Business IT networks inVirginianow have quick and economical online help from Progent's accredited security support specialists to assist with urgent security issues. Rates are affordable, charges are per minute, sign-up is fast, and service is unbeatable. Progent also provides help for complex projects that requires the expertise of seasoned security engineers with high-level industry credentials.
In case yourVirginiabusiness is located some distance from more populated metropolitan areas includingVirginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, support from local qualified security consultants is often limited when there's an urgent situation. This could mean lost income for your business, angry clients, unproductive employees, and distracted management. By utilizing Progent's remote support, you have access to a Premier security professional ready to deliver help whenever you have to have it to keep your computer network on line and recover your data.
Progent can assist you at any level in your initiatives to protect your network with services that can range from network security assessments to developing a comprehensive security strategy. Progent offers economical service to help small and midsize companies to configure and maintain protected networks based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security companies to provide web-based control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the local security gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.
Progent's security experts are accessible remotely or on premises to provide a variety of urgent or project-based network security services which include:
If your network has an emergency need for computer security support, refer to Progent's Urgent Online Network Support.
- Perform automated network security audits
- Recuperate promptly after virus and worm attacks
- Install effective firewalls
- Implement safe solutions for offsite and mobile access
- Deploy effective utilities for protection against viruses, spam and directory harvest attacks
- Help create a company-wide security plan with proactive monitoring
- Provide outsourced Call Center Services
- Create an effective data backup and restore plan centered on Microsoft Data Protection Manager backup capability
Progent's consultants offer world-class support in key facets of network security that include auditing, firewalls and VPN, and high-level security planning.
System Security Evaluation
Progent's certified security engineers can evaluate the effectiveness of your current network security environment by performing comprehensive remote automated analysis via sophisticated software tools and proven procedures. Progent's experience in administering this testing saves your company consulting fees and assures a detailed picture of weaknesses. The knowledge your business is provided can make up the foundation of a network protection strategy that can allow your network to operate dependably and react rapidly to new threats.
Automated Security Evaluation
Progent provides consulting in the use of security evaluation products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a variety of automatic network testing scans to identify possible security weaknesses. Progent has extensive knowledge of additional security auditing products including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.
Progent can show you how to design security into your company operations, configure scanning software, define and deploy a protected system architecture, and suggest policies to optimize the security of your network. Progent's security engineers are available to help you set up a firewall, design secure remote connectivity to email and data, and install virtual private network. Learn more concerning Progent's automated security audits.
Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to enable small businesses to get a professional network security assessment from an accredited security consultant. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive examination of your network from beyond your firewall to uncover potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from an authorized computer inside your company firewall to determine your exposure to internal assaults. The two security inventory services are configured and run from a protected external location. The process is managed by an engineer with top security accreditations and who produces a document that details and interprets the information captured by the scan and proposes cost-effective improvements if called for.
Network Penetration Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive IT system security plan. Progentís security experts can perform extensive intrusion tests without the awareness of your organization's in-house IT staff. Stealth penetration testing shows whether current security monitoring systems such as intrusion incident alerts and event history analysis are properly configured and consistently monitored. Find out additional information on Progent's stealth penetration analysis support services.
Firewalls and VPN Expertise
Progent's background in security technology includes in-depth field work with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, configure, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote access products offer a complete range of manageable security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company objectives. Learn additional details about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Products.
Engineering Services for Other Firewall and VPN Solutions
Progent provides small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper Networks, and SonicWall. Progent can show you how to create a comprehensive security plan and choose the right products from a variety of suppliers to achieve your security objectives while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight ASM safeguards local and cloud-based resources and provides a single platform to address the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint management, and web filtering through leading-edge tools packaged within a single agent accessible from a unified console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's specific needs and that allows you demonstrate compliance with government and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent can also assist your company to set up and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates your backup processes and enables fast restoration of vital data, applications and virtual machines that have become lost or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to restore your critical information. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top information security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time wasted searching for vital information about your network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Every company ought to develop a thoroughly considered security program that includes both pre-attack procedures and response plans. The pre-attack strategy is a collection of procedures intended to minimize vulnerabilities. The post-attack strategy assists your IT security personnel to evaluate the damage resulting from an attack, repair the system, document the event, and get business functions restored as quickly as feasible.
Progent's certified IS security engineers can to assist you to perform a comprehensive vulnerability assessment and create a computer security plan to implement security policies and controls to mitigate ongoing assaults and threats.
CISM Certified System Security Engineering Services
The CISM committee defines the basic capabilities and worldwide standards of skill that information security professionals are required to learn. It gives business management the assurance that those who have earned their CISM credential have the experience and capability to provide effective security management and support consulting. Progent offers the services of CISM Certified security consultants to assist businesses with:
Find out more details about Progent's CISM Network Security Support Services.
- Network Security Processes
- Risk Management
- Information Security Program Management
- Information Security Management
- Recovery Management
CISSP Certified Security Engineering Support
CISSP certification recognizes mastery of a worldwide standard for network security. ANSI has awarded certification recognition in the area of information security stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security fields such as:
Learn more information concerning Progent's CISSP Qualified Cybersecurity Consulting Professionals.
- Security Management Procedures
- Security Architecture and Models
- Access Management Systems and Processes
- Software Development Security
- Operations Security
- Site Security
- Data Encryption Technology
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure Information System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier system architecture professionals are consultants who have earned ISSAP status as a result of rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential represents proven competence in the more in-depth demands of IS security architecture within the broader scope of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security such as.
Read additional information about Progent's ISSAP Accredited Secure Network Architecture Consulting Expertise.
- Access Control Mechanisms and Methodologies
- Telecom and Network Security
- Encryption/Decryption Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Accredited Network Security Auditing Engineering Services
The CISA accreditation is a prestigious qualification that indicates expertise in information system security auditing. Accredited by ANSI, the CISA credential has candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA security audit specialists can help your IT organization with:
Find out more information about Progent's CISA Certified Security Auditing Consulting Services.
- IS Audit Services
- Information Technology Administration
- Systems and Architecture Planned Useful Life
- IT Support
- Protecting Information Resources
- Business Continuity Planning
The CRISC program was initiated by ISACA to verify an IT professional's skills to design, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk management consultants can provide a range of risk assessment services such as:
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and review documentation to evaluate significant risk scenarios
- Identify legal, industry, and business requirements and company policies associated with your network to determine their possible impact on your strategic objectives
- Point out potential threats for your operational processes to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IT risk so they can assist with your risk management process
- Match identified risk scenarios to related business procedures to help determine risk ownership
- Determine risk appetite with executive leadership and key stakeholders to make sure they are in agreement
GIAC Certified Network Security Engineering Expertise
Learn additional information concerning Progent's GIAC Information Assurance Support.
GIAC was founded in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to ensure that an accredited professional has the knowledge appropriate to provide support in important categories of network, data, and software security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent's GIAC information security audit consultants can assist your company in the areas of:
Contact a Progent Security Specialist
To see how you can contact a security engineer for remote or onsite expertise in Virginia, phone 1-800-993-9400 or go to Remote Computer Support.