Business IT networks in the state of Virginia now have fast and affordable remote help from Progent's certified network security consultants to help with critical security problems. Rates are affordable, charges are per minute, engagement is immediate, and service is world class. Progent also offers help for long-term engagements that demand the knowledge of seasoned security consultants with top industry credentials.
In case your Virginia business is far from more populated metropolitan neighborhoods like Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, the availability of local accredited security professionals is often problematic when you have an urgent situation. This could mean a loss of income for your company, angry customers, idle employees, and defocused executives. By utilizing Progent, you can get in touch with a Premier security professional who can offer help when you require it to keep your computer network on line and restore your information.
Progent can help you at any level in your initiatives to defend your information system with support services ranging from security checks to creating a comprehensive security strategy. Progent provides affordable support to help small and midsize companies to configure and maintain safe IT environments based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security companies to deliver centralized control and world-class security for your email traffic. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a deeper level of inspection for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified experts are accessible remotely or in person to offer a range of urgent or longer-term computer security services such as:
If your company has an emergency need for IT security support, refer to Progent's Emergency Online Network Support.
Progent's engineers provide advanced services in key facets of network security that include security evaluation, firewall and VPN solutions, and advanced security planning.
Progent's expert security consultants can assess the effectiveness of your existing computer security systems through exhaustive remote automated testing based on advanced software tools and proven techniques. Progent's skill in this service saves your company time and money and assures a detailed portrayal of security holes. The knowledge your IT organization is provided can make up the foundation of a security strategy that can permit your network to run dependably and respond rapidly to new threats.
Automated Network Vulnerability Evaluation
Progent provides expertise in the application of security analysis software such as MBSA and LANguard from GFI for economically running a variety of programmed network testing scans to identify potential security problems. Progent has broad knowledge of other security auditing tools such as NMAP Port Scanner, AMAP, eEye, as well as utilities like SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.
Progent can show you how to design protection into your business operations, install scanning tools, plan and implement a protected network architecture, and recommend procedures to maximize the security of your IT system. Progent's security consultants are able to help you configure a firewall, design safe remote access to email and data, and integrate virtual private network. Learn additional information on Progent's network security audits.
Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory service packages designed to enable small companies to get a professional network security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your network from outside your company firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a system scan from a secure machine within your company firewall to evaluate your exposure to inside assaults. Both security inventory packages are configured and run from a protected remote location. The project is managed by a consultant with high-level security accreditations and who produces a document that summarizes and interprets the information collected by the scan and proposes cost-effective remediation where called for.
Network Intrusion Testing Support Services
Stealth intrusion testing is a key component of any comprehensive network security plan. Progentís security experts can run thorough penetration tests without the awareness of your company's in-house IT staff. Unannounced penetration testing shows whether current security monitoring systems such as intrusion incident alerts and event history analysis are properly set up and actively checked. Learn more on Progent's network penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned important networking certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist you to manage your current PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.
Cisco Security and VPN Support Services
Cisco's network security and offsite access technology provide a full range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Learn additional information about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.
Consulting Services for Additional Firewall and VPN Products
Progent offers small and medium size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose the right products from multiple suppliers to support your security goals while staying within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based machine learning tools to guard endpoint devices and servers and VMs against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to address the entire threat progression including filtering, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection services deliver affordable in-depth protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge tools packaged within one agent accessible from a unified control. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP deployment that meets your company's specific needs and that allows you prove compliance with legal and industry information security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require urgent action. Progent can also assist you to set up and test a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup processes and allows fast recovery of critical data, apps and VMs that have become unavailable or corrupted due to hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of top data security companies to deliver centralized control and world-class security for your email traffic. The hybrid structure of Progent's Email Guard combines cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of inspection for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hosting solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard information related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSLs or warranties. By updating and managing your network documentation, you can save as much as 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require when you need it. Find out more details about ProSight IT Asset Management service.
Expert Security Planning
Every company ought to have a carefully thought out security strategy that includes both pre-attack procedures and response plans. The pre-attack plan is a collection of procedures intended to minimize vulnerabilities. The post-attack strategy assists your security personnel to assess the damage caused by an attack, fix the network, document the event, and get business functions operational as rapidly as feasible.
Progent's expert IS security engineers are available to help your company to run a complete vulnerability assessment and define a network security plan to establish security policies and controls to reduce ongoing assaults and threats.
CISM Accredited Information Security Consulting Expertise
The CISM committee describes the core capabilities and global standards of skill that IT security managers are expected to master. CISM gives business management the assurance that consultants who have earned their CISM certification possess the experience and knowledge to deliver effective security management and consulting consulting. Progent offers the services of CISM Certified security consultants to assist businesses with:
Find out additional details concerning Progent's CISM Qualified Security Support Expertise.
- Network Security Strategies
- Vulnerability Management
- Network Security Implementation Management
- Information Security Administration
- Response Management
CISSP Certified Security Engineering Expertise
The CISSP credential denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security fields including:
Read additional details concerning Progent's CISSP Qualified Cybersecurity Support Services.
- Security Management Practices
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Technology
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Services
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have earned ISSAP status as a result of rigorous testing and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the more challenging demands of IS security architecture within the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security including.
Learn additional information about Progent's ISSAP Qualified Secure Information System Architecture Support Services.
- Access Management Systems and Techniques
- Telecom and Network Protection
- Cryptography Solutions
- Requirements Analysis and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited Information System Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive test administered by the ISACA professional association. Progent's CISA security audit consultants can assist your business in the areas of:
Find out the details concerning Progent's CISA Qualified IS Security Auditing Engineering Assistance.
- IS Audit Services
- IT Administration
- Systems and Infrastructure Lifecycle
- IT Support
- Protecting Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's ability to plan, implement, and support information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management experts can provide a range of risk assessment services such as:
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and study documentation to help identify major risk scenarios
- Inventory statutory, industry, and contractual mandates and organizational standards associated with your information system to assess their potential influence on your business goals
- Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to ensure your stakeholders appreciate IT risk so they can contribute to your risk management program
- Match key risk vectors to related operational processes to help assign risk responsibility
- Validate risk tolerance with your senior leadership and key stakeholders to make sure they are in agreement
GIAC Certified IS Security Engineering Support
GIAC was established in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to verify that an accredited professional has the knowledge necessary to provide services in vital areas of system, information, and software security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit engineers can help your business with:
Read more information about Progent's GIAC Information Assurance Services.
- Assessing Networks
- Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Contact a Certified Security Engineer
To find out how you can get in touch with a security consultant for online or on-premises expertise in Virginia, phone 1-800-993-9400 or visit Online Computer Help.