and choose the right products from multiple suppliers to achieve your security goals while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight family of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis tools to defend endpoints and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily escape legacy signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to address the complete threat lifecycle including protection, identification, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device management, and web filtering via leading-edge tools incorporated within one agent managed from a single control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that meets your company's specific requirements and that helps you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent can also help your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates your backup processes and allows rapid recovery of critical files, apps and virtual machines that have become lost or damaged as a result of hardware breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security companies to provide centralized management and world-class protection for your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a further layer of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT documentation, you can save up to 50% of time spent looking for critical information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more about ProSight IT Asset Management service.
Expert Network Security Design
Every company should develop a carefully thought out security strategy that incorporates both preventive processes and reaction plans. The proactive plan is a collection of mechanisms intended to reduce vulnerabilities. The reactive strategy assists your IT security engineers to evaluate the impact caused by a security penetration, repair the network, record the experience, and get business functions operational as soon as feasible.
Progent's certified IT security consultants are available to help your business to run a complete vulnerability assessment and define a network security plan to establish security policies and mechanisms to minimize ongoing attacks and dangers.
CISM Qualified Information Security Support Assistance
The CISM committee defines the basic capabilities and international standards of performance that IT security managers are expected to master. It provides business management the assurance that those who have qualified for their CISM certification have the background and capability to provide effective security management and consulting consulting. Progent can provide the expertise of CISM Certified security consultants to help companies with:
Find out additional details concerning Progent's CISM Certified Security Engineering Services.
- Information Security Governance
- Risk Management
- IS Security Program Management
- IS Security Management
- Recovery Planning
CISSP Certified Security Engineering Services
CISSP certification denotes expertise with a global standard for information security. The American National Standards Institute has granted certification accreditation in the area of information protection defined by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields such as:
Read additional details about Progent's CISSP-certified Security Support Expertise.
- Security Administration Procedures
- Security Architecture and Models
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous examination and significant work with information security architecture. The ISSAP credential indicates proven skill in the more in-depth requirements of information system security architecture within the broader field of IS security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your company with all phases of architecture security such as.
Learn more information about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Protection
- Data Encryption Options
- Needs Analysis and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that represents mastery in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive test administered by the ISACA international professional group. Progent's CISA-qualified IS security audit experts are available to help your business in the areas of:
Get additional details about Progent's CISA Qualified Information System Security Auditing Consulting Assistance.
- IS Audit Process
- IT Administration
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Protecting Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and maintain information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation specialists can provide a range of risk identification services including:
Read the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and study documentation to help identify major risk scenarios
- Identify legal, regulatory, and business requirements and organizational policies associated with your network to assess their potential impact on your business goals
- Identify possible vulnerabilities for your business workflows to assist in analyzing your enterprise risk
- Create a risk awareness program and conduct seminars to ensure your stakeholders understand information system risk so they can assist with your risk management program
- Connect identified risk vectors to related operational processes to help determine risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they match
GIAC Certified Security Consulting Assistance
Find out more details about Progent's GIAC Information Assurance Expertise.
GIAC was established in 1999 to validate the skill of IT security professionals. GIAC's mission is to assure that a certified professional possesses the knowledge necessary to deliver services in key categories of network, data, and application security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC security audit engineers can assist your IT organization in the areas of:
Get in Touch with a Security Engineer
To find out how to get in touch with a security consultant for online or onsite support in South Dakota, phone 1-800-993-9400 or visit Online Network Support.