Small business IT networks in the state of Virginia can have fast and economical remote access to Progent's certified network security professionals to fix complex security issues. The cost is affordable, charges are by the minute, sign-up is immediate, and support is unbeatable. Progent also offers help for complex engagements that demand the services of senior security engineers with high-level industry certifications.
In case your Virginia network is located away from larger urban neighborhoods like Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, access to nearby certified security professionals may be limited during an emergency. This could mean a loss of revenue for your business, upset customers, idle employees, and defocused executives. By utilizing Progent's online services, you have access to a Certified security consultant who can offer help when you need it to get your computer network on line and restore your information.
Progent can assist you in your initiatives to protect your IT environment with support services that can range from network security assessments to developing a comprehensive security plan. Progent offers economical service to help small and midsize companies to design and manage protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter.
Progent's certified consultants are accessible remotely or in person to offer a range of urgent or project-based IT security services such as:
If your network has an urgent need for IT security support, refer to Progent's Urgent Remote Technical Help.
Progent's support professionals provide advanced services in vital facets of system protection that include auditing, firewall and VPN expertise, and high-level security planning.
Progent's expert security engineers can evaluate the vulnerability of your current network protection implementation through comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's experience in administering this service saves your company time and money and offers a detailed portrayal of gaps. The knowledge your business gains can be used as the basis of a network protection plan that will permit your information system to run safely and adapt quickly to future risks.
Automated Security Analysis
Progent offers expertise in the application of security analysis packages such as Microsoft's MBSA and GFI LANguard NSS for economically running a variety of programmed system testing scans to uncover potential security weaknesses. Progent has broad experience with additional network auditing tools including NMAP, AMAP, eEye, plus utilities like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can show you how to design security into your business processes, install scanning applications, plan and implement a protected network architecture, and recommend policies to maximize the security of your IT system. Progent's security engineers are ready to help you set up a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Learn additional information concerning Progent's network security evaluation.
Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages intended to enable small companies to get an impartial network security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Checkup, a security expert runs an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a system scan from a secure machine inside your firewall to uncover the risk to internal assaults. Both security inventory services are set up and executed from a secured external location. The project is managed by a consultant with high-level security accreditations and who generates a document that details and analyzes the data collected by the security scan and suggests practical remediation where appropriate.
Network Security Penetration Testing Consulting
Stealth intrusion testing is an important part of any successful IT system security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your company's internal network support resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event history analysis are properly set up and actively checked. Find out additional information concerning Progent's stealth penetration analysis consulting.
Firewalls and VPN Solutions
Progent's background in network security technology includes in-depth field work with major firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned key networking certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection products provide a comprehensive line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Learn more information about Progent's Support Services for Cisco Security Solutions and VPN Appliances.
Consulting Expertise for Additional Firewall and VPN Solutions
Progent offers small and medium size businesses professional support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select appropriate products from a variety of vendors to support your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior analysis technology to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily escape traditional signature-matching anti-virus products. ProSight ASM protects local and cloud-based resources and provides a unified platform to address the complete malware attack progression including blocking, infiltration detection, mitigation, remediation, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools packaged within a single agent accessible from a unified control. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that meets your company's specific requirements and that allows you demonstrate compliance with government and industry data protection regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent can also assist you to set up and verify a backup and restore system like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical data, apps and virtual machines that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver advanced expertise to configure ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security companies to provide web-based management and comprehensive security for all your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of analysis for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hosting environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and safeguard information about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save up to 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Design
Any business should develop a carefully thought out security strategy that includes both pre-attack procedures and response planning. The pre-attack plan is a set of steps that help to minimize security weaknesses. The post-attack plan assists your network security personnel to assess the impact resulting from an attack, fix the network, record the experience, and get business functions restored as quickly as possible.
Progent's expert IT security engineers can to assist you to perform a full risk assessment and create a company-wide security plan to establish security policies and controls to reduce ongoing attacks and dangers.
CISM Accredited Network Security Consulting Assistance
The CISM organization describes the basic capabilities and worldwide standards of performance that information security managers are required to master. CISM gives business management the assurance that those who have earned their CISM credential possess the background and capability to deliver effective security management and consulting services. Progent offers the support of CISM Certified security professionals to help companies with:
Learn more details concerning Progent's CISM Network Security Engineering Professionals.
- Information Security Governance
- Vulnerability Management
- IS Security Program Management
- Network Security Management
- Response Management
CISSP Accredited Security Engineering Support
The CISSP credential denotes expertise with a global standard for information security. The American National Standards Institute has granted certification recognition in the field of data protection under ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security fields including:
Learn more information concerning Progent's CISSP Network Security Consulting Expertise.
- Security Management Procedures
- Security Architecture and Models
- Access Control Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Technology
- Telecommunications, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more challenging demands of information security architecture bounded by the broader field of information security expertise required for CISSP certification. Progent's ISSAP-premier security consultants can assist your business with all aspects of architecture security including.
Find out additional information about Progent's ISSAP Certified Secure IT Architecture Consulting Expertise.
- Access Management Systems and Methodologies
- Telecom and System Infrastructure Protection
- Cryptography Solutions
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited Security Auditing Engineering Services
The CISA credential is a prestigious qualification that signifies expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified network security audit specialists can help your business in the areas of:
Read more information about Progent's CISA Certified IS Security Auditing Consulting Expertise.
- Information Systems Audit Services
- IT Administration
- Network Assets and Infrastructure Lifecycle
- Information Technology Support
- Safeguarding Data Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA in 2010 to verify a consultant's skills to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified engineer to help you to create and execute a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation engineers can provide a variety of risk identification services including:
Learn more information about Progent's CRISC Risk Management Experts.
- Collect data and study documentation to help identify major risk scenarios
- Inventory legal, industry, and contractual mandates and organizational policies related to your information system to assess their potential influence on your strategic goals
- Identify possible threats for your operational workflows to assist in analyzing your enterprise risk
- Create a risk awareness program and provide seminars to ensure your organization understand information system risk so they can assist with your risk control process
- Connect identified risk vectors to your associated operational processes to help determine risk responsibility
- Validate risk tolerance with executive leadership and key stakeholders to ensure they align
GIAC Accredited Information System Security Engineering Services
GIAC was established in 1999 to validate the knowledge of computer security professionals. GIAC's goal is to make sure that an accredited professional has the knowledge needed to deliver support in vital areas of system, data, and application software security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit engineers can assist your IT organization in the areas of:
Learn more information concerning Progent's GIAC Information Assurance Support.
- Auditing Security Systems
- Incident Handling
- Traffic Analysis
- Web Services Security
- SIEM solutions
Talk to a Certified Progent Security Expert
To find out how you can contact a Progent security engineer for remote or onsite support in Virginia, call 1-800-993-9400 or go to Remote Network Support.