St. Louis Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the St. Louis Metro Area.
Progent locations in the St. Louis Metro Area
For immediate remote assistance with data security problems, companies in St. Louis, MO, have access to world-class support by contacting Progent's security engineers. Progent's online service consultants are available to provide effective and affordable help with security emergencies that threaten the productivity of your network. Progent's security consultants are qualified to support environments based on Microsoft Windows, Linux, macOS and OS X, Solaris, and popular derivatives of UNIX. Progent's wide array of consulting services encompasses firewall technology, email security, protected network architecture, and business continuity preparedness. Progent's support staff has been awarded the industry's top security certifications including CISM and Information System Security Architecture Professional (ISSAP).
Progent offers remote security support on a per-minute model without minimum call duration and without additional charges for sign-up or after hours service. By billing by the minute and by providing top-level support, Progent's pricing policy keeps costs under control and avoids scenarios where quick solutions turn into big charges.
Our Network Has Been Hacked: What Can We Do?
If you are currently faced with a network security emergency, visit Progent's Urgent Remote Technical Help to find out how to get fast assistance. Progent maintains a pool of veteran network security specialists who can provide online and onsite support that includes threat containment, mitigation, recovery, forensics, and enhancement of your cybersecurity defense to protect against future exploits.
For companies who have prepared carefully for a security breech, the step-by-step incident response model promoted by Global Information Assurance Certification is Progent's recommended method of reacting to a major security incident.
Overview of Progent's Security Services
Managing data security and preparedness for recovering vital information and systems after an attack demands an on-going program that entails an array of technologies and procedures. Progent's certified security consultants can assist your organization at whatever level in your efforts to secure your information system, ranging from security assessments to designing a complete security plan. Key technologies covered by Progent's experts include Security Planning and Prevention, Data Recovery and Security Forensics, and Managed Protection from Email-Borne Threats.
Planning and Implementing Secure Environments
Any business should develop a thoroughly considered security plan that includes both preventive and reactive steps. The proactive strategy is a set of precautions that helps to minimize vulnerabilities. The post-attack strategy defines activities to assist IT staff to evaluate the damage resulting from a breach, remediate the damage, record the experience, and revive business functions as soon as feasible. Progent can show you how to design security into your company operations. Progent can configure auditing software, create and build a secure network infrastructure, and recommend procedures and policies to maximize the safety of your information system. Progent's security professionals are ready to assist you to configure a firewall, deploy protected offsite access to email and data, and configure an efficient virtual private network (VPN).
If your company is interested in an economical way for outsourcing your network security administration, Progent's 24x7 Monitoring Options feature continual online server tracking and immediate resolution of problems.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, administer and troubleshoot enterprise hybrid cloud solutions that incorporate physical and cloud infrastructure and that are compliant with regulatory security standards. (Learn about Progent's Office 365 Exchange Online integration solutions with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
System Recovery and Failure Analysis
Progent provides expertise in restoring systems and servers that have been hacked, are suspect, or have stopped working as a result of a security penetration. Progent can help determine the damage resulting from the attack, restore normal business operations, and retrieve information lost owing to the assault. Progent's security specialists can also manage a comprehensive failure evaluation by examining activity logs and utilizing other proven forensics techniques. Progent's experience with security problems reduces your business disruption and allows Progent to suggest effective ways to prevent or mitigate future assaults.
Ransomware Cleanup and Restoration Expertise
Progent offers the help of experienced ransomware recovery experts with the knowledge to reconstruct a network damaged by a ransomware virus such as Ryuk, WannaCry, NotPetya, or Locky. To find out more, see ransomware cleanup and recovery expertise.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight series of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based machine learning technology to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to automate the complete malware attack progression including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical in-depth security for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device control, and web filtering through leading-edge technologies packaged within a single agent managed from a unified control. Progent's data protection and virtualization consultants can assist you to plan and implement a ProSight ESP environment that meets your company's specific requirements and that helps you demonstrate compliance with legal and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require immediate action. Progent can also assist you to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital data, applications and VMs that have become unavailable or damaged due to component failures, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to restore your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading data security companies to deliver centralized control and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be moved immediately to an alternate hosting environment without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard information related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can save as much as half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you’re making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Specialized Security Services Available from Progent
Progent's seasoned consultants offer world-class expertise in key areas of IT protection including:
Security Vulnerability Audits and Compliance Testing
Progent offers experience with information risk auditing utilities like Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic system tests to reveal potential security gaps. Progent has extensive skills with these and similar utilities and can assist you to analyze assessment reports and respond efficiently. Progent's certified security consultants also offer web software validation and can conduct thorough assessments of corporate-wide security to determine your organization's compliance with important global security specifications including HIPAA, NIST, and ISO 17799. Also, Progent can assess the strength of your wireless protection including stationary wireless equipment as well as portable devices. Get more details about Progent's Information Risk Evaluation and Security Compliance Testing.
