Small business computer networks in Utah can have quick and economical remote help from Progent's accredited security engineers to help with complex security problems. Rates are competitive, billing is per minute, engagement is quick, and service is world class. Progent also provides assistance for complex projects that demand the services of senior security consultants with high-level industry credentials.
In case your Utah network is located some distance from larger metropolitan neighborhoods such as Salt Lake City, West Valley City, Provo, Sandy, or Orem, the availability of local certified network security support specialists could be limited when you have an urgent situation. This can result in lost productivity for your business, upset clients, idle employees, and defocused management. By utilizing Progent, you can get in touch with a Certified security engineer who can deliver assistance whenever you require it to keep your network operating and recover your data.
Progent can assist you in your initiatives to guard your network with services that ranges from security checks to creating a comprehensive security strategy. Progent provides affordable service to assist businesses of all sizes to configure and maintain secure IT environments powered by Windows and Cisco technology and that may include computers based on UNIX or Linux operating systems plus BYOD users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security vendors to provide centralized control and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a further level of analysis for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.
Progent's certified experts are accessible online or on premises to offer a range of urgent or longer-term computer security services such as:
If your network has an urgent requirement for computer security help, refer to Progent's Emergency Remote Technical Support.
Progent's security experts can deliver world-class services in vital facets of computer security including security assessment, firewalls and VPN, and high-level security planning.
System Security Assessment
Progent's expert security engineers can assess the strength of your current computer security systems through exhaustive remote automated analysis via advanced software tools and tested techniques. Progent's experience in this service saves your company consulting fees and offers an accurate portrayal of gaps. The information your business is provided can be used as the basis of a security strategy that will permit your information system to run safely and respond rapidly to future risks.
Automated Vulnerability Audits
Progent provides expertise in the application of security testing packages including Microsoft Baseline Security Analyzer and GFI LANguard for economically performing a set of automatic system auditing checks to uncover possible security weaknesses. Progent has extensive knowledge of additional security auditing utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.
Progent can help you design security into your company operations, install scanning applications, define and deploy a secure network environment, and recommend procedures to maximize the safety of your IT system. Progent's security consultants are available to assist you to configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's network security audits.
Security Inventory Scanning Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to receive an impartial security evaluation from an accredited security specialist. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive examination of your network from beyond your firewall to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a system scan from an authorized machine inside your firewall to determine your exposure to internal threats. Both security inventory services are set up and run from a secured remote location. The project is managed by a consultant with top security credentials and who produces a document that details and interprets the information captured by the scan and proposes cost-effective improvements if called for.
Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is a key component of any serious network security plan. Progentís security professionals can perform extensive intrusion checks without the knowledge of your company's in-house network support staff. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event history analysis are correctly configured and consistently monitored. Learn additional information on Progent's network security penetration testing support services.
Firewalls and VPN Solutions
Progent's expertise in security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned key industry accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA Firewalls with Firepower integration and debugging services.
Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote access technology offer a complete line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business objectives. Find out additional details concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Products.
Engineering Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a detailed security strategy and choose appropriate technologies from a variety of suppliers to achieve your security objectives while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis technology to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to manage the complete threat lifecycle including blocking, detection, containment, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer economical in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization experts can assist your business to design and implement a ProSight ESP deployment that meets your organization's specific needs and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require urgent attention. Progent can also assist your company to install and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical files, applications and VMs that have become unavailable or damaged as a result of component failures, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can provide advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security vendors to deliver web-based management and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and blocks most threats from reaching your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper level of analysis for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the system is virtualized, it can be ported easily to an alternate hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect data related to your network infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted searching for critical information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Planning
Any business ought to develop a carefully considered security strategy that incorporates both preventive processes and reaction plans. The pre-attack strategy is a collection of procedures that help to reduce security weaknesses. The post-attack strategy assists your company's network security engineers to evaluate the damage resulting from an attack, fix the damage, record the experience, and get the IT network operational as soon as possible.
Progent's certified information security consultants are available to help you to run a full vulnerability assessment and define a network security plan to implement security policies and mechanisms to reduce ongoing assaults and threats.
CISM Qualified Information Security Consulting Expertise
The CISM organization describes the basic competencies and international standards of skill that information security professionals are expected to master. CISM provides executive management the assurance that those who have qualified for their CISM certification possess the background and capability to deliver efficient security management and consulting services. Progent can provide the services of CISM Premier security consultants to help businesses with:
Learn additional details concerning Progent's CISM Qualified Information Security Engineering Expertise.
- Information Security Governance
- Risk Management
- Information Security Program Management
- Information Security Management
- Recovery Management
CISSP Qualified Security Consulting Expertise
The CISSP credential denotes expertise with a global standard for information security. ANSI has awarded the CISSP credential accreditation in the field of data security stipulated by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your company in a broad range of security fields such as:
Read additional information concerning Progent's CISSP Qualified Information Security Consulting Professionals.
- Security Management Practices
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have been awarded ISSAP status through rigorous testing and significant work with information security architecture. The ISSAP credential represents proven skill in the more in-depth demands of IS security architecture bounded by the broader scope of IS security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security such as.
Learn additional details about Progent's ISSAP Qualified Secure IT Architecture Support Expertise.
- Access Management Systems and Techniques
- Phone System and Network Protection
- Encryption/Decryption Solutions
- Needs Analysis and Security Guidelines
- BCP and DRP
- Physical Security
CISA Certified IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that indicates mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive test administered by the ISACA professional group. Progent's CISA-certified IS security audit experts can assist your business with:
Read additional details concerning Progent's CISA Qualified Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Administration
- Systems and Architecture Lifecycle
- Information Technology Support
- Safeguarding Information Resources
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC network risk management engineers can provide a range of risk assessment services including:
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and study documentation to evaluate major risk scenarios
- Inventory legal, industry, and business requirements and company standards associated with your information system to assess their possible impact on your business goals
- Point out potential vulnerabilities for your operational workflows to help in analyzing your enterprise risk
- Develop a risk awareness program and conduct training to make sure your organization understand IT risk so they can assist with your risk management process
- Connect key risk vectors to related business processes to help determine risk ownership
- Determine risk tolerance with executive management and key stakeholders to make sure they are in agreement
GIAC Accredited Information System Security Engineering Services
Find out more information about Progent's GIAC Information Assurance Expertise.
GIAC was founded in 1999 to validate the knowledge of IT security experts. GIAC's goal is to ensure that a certified professional has the skills appropriate to provide support in key areas of network, information, and application software security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified information security audit engineers are available to help your business in the areas of:
Contact a Certified Security Expert
To learn how you can contact a security engineer for online or on-premises help in Utah, call 1-800-993-9400 or visit Remote Computer Support.