Twin Cities Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Twin Cities Metro Area.
Progent locations in the Twin Cities Metro Area
For immediate online help with computer security problems, companies in St. Paul, MN, have access to expert support from Progent's security professionals. Progent's remote service consultants are available to offer efficient and economical help with security problems that threaten the viability of your network. Progent's security engineers are certified to provide help for environments based on Microsoft, Linux, Apple macOS and OS X, Sun, and popular derivatives of UNIX. Progent's wide range of consulting services encompasses firewall technology, email filtering and encryption, secure system infrastructure, and business continuity preparedness. Progent's support team has been awarded the world's most advanced security accreditations including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional.
Progent provides remote security expertise on a per-minute model without minimum minutes and without extra charges for sign-up or off-hour support. By charging by the minute and by delivering top-level help, Progent's pricing policy keeps costs under control and avoids scenarios where quick fixes entail major charges.
Our System Has Been Hacked: What Should We Do?
In case your network is now fighting a network security crisis, go to Progent's Emergency Remote Computer Support to find out how to get fast aid. Progent maintains a pool of seasoned network security experts who offer remote and onsite support that includes containment, mitigation, recovery, forensics, and enhancement of your security defense to protect against future attacks.
For businesses who have planned in advance for being hacked, the step-by-step incident handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of reacting to a major security incident.
Overview of Security Support Services
Managing computer security plus preparedness for restoring critical data and systems following a security breach requires an on-going process involving a variety of tools and procedures. Progent's certified consultants can help your business at all levels in your efforts to protect your IT network, from security audits to designing a complete security program. Important technologies covered by Progent's security consultants include Planning and Implementation, Data Recovery and Security Failure Analysis, and Managed Protection from E-mail-Borne Attacks.
Designing and Building Protected Networks
Every company should have a carefully thought out security strategy that includes both proactive and reactive steps. The proactive strategy is a collection of steps that helps to minimize security gaps. The reactive strategy defines procedures to help security staff to evaluate the damage caused by a breach, repair the damage, record the event, and revive business functions as quickly as feasible. Progent can advise you how to incorporate protection into your business processes. Progent can install scanning utilities, create and build a secure IT architecture, and recommend processes and policies to enhance the protection of your information system. Progent's security professionals are ready to assist you to set up a firewall, design safe remote connectivity to e-mail and information, and install an effective virtual private network (VPN).
If your company is looking for an economical option for outsourcing your network security administration, Progent's Round-the-clock Monitoring Options feature continual online server tracking and fast resolution of problems.
Hybrid Cloud Solutions
Progent can assist your company you to design, deploy, administer and troubleshoot enterprise hybrid cloud solutions that incorporate physical and cloud-based resources and that comply with government and industry security standards. (Learn about Progent's Office 365 integration with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
Data Restoration and Security Forensics
Progent provides skill in restoring networks and servers that have been compromised, are suspect, or have failed following a security breakdown. Progent can show you how to determine the damage caused by the attack, restore normal functions, and retrieve data lost as a result of the assault. Progent's certified specialists can also perform a thorough failure analysis by going over event logs and using a variety of advanced assessment tools. Progent's background with security problems minimizes your off-air time and permits Progent to suggest effective measures to prevent or mitigate future attacks.
Ransomware Removal and Restoration Expertise
Progent offers the services of experienced ransomware recovery experts with the knowledge to reconstruct an information system compromised by a ransomware cryptoworm like Ryuk, WannaCry, NotPetya, or Locky. To find out more, see ransomware cleanup and recovery expertise.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based analysis technology to guard endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to manage the entire malware attack lifecycle including protection, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a unified control. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP deployment that addresses your organization's unique needs and that allows you demonstrate compliance with legal and industry information security standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent action. Progent can also help your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of vital data, apps and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to deliver centralized management and comprehensive protection for all your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your network firewall. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway device adds a further layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information about your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By updating and managing your IT documentation, you can eliminate up to 50% of time wasted looking for critical information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Find out more about ProSight IT Asset Management service.
Special Security Expertise Available from Progent
Progent's security consultants offer unique consulting support in key areas of network security such as:
Information Risk Evaluation and Security Compliance Assessment
Progent provides experience with information risk evaluation utilities like Microsoft Baseline Security Analyzer or LANguard for performing a variety of automatic network scans to reveal potential security holes. Progent has extensive experience with these utilities and can assist you to analyze audit reports and react appropriately. Progent's certified security consultants also provide web application validation and can conduct expert assessments of enterprise-wide security to determine your organization's compliance with major industry security specifications such as HIPAA, PCI, and ISO 17799. In addition, Progent can evaluate the effectiveness of your wireless security including stationary wireless appliances plus mobile handsets. Get more information concerning Progent's Information Risk Audits and Security Compliance Testing.
