Business networks in Utah now have quick and economical online help from Progent's accredited security engineers to fix complex security issues. Rates are reasonable, charges are by the minute, sign-up is quick, and service is unbeatable. Progent also provides help for complex engagements that requires the expertise of senior security engineers with top security credentials.
If your Utah company is located some distance from more populated urban areas like Salt Lake City, West Valley City, Provo, Sandy, or Orem, contact with local accredited network security support specialists is often problematic during an urgent situation. This can result in a drop in income for your business, upset clients, idle employees, and distracted executives. By utilizing Progent's online services, you can get in touch with a Premier security engineer ready to provide expertise whenever you require it to get your network operating and salvage your information.
Progent can help you in all your initiatives to defend your IT environment with support services ranging from security checks to creating a company-wide security plan. Progent provides affordable service to help businesses of all sizes to design and manage protected networks based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a further level of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter.
Progent's security experts are available online or on site to offer a range of emergency or longer-term network security services which include:
If your network has an immediate need for IT security support, refer to Progent's Emergency Remote Technical Help.
- Run comprehensive security evaluations
- Clean up rapidly after attacks
- Install and troubleshoot firewalls
- Configure safe techniques for remote and mobile access
- Install effective applications for defense against viruses, spam and DHAs
- Develop a company-wide security plan with round-the-clock monitoring
- Provide outsourced Call Center Services
- Help Create a practical network backup and business continuity strategy centered on Microsoft DPM automated backup technology
Progent's support professionals provide advanced support in vital facets of computer security that include security evaluation, firewall and VPN expertise, and high-level security planning.
System Security Evaluation
Progent's certified security consultants can evaluate the strength of your existing network protection systems through exhaustive remote automated analysis based on sophisticated utilities and proven procedures. Progent's experience in administering this testing saves you time and money and offers an accurate picture of security holes. The information your IT organization is provided can be used as the basis of a security strategy that will permit your information system to operate safely and react rapidly to new threats.
Automated Vulnerability Evaluation
Progent provides consulting in the application of security testing products including MBSA and GFI LANguard for affordably running a variety of programmed network testing checks to identify possible security holes. Progent has broad experience with additional network analysis products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and respond effectively.
Progent can help you build protection into your business operations, install scanning tools, define and implement a secure system architecture, and suggest policies to maximize the safety of your IT system. Progent's security engineers are ready to help you set up a firewall, design secure remote connectivity to email and data, and install VPN. Find out more on Progent's automated security audits.
Security Inventory and Evaluation Bundles for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to enable small companies to get an impartial network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Checkup, an engineer administers an extensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from a secure computer within your firewall to assess the risk to inside attacks. The two security inventory packages are set up and run from a protected external site. The process is directed by an engineer who has earned high-level security credentials and who produces a report that summarizes and analyzes the information captured by the security scan and proposes cost-effective improvements where called for.
Network Penetration Testing Support Services
Stealth penetration testing is a key component of any successful IT system security strategy. Progentís security experts can perform extensive penetration checks without the awareness of your company's internal IT staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident alerts and event log analysis are properly set up and actively monitored. Learn additional information about Progent's stealth security penetration testing consulting.
Progent's background in network security solutions includes in-depth field work with major firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants with key industry accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your current PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and offsite access technology provide a comprehensive line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Find out additional information about Progent's Engineering Services for Cisco Security and VPN Products.
Consulting Expertise for Other Firewall and VPN Technology
Progent provides small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can help you create a detailed security plan and select appropriate technologies from multiple suppliers to support your security goals while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning technology to guard endpoints and physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to manage the entire threat lifecycle including filtering, identification, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering via leading-edge technologies incorporated within one agent managed from a unified console. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP deployment that meets your organization's specific needs and that allows you prove compliance with government and industry data protection regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require urgent action. Progent's consultants can also assist your company to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup activities and allows rapid restoration of vital data, applications and virtual machines that have become lost or damaged due to component failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security companies to deliver centralized control and world-class security for your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a further level of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the system is virtualized, it can be ported immediately to an alternate hosting solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can save as much as half of time spent looking for critical information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more about ProSight IT Asset Management service.
Certified Network Security Consulting
Any company ought to have a thoroughly considered security strategy that incorporates both pre-attack processes and reaction planning. The pre-attack strategy is a collection of steps designed to minimize security weaknesses. The post-attack plan helps your company's security personnel to evaluate the damage resulting from a security penetration, fix the system, document the event, and get the IT network operational as soon as feasible.
Progent's expert IT security consultants are available to help your business to run a complete risk assessment and define a company-wide security plan to implement security policies and controls to reduce future attacks and dangers.
CISM Qualified Information Security Consulting Expertise
The CISM organization describes the core capabilities and global standards of skill that information security professionals are expected to master. CISM provides business management the assurance that those who have qualified for their CISM certification have the background and knowledge to provide efficient security management and consulting services. Progent can provide the expertise of CISM Certified security consultants to help businesses with:
Find out additional details about Progent's CISM Qualified Information Security Support Professionals.
- IS Security Processes
- Vulnerability Management
- Network Security Implementation Management
- Information Security Administration
- Response Management
CISSP Certified Security Engineering Assistance
CISSP certification denotes mastery of an international standard for network security. The American National Standards Institute has awarded certification recognition in the field of information protection stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security areas such as:
Read more details about Progent's CISSP Accredited Network Security Support Professionals.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP Certified network architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous testing and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven mastery in the more in-depth requirements of information security architecture within the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your company with all phases of secure network architecture such as.
Learn additional details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Professionals.
- Access Management Systems and Methodologies
- Telecom and Network Infrastructure Security
- Cryptography Options
- Requirements Analysis and Security Standards
- BCP and Disaster Recovery Planning
- Physical Security
CISA Qualified IS Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents mastery in information system security audit and control. Certified by ANSI, the CISA credential requires that candidates undergo an extensive test administered by the ISACA international professional association. Progent's CISA network security audit consultants are available to assist your company with:
Read the details about Progent's CISA Accredited Network Security Auditing Consulting Support.
- IS Audit Process
- IT Enforcement
- Network Assets and Infrastructure Lifecycle Planning
- IT Service Delivery
- Protecting Data Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's skills to design, deploy, and maintain information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a business continuity plan based on leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk management experts can provide a range of risk assessment services such as:
Read the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and review documentation to help identify major risk scenarios
- Identify statutory, industry, and contractual requirements and organizational policies related to your information system to assess their possible influence on your business goals
- Identify possible threats for your business workflows to help in analyzing your enterprise risk
- Create a risk awareness initiative and conduct seminars to make sure your stakeholders understand IT risk so they can assist with your risk management process
- Connect key risk vectors to your associated business processes to help assign risk ownership
- Validate risk appetite with your senior leadership and key stakeholders to ensure they align
GIAC Qualified Network Security Consulting Support
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security experts. GIAC's mission is to verify that an accredited professional has the knowledge appropriate to provide support in important areas of system, data, and application program security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC security audit specialists can help your IT organization with:
Learn more details concerning Progent's GIAC Information Assurance Expertise.
- Assessing IT Infrastructure
- Security Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Talk to a Security Specialist
To learn how you can contact a certified security consultant for online or on-premises expertise in Utah, phone 1-800-993-9400 or go to Online Network Help.