Cisco Network Security, PIX and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco CCNP experts can deliver in-depth consulting support for Cisco's entire range of security and Virtual Private Network technologies such as PIX 500 Firewalls and ASA 5500 Series Firewalls, the Catalyst Firewall Services Module, secure broadband and IS routers, wireless access points and bridges, Meraki cloud-managed Wi-Fi APs, and Catalyst switches. Learn more information concerning Cisco Security, Virtual Private Network and Aironet Wireless Help.
Other Firewall and Virtual Private Network (VPN) Solutions
Stealth Penetration Checking Consulting
As well as being expert in a wide array of protection solutions from Microsoft and Cisco, Progent offers organizations of all sizes top-level engineering services for security products from other major firewall and Virtual Private Network (VPN) vendors. Progent's consultants can provide:
Unannounced intrusion checking is a valuable method for allowing organizations to understand how vulnerable their IT systems are to potential threats by revealing how well corporate security procedures and technologies hold up against authorized but unannounced penetration efforts launched by seasoned security engineers using advanced hacking techniques. Read additional details concerning Progent's Penetration Testing Services.
CISM Security Consulting Services
Certified Information Security Manager defines the fundamental skills and international standards of performance that information technology security managers are required to master. It offers business management the confidence that those who have earned their CISM possess the experience and skill to offer efficient security administration and engineering support. Progent can offer a CISM consultant to assist your enterprise in critical security areas including data protection governance, risk assessment, information security program management, and crisis handling support.
Read more details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Services.
CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification as a result of demonstrated experience, extensive study, and exhaustive examination. CISSP Certification indicates expertise in an international standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include security management procedures, security design and test systems, connection control systems, software development security, operations security, physical security, cryptography, communications, network security, and business continuity planning.
Get additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
CISSP-ISSAP Certified Experts for Secure Network Infrastructure
Progent's ISSAP certified security experts have been awarded ISSAP certification as a result of thorough testing and substantial experience. field experience with network security design. ISSAP security experts have comprehensive understanding of access control systems and techniques, phone system and network security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security specialists can help your company with all aspects of architecture security.
Find out more details concerning Progent's ISSAP Accredited Secure System Architecture Consulting Services.
CISSP-ISSEP Certified Cybersecurity Engineering Experts
Cybersecurity consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide large organizations with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the skills of a certified CISSP-ISSEP cybersecurity consultant to help your organization to utilize current system security engineering theory and processes in system development, review system security designs according to cybersecurity engineering best practices, produce viable system designs that include compliant cybersecurity mechanisms for all critical system functions, define effective design strategies to deliver protection for operations, perform in-depth risk analysis, and propose practical cybersecurity models that balance your operational requirements with your organization's risk tolerance.
Find out the details about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.
CISA Security Auditor Support Services
The CISA credential is a recognized achievement that signifies expertise in information system security audit and control. Certified by ANSI, the CISA accreditation requires that consultants undergo an exhaustive examination overseen by the ISACA international professional association. Progent can provide the expertise of a CISA-certified security engineer trained to assist companies in the areas of IS audit services, information technology governance, network assets and architecture planned useful life, information technology support, protecting data assets, and business continuity preparedness.
Get the details concerning Progent's CISA Professional Services.
CRISC-certified Risk Management Specialists
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support information system controls to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's risk mitigation expertise is a good fit the support available from Progent's CISA-certified consultants for objectively assessing your IT management design and also with the services of Progent's CISM-certified experts for designing company-wide security policies.
Read more details concerning Progent's CRISC-certified Network Risk Management Services.
Global Information Assurance Certification Consulting Expertise
GIAC was founded in 1999 to validate the skill of computer security experts. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge needed to provide support in important categories of network, data, and application software security. GIAC certifications are recognized by companies and government organizations throughout the world including United States NSA. Progent can provide the assistance of GIAC certified security engineers for any of the security capabilities addressed under GIAC certification programs including auditing security systems, security incident response, intrusion detection, web-based application security, and security information and event management (SIEM) solutions.
Find out more information concerning Progent's GIAC Information Assurance Support.
Contact Progent for Computer Security Help
If your business is situated in St. Louis or anywhere in the state of Missouri and you're trying to find network security help, call Progent at 800-993-9400 or go to Contact Progent.