Small business IT networks in Virginia now have fast and affordable online access to Progent's accredited security experts to help with urgent security issues. Rates are reasonable, billing is by the minute, sign-up is quick, and support is world class. Progent also provides assistance for long-term projects that demand the knowledge of senior security consultants with high-level security credentials.

In case your Virginia business is some distance from larger urban neighborhoods such as Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, help from local certified security engineers may be problematic when you have an urgent situation. This can result in a loss of productivity for your company, upset customers, unproductive employees, and distracted management. By utilizing Progent, you have access to a Premier security professional who can provide expertise whenever you have to have it to keep your network running and salvage your information.

Progent can help you in your initiatives to defend your network with support ranging from network security audits to developing a comprehensive security strategy. Progent offers affordable support to assist small and midsize companies to set up and maintain secure IT environments based on Windows and Cisco products and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security vendors to deliver web-based control and comprehensive protection for all your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your network firewall. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further level of analysis for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also enable Exchange Server to monitor and protect internal email that stays within your corporate firewall.

Progent's security consultants are available online or on premises to provide a range of emergency or project-based computer security services such as:

If your company has an urgent need for IT security support, go to Progent's Emergency Remote Network Support.

Progent's support professionals provide advanced services in key fields of network protection that include auditing, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's expert security consultants can assess the vulnerability of your existing computer security implementation through comprehensive remote automated testing based on advanced software tools and tested techniques. Progent's skill in administering this testing saves your company time and money and assures an accurate portrayal of system vulnerability. The knowledge your IT organization is provided can be used as the foundation of a security plan that will permit your network to operate dependably and react rapidly to new threats.

Automated Network Security Assessment
Progent offers expertise in the use of security testing utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a set of programmed system auditing scans to uncover potential security weaknesses. Progent has broad knowledge of other security analysis products such as NMAP, AMAP application mapper, eEye, plus tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can show you how to build protection into your business processes, install scanning tools, define and deploy a protected system architecture, and recommend procedures to optimize the safety of your IT system. Progent's security professionals are ready to show you how to configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Find out more concerning Progent's network security evaluation.

Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to allow small companies to get an objective network security evaluation from a qualified security engineer. With Progent's External Security Inventory Checkup, a security engineer administers an extensive examination of your network from beyond your firewalled perimeter to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a system scan from an authorized machine inside your firewall to evaluate your exposure to inside attacks. Both security inventory packages are set up and run from a secured external site. The project is directed by an engineer with high-level security credentials and who produces a report that summarizes and interprets the information collected by the scan and suggests cost-effective improvements where appropriate.

Stealth Security Penetration Testing Support Services
Stealth penetration checking is an important part of any comprehensive IT system security plan. Progentís security professionals can run extensive penetration tests without the knowledge of your company's internal IT staff. Unannounced penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event log analysis are correctly set up and consistently monitored. Find out more concerning Progent's stealth security penetration testing support services.

Firewalls and VPN Support
Progent's background in security technology includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, tune, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA Firewalls with Firepower Services integration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite connection products offer a comprehensive line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Read more details concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Expertise for Other Firewall and VPN Products
Progent provides small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper, and SonicWall. Progent can help you design a detailed security strategy and choose the right products from multiple suppliers to support your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily evade traditional signature-based AV tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to automate the entire threat progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows VSS and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer security for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge tools incorporated within a single agent managed from a single control. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require urgent action. Progent can also help you to set up and test a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of critical data, apps and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security companies to deliver web-based control and world-class protection for your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be ported easily to a different hosting environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard data related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any business ought to develop a thoroughly thought out security strategy that incorporates both pre-attack processes and response plans. The proactive strategy is a set of mechanisms that help to minimize security weaknesses. The reactive strategy helps your company's network security personnel to assess the impact caused by an attack, repair the damage, document the event, and get business functions operational as soon as feasible.

Progent's certified IT security engineers can to assist your business to perform a complete risk assessment and define a company-wide security plan to establish security processes and mechanisms to reduce ongoing assaults and threats.

CISM Accredited System Security Consulting Assistance
The CISM committee describes the basic capabilities and global standards of skill that IT security professionals are expected to learn. It gives executive management the confidence that consultants who have earned their CISM certification possess the background and capability to deliver effective security management and consulting consulting. Progent can provide the support of CISM Premier security professionals to help businesses with:

  • IS Security Processes
  • Vulnerability Management
  • Information Security Implementation Management
  • Network Security Administration
  • Response Management
Learn additional details about Progent's CISM Accredited Information Security Engineering Services.

CISSP Accredited Security Engineering Services
CISSP certification denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data security defined by ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a variety security areas such as:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Read additional information concerning Progent's CISSP Accredited Information Security Consulting Expertise.

CISSP-ISSAP Certified Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most complex requirements of IS security architecture within the broader field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Read additional information about Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Certified Security Auditing Consulting Expertise
The CISA credential is a globally recognized qualification that represents mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo an extensive examination administered by the ISACA international professional association. Progent's CISA security audit experts are available to help your IT organization with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Read more information about Progent's CISA Accredited IS Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity plan that follows industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers offer a range of risk assessment services including:

  • Collect data and review documentation to help identify significant risk scenarios
  • Inventory statutory, regulatory, and business mandates and company standards associated with your network to determine their possible influence on your business goals
  • Identify potential vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide training to make sure your organization appreciate information system risk so they can assist with your risk management program
  • Connect key risk scenarios to related business processes to help determine risk ownership
  • Determine risk appetite with executive management and major stakeholders to ensure they match
Find out the details about Progent's CRISC Risk Management Consultants.

GIAC Accredited IS Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security professionals. GIAC's mission is to verify that a certified security consultant has the skills necessary to provide support in key areas of system, data, and application program security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC-qualified security audit engineers are available to help your IT organization in the areas of:

  • Auditing Perimeters
  • Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Read more information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Expert
To see how you can get in touch with a certified Progent security engineer for online or on-premises support in Virginia, call 1-800-993-9400 or go to Online Computer Help.