Business networks in the state of Vermont can now get quick and economical online technical support from Progent's accredited security support specialists to help with critical security issues. Rates are competitive, charges are by the minute, sign-up is immediate, and service is world class. Progent also offers help for complex engagements that demand the knowledge of senior security engineers with high-level industry credentials.
If your Vermont organization is some distance from major urban neighborhoods like Burlington, Rutland, or Montpelier, support from local accredited network security support specialists could be problematic when there's an urgent situation. This could mean a drop in productivity for your business, angry customers, idle workers, and defocused executives. By utilizing Progent's remote support, you have access to a Premier security professional who can deliver help when you require it to keep your information system on line and salvage your data.
Progent can assist you at any level in your efforts to protect your IT environment with support services that can range from network security checks to developing a comprehensive security strategy. Progent provides economical service to assist businesses of all sizes to design and manage secure networks based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security vendors to deliver centralized management and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper level of inspection for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.
Progent's certified professionals are accessible remotely or on site to offer a variety of urgent or longer-term IT security services which include:
If your company has an immediate requirement for computer security help, refer to Progent's Urgent Online Technical Help.
Progent's support professionals provide advanced support in key areas of system security including security assessment, firewall and VPN solutions, and advanced security planning.
Progent's expert security engineers can assess the strength of your current network protection environment by performing comprehensive remote automated analysis via sophisticated utilities and tested procedures. Progent's skill in administering this testing saves your company time and money and offers an objective portrayal of gaps. The information your business is provided can form the foundation of a network protection plan that can permit your information system to run safely and react quickly to future risks.
Automated Vulnerability Evaluation
Progent offers expertise in the use of security auditing utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a set of automatic system testing checks to identify possible security gaps. Progent has broad experience with other network analysis products such as NMAP Port Scanner, AMAP application mapper, eEye, plus utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can help you build protection into your business processes, configure auditing applications, plan and implement a secure network architecture, and suggest policies to optimize the security of your IT system. Progent's security professionals are ready to assist you to set up a firewall, implement safe remote access to email and business applications, and install virtual private network. Find out additional information on Progent's network security evaluation.
Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to enable small companies to get an objective security assessment from a certified security expert. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your network from outside your firewalled perimeter to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a system scan from an authorized machine inside your firewall to determine your exposure to internal attacks. Both security inventory services are configured and executed from a protected external site. The process is managed by an engineer with top security accreditations and who generates a document that summarizes and analyzes the information collected by the security scan and proposes practical remediation where called for.
Stealth Intrusion Testing Consulting
Stealth penetration checking is a key component of any serious IT system security strategy. Progentís security professionals can run extensive intrusion checks without the awareness of your company's in-house network support staff. Stealth penetration testing shows whether existing security defense tools such as intrusion incident warnings and event log analysis are correctly configured and consistently checked. Find out additional information about Progent's network security penetration testing support services.
Progent's background in network security solutions encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important networking certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection technology offer a comprehensive range of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Learn more details concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.
Consulting Services for Additional Firewall and VPN Products
Progent offers small and medium size organizations expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right technologies from multiple vendors to support your security goals while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior analysis technology to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to address the complete threat lifecycle including blocking, detection, containment, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services deliver economical multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools incorporated within one agent managed from a unified control. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you demonstrate compliance with government and industry data security standards. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also help you to install and test a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows rapid recovery of vital files, applications and VMs that have become lost or corrupted as a result of component failures, software bugs, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security vendors to provide centralized control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of analysis for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect information about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can eliminate as much as 50% of time spent searching for critical information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need when you need it. Learn more about ProSight IT Asset Management service.
Expert Security Planning
Every company ought to develop a thoroughly thought out security program that includes both proactive processes and response plans. The pre-attack strategy is a collection of procedures intended to reduce security weaknesses. The post-attack strategy assists your company's network security engineers to evaluate the impact caused by an attack, fix the system, record the experience, and get business functions operational as quickly as possible.
Progent's expert IT security consultants can to help your business to perform a complete vulnerability evaluation and define a network security strategy to establish security processes and controls to minimize ongoing attacks and dangers.
CISM Certified Security Engineering Assistance
The CISM organization describes the basic capabilities and global standards of skill that information security managers are expected to learn. CISM provides executive management the confidence that consultants who have qualified for their CISM credential possess the experience and capability to provide efficient security management and consulting consulting. Progent can provide the support of CISM Premier security professionals to assist companies with:
Learn more information concerning Progent's CISM Network Security Consulting Expertise.
- Network Security Strategies
- Vulnerability Analysis
- IS Security Implementation Management
- IS Security Management
- Recovery Planning
CISSP Certified Security Consulting Assistance
CISSP certification denotes mastery of an international standard for data security. ANSI has awarded the CISSP credential accreditation in the field of information protection stipulated by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas including:
Read more information about Progent's CISSP Qualified Security Consulting Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Management Systems and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption Technology
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Certified system architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the more complex requirements of IS security architecture within the wider field of IS security expertise needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your company with all phases of secure network architecture including.
Read additional information concerning Progent's ISSAP Certified Secure Network Architecture Support Expertise.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Infrastructure Protection
- Cryptography Solutions
- Needs Evaluation and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Security Auditing Engineering Services
The Certified Information Systems Auditor credential is an important qualification that signifies mastery in IS security audit and control. Certified by ANSI, the CISA accreditation requires that consultants undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA-qualified information security audit specialists are available to assist your IT organization with:
Learn the details about Progent's CISA Qualified Security Auditing Consulting Services.
- IS Audit Services
- Information Technology Governance
- Network Assets and Architecture Lifecycle Planning
- Information Technology Service Delivery
- Protecting Data Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's skills to design, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help you to create and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk mitigation experts can provide a range of risk assessment services including:
Read the details concerning Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to evaluate significant vulnerabilities
- Inventory statutory, regulatory, and contractual requirements and organizational policies related to your information system to determine their possible influence on your strategic objectives
- Identify potential threats for your operational workflows to help in analyzing your corporate risk
- Create a risk awareness program and provide training to make sure your organization understand IT risk so they can assist with your risk control process
- Match key risk scenarios to related business processes to help assign risk responsibility
- Determine risk tolerance with executive leadership and key stakeholders to make sure they match
GIAC Accredited IS Security Engineering Services
Find out additional details concerning Progent's GIAC Information Assurance Support.
GIAC was established in 1999 to certify the knowledge of computer security experts. GIAC's goal is to verify that an accredited professional possesses the skills appropriate to provide support in important categories of network, information, and software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC information security audit experts are available to help your IT organization in the areas of:
Contact a Progent Security Specialist
To see how you can contact a Progent security consultant for online or onsite expertise in Vermont, phone 1-800-993-9400 or go to Online Computer Support.