Greater Twin Cities Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Twin Cities Metro Area.
Progent locations in the Greater Twin Cities Metro Area
For immediate online assistance with network security problems, businesses in St. Paul, MN, have access to world-class expertise by contacting Progent's certified security engineers. Progent's online service consultants are ready to offer efficient and low-cost help with security issues that are impacting the productivity of your IT network. Progent's security consultants are certified to support environments based on Windows, Linux, macOS and OS X, Sun, and popular versions of UNIX. Progent's broad array of services addresses firewall configuration, email filtering and encryption, secure network architecture, and disaster recovery preparedness. Progent's technical support team has earned the industry's top security accreditations including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional.
Progent provides online security support on a by-the-minute basis with no minimum times and no extra fees for sign-up or off-hour support. By billing per minute and by providing world-class help, Progent's billing model keeps costs low and eliminates situations where simple solutions turn into major charges.
Our System Has Been Hacked: What Can We Do Now?
If your network is currently faced with a security emergency, refer to Progent's Urgent Remote Technical Support to find out how to receive fast help. Progent has a pool of veteran cybersecurity specialists who offer online and on-premises assistance that includes containment, mitigation, recovery, forensics, and hardening of your security defense to protect against future attacks.
For companies that have planned beforehand for being hacked, the formal incident handling model promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of handling a major security attack.
Overview of Security Services
Coordinating network security and preparation for restoring critical information and functions after an attack requires a continual effort involving a variety of tools and processes. Progent's certified security consultants can help your organization at all levels in your attempt to safeguard your information network, ranging from security evaluation to designing a complete security program. Some areas supported by Progent's security engineers include Planning and Prevention, Information Restoration and Security Failure Analysis, and Outsourced Filtering of E-mail-Based Threats.
Designing and Building Secure Networks
Every business should develop a thoroughly thought out security plan that incorporates both preventive and responsive steps. The pre-attack strategy is a set of steps that helps to minimize vulnerabilities. The post-attack plan defines procedures to help IT staff to inventory the damage caused by a breach, remediate the damage, document the experience, and restore network functions as quickly as feasible. Progent can show you how to design security into your company processes. Progent can install auditing software, define and implement a secure network architecture, and propose processes and policies to optimize the protection of your computing environment. Progent's security professionals are available to assist you to set up a firewall, deploy safe offsite access to email and information, and install an efficient VPN.
If you are interested in an economical option for jobbing out your security administration, Progent's 24x7 Network Support Services include automated online system tracking and immediate response to emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to design, implement, manage and troubleshoot enterprise hybrid cloud solutions that incorporate local and cloud resources and that comply with government and industry security requirements. (Learn about Progent's Office 365 Exchange Online integration with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
Data Recovery and Security Forensics
Progent offers skill in restoring networks and servers that have been compromised, are quarantined, or have failed because of a security breakdown. Progent can help determine the damage resulting from the breach, return your company to normal business operations, and recover information compromised as a result of the breach. Progent's security specialists can also oversee a thorough failure analysis by examining event logs and utilizing a variety of advanced forensics tools. Progent's background with security consulting reduces your business disruption and permits Progent to propose efficient ways to avoid or mitigate new attacks.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based analysis tools to defend endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely escape legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to address the complete malware attack progression including blocking, identification, mitigation, remediation, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge technologies incorporated within a single agent managed from a unified console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP environment that meets your organization's specific needs and that allows you prove compliance with government and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent's consultants can also help you to set up and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of vital data, apps and VMs that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's BDR specialists can deliver advanced support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top information security companies to deliver web-based control and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Since the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard data related to your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can eliminate up to 50% of time wasted searching for critical information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether you’re making enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Specialized Security Services Offered by Progent
Progent's certified security engineers offer unique expertise in vital facets of IT security including:
Information Risk Evaluation and Compliance Testing
Progent offers expertise with security evaluation software like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive system tests to reveal potential security holes. Progent has extensive experience with testing tools and can help you to analyze assessment reports and react appropriately. Progent's certified security engineers also provide web software validation and can perform thorough assessments of corporate-wide security to determine your organization's compliance with key global security specifications including HIPAA, PCI, and ISO 17799. Also, Progent can evaluate the effectiveness of your wireless protection including in-place wireless equipment as well as mobile handsets. Find out more details about Progent's Vulnerability Audits and Security Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals can provide in-depth consulting services for Cisco's entire family of protection and VPN technologies such as PIX 500 Firewalls and ASA 5500 Firewalls, the Catalyst FWSM, protected broadband and IS routers, Aironet wireless access points, Meraki cloud-managed access points, and Catalyst Series switches. Find out more details about Cisco Security, Virtual Private Network (VPN) and Aironet Wireless Consulting.
