Company IT networks in Vermont now have fast and affordable online access to Progent's qualified security professionals to resolve complex security problems. Rates are reasonable, billing is per minute, engagement is immediate, and service is unbeatable. Progent also provides help for complex projects that demand the services of senior security consultants with top security certifications.

If your Vermont small business is away from larger urban neighborhoods including Burlington, Rutland, or Montpelier, help from nearby accredited security professionals could be problematic when there's a crisis. This can cause a drop in revenue for your business, upset clients, idle employees, and defocused executives. By calling Progent's remote support, you can get in touch with a Premier security engineer who can offer assistance whenever you require it to get your system on line and salvage your information.

Progent can assist you at any level in your initiatives to guard your network with support that can range from network security assessments to developing a company-wide security plan. Progent provides economical service to help companies of any size to configure and maintain secure networks based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux operating systems plus BYOD users with Apple handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway device to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified consultants are accessible online or on site to offer a range of urgent or longer-term computer security services such as:

If your business has an immediate need for IT security support, refer to Progent's Urgent Remote Technical Help.

Progent's engineers offer world-class services in key areas of network security that include analysis, firewall and VPN solutions, and high-level security planning.

System Security Audits
Progent's expert security engineers can evaluate the effectiveness of your current computer security environment by performing comprehensive remote automated testing based on advanced utilities and proven techniques. Progent's skill in this service saves you money and assures an objective picture of security holes. The information your IT organization gains can be used as the basis of a security strategy that can allow your network to operate dependably and respond rapidly to future threats.

Automated Network Vulnerability Analysis
Progent provides consulting in the application of security auditing products including MBSA and GFI LANguard for economically performing a variety of programmed system testing scans to uncover potential security weaknesses. Progent has extensive experience with other network auditing utilities such as NMAP, AMAP Application Scanner, eEye, as well as utilities such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can show you how to build protection into your business processes, install scanning tools, plan and implement a protected network environment, and recommend policies to maximize the safety of your IT system. Progent's security engineers are able to show you how to configure a firewall, design safe remote connectivity to email and business applications, and integrate VPN. Learn more on Progent's network security analysis.

Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory service bundles intended to allow small businesses to receive an independent security assessment from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from outside your company firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a network scan from an authorized computer within your company firewall to uncover vulnerabilities to inside threats. Both security inventory packages are configured and run from a secured remote site. The project is managed by a consultant with top security credentials and who produces a document that details and interprets the data collected by the scan and proposes practical improvements where appropriate.

Stealth Penetration Analysis Support Services
Stealth intrusion checking is a key part of any successful IT system security strategy. Progentís security experts can run extensive penetration tests without the knowledge of your organization's in-house network support resources. Stealth penetration checking shows whether current security defense systems such as intrusion detection alerts and event history analysis are correctly configured and actively checked. Learn additional information concerning Progent's network penetration analysis support services.

Firewall/VPN Solutions
Progent's background in security technology includes extensive field work with leading firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help you to maintain your current PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, optimize, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite connection technology represent a complete range of manageable security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Find out more details about Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses professional support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you design a comprehensive security plan and choose the right products from multiple suppliers to support your security goals while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to defend endpoints and servers and VMs against new malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus products. ProSight ASM protects local and cloud resources and offers a single platform to manage the complete threat progression including blocking, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback using Windows VSS and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge technologies incorporated within a single agent managed from a unified control. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your organization's unique requirements and that allows you demonstrate compliance with government and industry information protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require urgent action. Progent's consultants can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates your backup processes and enables fast recovery of vital files, applications and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top information security vendors to deliver centralized management and world-class security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of inspection for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported immediately to a different hardware environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or domains. By updating and organizing your network documentation, you can save up to 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Network Security Design
Any company ought to develop a carefully thought out security program that incorporates both pre-attack procedures and response plans. The pre-attack plan is a collection of mechanisms intended to reduce security weaknesses. The reactive strategy helps your network security personnel to assess the impact caused by a security penetration, fix the network, record the experience, and get the IT network operational as rapidly as possible.

Progent's certified IS security engineers are available to assist your business to perform a complete vulnerability evaluation and define a network security strategy to implement security processes and mechanisms to mitigate ongoing attacks and threats.

CISM Accredited Information Security Consulting Services
The CISM committee defines the core competencies and worldwide standards of performance that information security managers are required to learn. It gives business management the assurance that those who have qualified for their CISM credential have the experience and knowledge to deliver effective security administration and consulting consulting. Progent offers the expertise of CISM Premier security consultants to help businesses with:

  • Network Security Processes
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Learn more information concerning Progent's CISM Certified Security Support Services.

CISSP Certified Security Consulting Expertise
CISSP certification recognizes mastery of a global standard for network security. ANSI has granted certification recognition in the area of information security defined by ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Preparedness
Learn more details about Progent's CISSP Qualified Cybersecurity Support Services.

CISSP-ISSAP Certified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier information system architecture engineers are consultants who have earned ISSAP Certification as a result of thorough testing and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more complex demands of information security architecture bounded by the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your business with all aspects of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecom and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Learn additional details about Progent's ISSAP Qualified Secure Network Architecture Support Professionals.

CISA Qualified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that represents mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional group. Progent's CISA-qualified IS security audit experts can assist your IT organization in the areas of:

  • IS Audit Services
  • IT Governance
  • Systems and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Read additional details about Progent's CISA Qualified Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's skills to design, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and carry out a business continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation experts can provide a range of risk evaluation services such as:

  • Gather information and review documentation to identify significant vulnerabilities
  • Identify legal, industry, and contractual mandates and company policies related to your information system to assess their possible influence on your business goals
  • Identify possible threats for your operational processes to help in evaluating your corporate risk
  • Create a risk awareness program and provide training to make sure your organization appreciate IT risk so they can assist with your risk management process
  • Connect key risk scenarios to related operational processes to help assign risk ownership
  • Determine risk appetite with your senior management and major stakeholders to ensure they are in agreement
Find out additional details about Progent's CRISC Risk Management Consultants.

GIAC Qualified Information System Security Engineering Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security experts. GIAC's mission is to ensure that an accredited professional has the skills needed to deliver support in vital categories of system, information, and software security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit engineers can help your business in the areas of:

  • Assessing IT Infrastructure
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Read additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Engineer
To learn how to contact a certified Progent security consultant for remote or on-premises support in Vermont, call 1-800-993-9400 or go to Online Network Help.