Cisco Network Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Expertise
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver in-depth technical expertise for Cisco's complete range of security and Virtual Private Network (VPN) technologies such as PIX Series Firewalls and ASA 5500 Series Firewalls, the Catalyst Firewall Services Module (FWSM), protected broadband and integrated services routers, wireless access points, Cisco Meraki cloud-managed Wi-Fi APs, and Catalyst switches. Find out more information concerning Cisco Security, Virtual Private Network (VPN) and Wireless Expertise.
Other Firewall and VPN Consulting Services
Unannounced Penetration Checking Consulting
As well as being expert in a broad range of protection technologies from Microsoft and Cisco, Progent offers organizations of any size expert engineering services for products from other important firewall and VPN vendors. Progent's consultants can provide:
Stealth intrusion testing is a vital method for helping organizations to determine how exposed their networks are to real-world threats by testing how effectively network protection processes and mechanisms hold up against authorized but unpublicized intrusion attempts instigated by veteran security specialists utilizing advanced hacking methods. Find out more information concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager defines the fundamental competencies and international standards of performance that IT security professionals are required to achieve. CISM offers executive management the confidence that those who have been awarded their certification have the background and skill to offer efficient security administration and consulting services. Progent can provide a CISM support professional to help your enterprise in critical security areas including data protection governance, risk management, data protection process management, and incident response support.
Get additional details about Progent's Certified Information Security Manager (CISM) Security Consulting Assistance.
Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP experts are cybersecurity engineers who have earned CISSP status through demonstrated experience, rigorous study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for information security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Areas of expertise covered under CISSP include cybersecurity administration procedures, security design and models, access permission systems, applications development security, business processes security, hardware security, encryption, communications, network security, and disaster recovery planning.
Get additional details concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Certified Experts for Secure Network Architecture
Progent's ISSAP qualified cybersecurity experts have been awarded ISSAP status following thorough testing and extensive hands-on work with network security architecture. ISSAP consultants possess comprehensive knowledge of access management mechanisms and techniques, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security experts can assist your company with all phases of architecture security.
Read more details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Services.
CISSP-ISSEP Qualified Security Engineering Experts
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide enterprises with the services expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the skills of a certified CISSP-ISSEP network security consultant to assist your enterprise to utilize current system security engineering theory and processes in system development, review system security designs according to cybersecurity engineering best practices, create viable system designs that incorporate compliant security mechanisms for all key system functions, define efficient design and configuration strategies to provide protection for operations, perform in-depth risk analysis, and propose practical security solutions that balance your operational goals with your company's tolerance for risk.
Find out the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
CISA Security Auditor Consulting Services
The Certified Information Systems Auditor credential is a recognized qualification that represents mastery in information system security auditing. Accredited by ANSI, the CISA credential has consultants undergo an exhaustive test overseen by the ISACA professional association. Progent offers the expertise of a CISA-certified security audit consultant able to help businesses in the areas of IS audit process, IT governance, network assets and infrastructure lifecycle, IT support, protecting information assets, and business continuity preparedness.
Learn more details about Progent's Certified Information Systems Auditor Consulting Services.
CRISC Network Risk Mitigation Experts
The CRISC program was initiated by ISACA to validate a consultant's ability to design, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's risk mitigation services are a good fit the support provided by Progent's CISA-certified consultants for impartially auditing your IT control design and also with the expertise of Progent's CISM support professionals for defining security policies and procedures.
Learn more details concerning Progent's CRISC-certified IT Risk Management Support.
GIAC (Global Information Assurance Certification) Professional Expertise
Global Information Assurance Certification was founded in 1999 to certify the skill of information technology security engineers. GIAC's mission is to ensure that a certified security consultant possesses the skills needed to deliver support in vital categories of system, information, and program security. GIAC certifications are acknowledged by companies and institutions around the world including U.S. National Security Agency (NSA). Progent offers the help of GIAC certified professionals for all of the security services covered under GIAC certification topics such as auditing perimeters, incident response, intrusion detection, web-based application security, and security information and event management (SIEM) solutions.
Learn more information about Progent's GIAC Information Assurance Support.
Contact Progent for Computer Security Support
If your company is situated in St. Paul or elsewhere in the state of Minnesota and you need computer security support services, phone Progent at 800-993-9400 or visit Contact Progent.