Additional Firewall and Virtual Private Network Technologies
Stealth Penetration Checking Consulting
As well as being expert in a broad array of security technologies available from Microsoft and Cisco, Progent can provide businesses of all sizes top-level engineering services for solutions from other major firewall and VPN suppliers. Progent's consultants can provide:
Unannounced intrusion checking is a key technique for helping businesses to understand how vulnerable their information systems are to serious threats by showing how effectively corporate security processes and mechanisms hold up to authorized but unannounced intrusion attempts instigated by seasoned security engineers using advanced hacking methods. Read additional details about Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Expertise
CISM defines the basic competencies and international standards of service that information security professionals are required to achieve. CISM offers business management the assurance that those who have been awarded their certification have the experience and skill to offer efficient security management and engineering support. Progent can provide a CISM expert to help your organization in critical security areas such as information protection governance, risk management, information protection program management, and crisis response support.
Learn additional information about Progent's Certified Information Security Manager Security Consulting Assistance.
CISSP Security Support Services
Progent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity specialists who have been awarded CISSP accreditation as a result of verified professional work, rigorous study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for information security. ANSI has given the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Fields of knowledge covered within CISSP include cybersecurity management practices, security design and models, access control methodology, software development security, business processes security, physical security, encryption, telecommunications, network security, and business continuity planning.
Learn additional details concerning Progent's CISSP Consulting Expertise.
CISSP-ISSAP Qualified Consultants for Secure System Infrastructure
Progent's ISSAP certified cybersecurity experts have earned ISSAP status after thorough testing and significant hands-on work with information security design. ISSAP consultants have acquired in-depth understanding of access control mechanisms and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity and disaster recovery, and physical security integration. Progent's ISSAP-certified security experts can help your company with all phases of architecture security.
Learn additional details concerning Progent's ISSAP Accredited Protected IT Architecture Consulting Support.
CISSP-ISSEP Qualified Security Engineering Experts
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have demonstrated their ability to provide enterprises with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the skills of a certified CISSP-ISSEP network security expert to assist your organization to follow modern system security engineering theory and processes in system development, evaluate system security designs based on cybersecurity engineering best practices, produce viable system designs that incorporate compliant security mechanisms for all critical system functions, define efficient configuration strategies to provide operational security, perform in-depth risk analysis, and propose practical cybersecurity models that balance your operational requirements with your organization's risk tolerance.
Find out more about Progent's CISSP-ISSEP Network Security Engineering Consulting.
Certified Information Systems Auditor (CISA) Professional Expertise
The Certified Information Systems Auditor (CISA) credential is an important qualification that indicates expertise in network security audit and control. Certified by ANSI, the CISA credential has candidates undergo an exhaustive examination overseen by the ISACA professional group. Progent can provide the services of a CISA-certified security engineer able to help businesses in the areas of IS audit process, information technology enforcement, network assets and infrastructure lifecycle, information technology support, protecting data assets, and business continuity preparedness.
Find out additional information about Progent's Certified Information Systems Auditor (CISA) Consulting Services.
CRISC-certified Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's ability to design, implement, and maintain IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's risk management services are a good fit the services available from Progent's CISA-qualified consultants for objectively assessing your IS control design and also with the expertise of Progent's CISM support professionals for defining company-wide security policies and procedures.
Get more information concerning Progent's CRISC-certified IT Risk Management Support.
Global Information Assurance Certification Professional Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security experts. GIAC's mission is to verify that an accredited professional has the skills needed to deliver services in critical areas of system, information, and application program security. GIAC accreditations are recognized by businesses and government organizations throughout the world including U.S. National Security Agency. Progent offers the help of GIAC certified consultants for all of the network security services addressed under GIAC certification topics including auditing security systems, incident handling, traffic analysis, web application security, and SIEM solutions.
Read more details about Progent's GIAC Information Assurance Services.
Contact Progent for Computer Security Consulting Services
If your company is located in St. Paul or elsewhere in Minnesota and you're looking for network security consulting, telephone Progent at 800-993-9400 or go to Contact Progent.