Company IT networks in Utah now have quick and affordable remote help from Progent's qualified network security engineers to assist with critical security issues. The cost is competitive, charges are by the minute, sign-up is fast, and support is world class. Progent also provides assistance for complex projects that demand the expertise of seasoned security consultants with top security credentials.
In case your Utah company is away from larger urban neighborhoods including Salt Lake City, West Valley City, Provo, Sandy, or Orem, support from nearby qualified security engineers could be limited during a security disaster. This can cause a drop in productivity for your business, upset customers, idle employees, and distracted executives. By calling Progent, you can get in touch with a Premier security professional ready to offer assistance whenever you need it to get your computer network on line and salvage your data.
Progent can assist you in your initiatives to guard your information system with services that can range from security assessments to developing a company-wide security plan. Progent offers affordable support to assist companies of any size to configure and maintain safe IT environments powered by Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security companies to deliver web-based control and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a deeper level of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to monitor and protect internal email that stays within your corporate firewall.
Progent's certified professionals are accessible online or in person to offer a variety of urgent or project-based IT security services including:
If your company has an urgent need for IT security help, refer to Progent's Urgent Remote Network Help.
Progent's consultants provide advanced support in vital facets of network security including auditing, firewall and VPN expertise, and advanced security planning.
Progent's certified security engineers can evaluate the strength of your current computer security environment through comprehensive remote automated testing based on sophisticated utilities and proven procedures. Progent's experience in this testing saves your company time and money and assures an objective portrayal of system vulnerability. The knowledge your company is provided can make up the foundation of a network protection strategy that will permit your information system to run safely and react quickly to new risks.
Automated Vulnerability Evaluation
Progent offers expertise in the use of security testing packages such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a variety of automatic network auditing scans to uncover possible security problems. Progent has broad experience with additional network analysis utilities including NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can help you build protection into your company operations, configure auditing tools, plan and implement a secure network architecture, and suggest policies to optimize the safety of your IT system. Progent's security professionals are ready to help you set up a firewall, implement safe remote access to email and data, and integrate virtual private network. Learn more on Progent's automated security assessment.
Security Inventory Scanning Bundles for Small Companies
Progent has put together two ultra-affordable security inventory service packages designed to enable small businesses to get an impartial security evaluation from a certified security expert. With Progent's External Security Inventory Checkup, an engineer administers a comprehensive test of your network from outside your firewall to uncover potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from a secure machine inside your company firewall to evaluate the risk to inside attacks. Both security inventory packages are set up and run from a secured remote location. The project is directed by a consultant with high-level security accreditations and who produces a report that summarizes and analyzes the data captured by the security scan and proposes cost-effective improvements where called for.
Stealth Penetration Analysis Support Services
Stealth penetration checking is a key part of any successful IT system security plan. Progentís security experts can run thorough penetration tests without the awareness of your organization's in-house network support resources. Stealth penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event history monitoring are correctly set up and actively monitored. Learn additional information about Progent's stealth penetration testing support services.
Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security solutions encompasses extensive field work with major firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned key networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Network Security and VPN Support Services
Cisco's network security and remote access products provide a complete range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business objectives. Learn more details concerning Progent's Consulting Expertise for Cisco Security and VPN Appliances.
Engineering Services for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size companies professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a detailed security strategy and choose the right products from multiple suppliers to support your security goals while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior machine learning tools to guard endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-matching AV products. ProSight ASM safeguards local and cloud-based resources and offers a unified platform to address the complete malware attack lifecycle including blocking, identification, containment, cleanup, and forensics. Key capabilities include one-click rollback using Windows VSS and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single console. Progent's security and virtualization experts can assist you to plan and implement a ProSight ESP environment that meets your company's unique requirements and that helps you demonstrate compliance with government and industry information protection standards. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also help your company to install and test a backup and restore solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup processes and allows fast recovery of critical data, applications and VMs that have become unavailable or damaged due to component breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can provide world-class support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top data security vendors to deliver centralized management and comprehensive protection for your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite gateway device adds a further level of analysis for incoming email. For outbound email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By updating and managing your network documentation, you can eliminate up to half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Every business should develop a thoroughly thought out security program that incorporates both pre-attack processes and response plans. The pre-attack plan is a collection of mechanisms intended to reduce vulnerabilities. The post-attack plan assists your IT security engineers to evaluate the damage resulting from an attack, repair the network, document the event, and get the IT network operational as rapidly as possible.
Progent's expert IS security engineers can to assist your business to run a full vulnerability evaluation and define a company-wide security strategy to implement security policies and mechanisms to minimize ongoing attacks and dangers.
CISM Qualified System Security Support Assistance
The CISM committee defines the basic capabilities and international standards of skill that IT security managers are expected to learn. It provides executive management the assurance that those who have qualified for their CISM certification have the background and knowledge to provide effective security administration and consulting services. Progent can provide the services of CISM Certified security consultants to assist companies with:
Read more details concerning Progent's CISM Accredited Information Security Consulting Expertise.
- Network Security Processes
- Vulnerability Analysis
- IS Security Implementation Management
- IS Security Administration
- Recovery Planning
CISSP Accredited Security Consulting Support
The CISSP credential denotes expertise with an international standard for data security. The American National Standards Institute has granted the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent can provide access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a broad range of security fields such as:
Find out additional details concerning Progent's CISSP Qualified Security Support Professionals.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Network Architecture Consulting Services
Progent's CISSP-ISSAP Premier network architecture professionals are experts who have earned ISSAP Certification as a result of thorough examination and significant work with network security design. The ISSAP certification represents demonstrated competence in the more in-depth demands of information security architecture within the wider field of IS security expertise required for CISSP accreditation. Progent's ISSAP-premier security consultants can help your company with all aspects of secure network architecture such as.
Read additional details about Progent's ISSAP Certified Secure Information System Architecture Engineering Expertise.
- Access Control Mechanisms and Methodologies
- Phone System and Network Protection
- Encryption/Decryption Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Accredited Network Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a recognized achievement that indicates expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass a comprehensive test administered by the ISACA international professional association. Progent's CISA-certified information security audit experts are available to help your business in the areas of:
Learn more information concerning Progent's CISA Accredited Network Security Auditing Engineering Assistance.
- Information Systems Audit Services
- Information Technology Enforcement
- Network Assets and Architecture Lifecycle Planning
- IT Service Delivery
- Protecting Data Assets
- Disaster Recovery Planning
The CRISC certification program was established by ISACA to validate an IT professional's skills to design, implement, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation specialists can provide a variety of risk evaluation services including:
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and study documentation to evaluate significant vulnerabilities
- Inventory legal, industry, and contractual mandates and organizational standards associated with your information system to determine their possible impact on your strategic goals
- Point out possible vulnerabilities for your business processes to help in evaluating your corporate risk
- Develop a risk awareness initiative and conduct seminars to make sure your organization understand IT risk so they can contribute to your risk management program
- Connect identified risk vectors to your associated business procedures to help determine risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they are in agreement
GIAC Certified Information System Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security experts. GIAC's goal is to assure that a certified professional possesses the knowledge appropriate to deliver services in critical areas of network, data, and program security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC-certified IS security audit experts are available to assist your company in the areas of:
Find out additional details about Progent's GIAC Information Assurance Expertise.
- Assessing Perimeters
- Security Incident Response
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Talk to a Certified Progent Security Expert
To see how to contact a certified security engineer for online or on-premises support in Utah, call 1-800-993-9400 or go to Remote Network Support.