Company IT networks in Utah can have quick and affordable remote help from Progent's certified security professionals to fix urgent security issues. The cost is competitive, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also offers assistance for long-term projects that demand the knowledge of seasoned security consultants with top industry certifications.

In case your Utah company is located some distance from major urban areas like Salt Lake City, West Valley City, Provo, Sandy, or Orem, access to nearby accredited network security engineers may be limited during a crisis. This can cause lost income for your company, angry customers, unproductive workers, and distracted executives. By utilizing Progent, you have access to a Premier security engineer who can offer expertise when you require it to get your network operating and recover your data.

Progent can help you in a variety of ways in your efforts to protect your information system with services ranging from security assessments to creating a company-wide security plan. Progent offers economical service to assist businesses of all sizes to design and maintain protected networks based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to provide centralized management and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that stays within your security perimeter.

Progent's security professionals are available online or on site to offer a range of urgent or project-based IT security services such as:

  • Run thorough network security audits
  • Recover quickly after attacks
  • Set up and troubleshoot firewalls
  • Configure safe methods for remote and mobile connectivity
  • Deploy effective solutions for automatic protection against viruses, spam and directory harvest attacks
  • Help create a comprehensive security plan with 24x7 monitoring
  • Offer comprehensive Help Desk Support
  • Help Develop an effective network backup and recovery strategy centered on Data Protection Manager backup capability
If your network has an urgent need for computer security help, refer to Progent's Emergency Online Network Help.

Progent's security experts provide advanced services in vital facets of system protection that include analysis, firewalls and VPN, and advanced security planning.

System Security Audits
Progent's expert security engineers can evaluate the strength of your existing computer protection environment by performing exhaustive remote automated testing based on advanced utilities and tested procedures. Progent's skill in administering this testing saves you money and assures an accurate picture of gaps. The information your company gains can be used as the foundation of a network protection plan that will allow your network to run safely and react rapidly to future risks.

Automated Network Vulnerability Audits
Progent offers expertise in the use of security evaluation software such as MBSA and GFI LANguard Network Security Scanner for economically performing a set of automatic system auditing checks to uncover possible security problems. Progent has broad knowledge of other security analysis tools such as NMAP, AMAP application mapper, eEye, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of testing reports and react effectively.

Progent can help you build security into your business operations, install auditing software, define and deploy a protected system environment, and suggest policies to optimize the safety of your network. Progent's security consultants are available to help you configure a firewall, implement secure remote connectivity to email and data, and install virtual private network. Find out more on Progent's automated security analysis.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory packages intended to allow small businesses to get an independent network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, a security expert administers an extensive test of your network from outside your firewalled perimeter to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from a secure machine within your firewall to evaluate your exposure to internal threats. The two security inventory packages are configured and executed from a secured remote location. The project is directed by an engineer who has earned high-level security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and suggests cost-effective remediation if appropriate.

Stealth Intrusion Testing Support Services
Stealth intrusion checking is a key component of any serious network security plan. Progentís security experts can run extensive penetration tests without the knowledge of your company's internal IT staff. Unannounced penetration checking shows whether current security monitoring systems such as intrusion incident warnings and event log analysis are correctly configured and actively monitored. Learn more on Progent's stealth penetration testing support services.

Firewalls and VPN Support
Progent's background in security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with key networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower Services integration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's security and remote access products offer a complete line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business goals. Find out more information concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and VPN Products
Progent provides small and medium size companies expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security plan and choose appropriate technologies from multiple vendors to achieve your security goals while staying within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to defend endpoint devices and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely escape traditional signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to automate the entire threat lifecycle including protection, identification, mitigation, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection services offer ultra-affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge technologies packaged within a single agent accessible from a single control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that addresses your company's unique needs and that helps you prove compliance with government and industry information protection standards. Progent will help you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent can also help your company to install and test a backup and disaster recovery system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows rapid recovery of critical data, apps and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your critical data. Read more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top information security companies to deliver web-based control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported immediately to a different hosting solution without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard information related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate up to 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Any company should develop a thoroughly thought out security program that incorporates both pre-attack procedures and reaction planning. The pre-attack strategy is a set of steps intended to reduce vulnerabilities. The post-attack plan assists your company's IT security engineers to evaluate the impact resulting from an attack, repair the system, document the event, and get business functions restored as rapidly as feasible.

Progent's certified IS security engineers are available to assist you to run a full risk assessment and define a computer security plan to establish security policies and mechanisms to minimize future attacks and threats.

CISM Certified System Security Support Expertise
The CISM committee describes the core competencies and international standards of performance that IT security professionals are required to master. CISM provides business management the assurance that those who have earned their CISM credential have the background and capability to deliver effective security management and consulting services. Progent can provide the support of CISM Premier security professionals to help businesses with:

  • IS Security Strategies
  • Vulnerability Management
  • Network Security Implementation Management
  • Information Security Management
  • Recovery Planning
Find out more details concerning Progent's CISM Certified Network Security Consulting Expertise.

CISSP Certified Security Consulting Expertise
The CISSP credential denotes expertise with a worldwide standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security stipulated by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Read more information about Progent's CISSP Qualified Cybersecurity Support Professionals.

CISSP-ISSAP Certified Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier system architecture engineers are experts who have earned ISSAP Certification as a result of thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents proven competence in the more complex demands of IS security architecture bounded by the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security such as.

  • Access Control Systems and Methodologies
  • Telecommunications and Network Security
  • Data Encryption Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Physical Security
Read more information concerning Progent's ISSAP Qualified Secure Information System Architecture Engineering Professionals.

CISA Qualified Information System Security Auditing Consulting Expertise
The CISA credential is an important achievement that signifies mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified IS security audit consultants can assist your business with:

  • IS Audit Process
  • IT Administration
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Resources
  • Business Continuity Planning
Find out the details concerning Progent's CISA Qualified Security Auditing Consulting Services.

CRISC Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and support IS controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation consultants offer a variety of risk assessment services such as:

  • Collect data and review documentation to help identify significant vulnerabilities
  • Identify legal, regulatory, and business requirements and company standards associated with your network to determine their possible impact on your business objectives
  • Point out potential vulnerabilities for your operational workflows to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders understand IT risk so they can contribute to your risk management program
  • Connect key risk vectors to your associated operational procedures to help determine risk responsibility
  • Determine risk appetite with your senior leadership and key stakeholders to ensure they match
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Assistance
GIAC was established in 1999 to validate the skill of computer security experts. GIAC's mission is to ensure that an accredited professional has the knowledge needed to deliver services in important areas of system, information, and application security. GIAC certifications are recognized by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit specialists can help your IT organization with:

Read more information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Engineer
To learn how to access a certified security consultant for remote or onsite assistance in Utah, call 1-800-993-9400 or go to Remote Computer Support.