Small business information networks in the state of Vermont can have quick and economical remote access to Progent's qualified security professionals to fix urgent security issues. The cost is competitive, charges are per minute, engagement is quick, and support is world class. Progent also offers assistance for long-term projects that demand the services of seasoned security consultants with high-level industry credentials.
If your Vermont office is located away from more populated urban areas including Burlington, Rutland, or Montpelier, contact with local accredited network security support specialists may be problematic when you have a crisis. This can result in a loss of revenue for your company, angry clients, idle workers, and defocused executives. By contacting Progent's online services, you have access to a Certified security engineer ready to provide assistance whenever you require it to get your system on line and restore your data.
Progent can help you in a variety of ways in your efforts to protect your information system with support services that can range from security audits to creating a company-wide security strategy. Progent provides affordable service to assist small and midsize companies to design and maintain safe networks powered by Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the technology of leading information security companies to provide centralized management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard integrates cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall.
Progent's security engineers are available online or in person to offer a range of urgent or longer-term network security services such as:
If your company has an urgent requirement for IT security help, refer to Progent's Emergency Remote Network Help.
- Perform extensive security evaluations
- Recuperate promptly after virus and worm attacks
- Set up hardware and software firewalls
- Implement safe solutions for remote and mobile connectivity
- Install effective utilities for defense against spam and DHAs
- Help create a company-wide security strategy with 24x7 network monitoring
- Offer comprehensive Help Desk Support
- Create a practical backup and disaster recovery plan built around Data Protection Manager (DPM) backup/restore capability
Progent's support professionals can deliver world-class support in vital facets of computer security including security evaluation, firewalls and VPN, and advanced security consulting.
System Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing network security environment through exhaustive remote automated testing based on sophisticated utilities and tested procedures. Progent's skill in administering this testing saves your company money and offers a detailed picture of gaps. The information your IT organization gains can be used as the foundation of a security strategy that will permit your information system to run safely and react quickly to future threats.
Automated Vulnerability Audits
Progent offers consulting in the application of security auditing packages including MBSA and GFI LANguard NSS for economically performing a set of programmed system testing checks to uncover potential security vulnerabilities. Progent has broad experience with other network analysis products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like SolarWinds, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can show you how to build protection into your company operations, install auditing applications, define and deploy a secure network architecture, and suggest policies to maximize the security of your IT system. Progent's security professionals are available to show you how to configure a firewall, design secure remote connectivity to email and data, and install virtual private network. Find out more concerning Progent's network security analysis.
Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory service packages intended to enable small businesses to receive an impartial network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive examination of your network from outside your firewalled perimeter to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from an authorized computer inside your company firewall to assess your exposure to internal threats. Both security inventory packages are set up and run from a secured external site. The process is overseen by an engineer with high-level security accreditations and who generates a report that details and analyzes the information collected by the scan and proposes practical improvements if appropriate.
Network Intrusion Analysis Support Services
Stealth intrusion testing is an important component of any successful network security plan. Progentís security professionals can perform thorough intrusion checks without the awareness of your organization's internal IT resources. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion incident alerts and event history analysis are properly set up and actively checked. Learn additional information about Progent's stealth security penetration analysis consulting.
Progent's background in network security solutions includes extensive familiarity with leading firewalls and VPN technology offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower integration and troubleshooting support.
Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and remote access products represent a full range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business goals. Read more details about Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.
Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and SonicWall. Progent can show you how to create a detailed security strategy and choose the right technologies from multiple suppliers to support your security objectives while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior analysis technology to defend endpoint devices as well as servers and VMs against modern malware assaults like ransomware and email phishing, which easily evade legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to manage the complete malware attack progression including protection, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's specific needs and that helps you prove compliance with legal and industry information security standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent's consultants can also assist you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates and monitors your backup activities and enables fast restoration of vital data, applications and VMs that have become lost or damaged as a result of component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported immediately to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can save up to 50% of time wasted looking for vital information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require when you need it. Find out more details about ProSight IT Asset Management service.
Certified Security Planning
Any business should develop a carefully thought out security program that incorporates both proactive processes and reaction planning. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive plan helps your company's IT security personnel to evaluate the impact resulting from a security penetration, fix the network, record the experience, and get the IT network running as rapidly as possible.
Progent's certified IS security consultants can to assist your company to perform a comprehensive risk evaluation and define a network security plan to implement security policies and mechanisms to mitigate ongoing assaults and dangers.
CISM Qualified Information Security Engineering Services
The CISM organization defines the core capabilities and worldwide standards of skill that information security managers are expected to master. CISM gives business management the confidence that consultants who have earned their CISM certification possess the experience and knowledge to deliver efficient security administration and support services. Progent can provide the services of CISM Premier security consultants to assist companies with:
Find out additional information about Progent's CISM Qualified Security Support Expertise.
- Information Security Processes
- Vulnerability Analysis
- Network Security Program Management
- Information Security Management
- Recovery Planning
CISSP Certified Security Consulting Services
CISSP recognizes expertise with a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the field of information protection under ISO 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security areas including:
Read additional details about Progent's CISSP-certified Information Security Support Services.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Site Security
- Cryptography Technology
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure Network Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier system architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the most complex demands of information system security architecture within the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-premier security experts can assist your business with all aspects of architecture security including.
Find out more details about Progent's ISSAP Accredited Secure System Architecture Consulting Services.
- Access Control Systems and Techniques
- Phone System and Network Infrastructure Protection
- Cryptography Solutions
- Needs Analysis and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is an important achievement that indicates expertise in network security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA-certified security audit engineers can assist your business in the areas of:
Learn the details concerning Progent's CISA Certified IS Security Auditing Consulting Support.
- IS Audit Services
- IT Administration
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Protecting Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's skills to design, deploy, and support information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity strategy based on industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation engineers offer a range of risk evaluation services such as:
Learn additional information about Progent's CRISC Risk Management Experts.
- Gather data and study documentation to identify major risk scenarios
- Identify statutory, industry, and business requirements and organizational standards associated with your information system to assess their possible impact on your strategic goals
- Identify potential threats for your operational processes to assist in analyzing your enterprise risk
- Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IT risk so they can contribute to your risk management program
- Connect key risk vectors to related business processes to help assign risk responsibility
- Determine risk appetite with your senior management and major stakeholders to ensure they align
GIAC Accredited Security Engineering Expertise
Read more information about Progent's GIAC Information Assurance Support.
Global Information Assurance Certification was founded in 1999 to certify the skill of network security experts. GIAC's mission is to make sure that a certified security consultant possesses the knowledge needed to deliver support in critical categories of network, information, and software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States NSA. Progent's GIAC-qualified network security audit engineers can help your company with:
Contact a Security Engineer
To see how you can access a certified Progent security engineer for remote or onsite support in Vermont, call 1-800-993-9400 or go to Remote Network Support.