Greater Washington DC Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Greater Washington DC Metro Area including suburban Maryland and Virginia.
Progent locations in the Greater Washington DC Metro Area
||2800 Eisenhower Ave, Suite 220
Alexandria, Virginia 22314
||Alexandria, VA Network Support Services
||One Freedom Square, 11951 Freedom Drive, 13th Floor
Reston, Virginia 20190
||Reston, VA Network Support Services
||300 E. Lombard St, Suite 840
Baltimore, Maryland 21202
||Baltimore, MD Network Support Services
||9841 Washingtonian Blvd, Suite 200
Gaithersburg, Maryland 20878
||Rockville, MD Network Support Services
||Metro Center, 1629 K St NW, Suite 300
Washington, District of Columbia 20006
||Washington DC Network Consulting Services
To get fast online help with network security problems, businesses in Washington, DC, have access to world-class troubleshooting by contacting Progent's security engineers. Progent's online service staff is ready to provide efficient and affordable help with security problems that threaten the viability of your network. Progent's accredited consultants are certified to support systems powered by Microsoft Windows, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's wide selection of consulting services addresses firewall expertise, email filtering and encryption, secure network infrastructure, and business continuity preparedness. Progent's technical support team has been awarded the world's top security certifications including Certified Information Security Manager (CISM) and Information System Security Architecture Professional (ISSAP).
Progent provides remote security support services on a per-minute basis with no minimum call duration and no extra fees for setup or after hours support. By billing per minute and by delivering top-level expertise, Progent's billing policy keeps expenses low and eliminates situations where quick solutions result in major expenses.
Our System Has Been Attacked: What Do We Do Now?
In case your business is currently fighting a security emergency, visit Progent's Urgent Remote Computer Support to see how to receive fast help. Progent has a pool of veteran cybersecurity specialists who offer online and onsite assistance that includes threat containment, mitigation, recovery, forensics, and enhancement of your security defense to protect against future attacks.
For companies that have planned in advance for being hacked, the step-by-step incident response model outlined by Global Information Assurance Certification is Progent's recommended method of handling a serious security penetration.
Overview of Security Support Services
Coordinating computer protection and preparedness for restoring vital data and systems after a security breach demands an on-going process involving an array of technologies and processes. Progent's security professionals can help your organization at all levels in your efforts to safeguard your IT network, from security assessments to designing a complete security plan. Some technologies covered by Progent's experts include Planning and Implementation, Information Recovery and Security Forensics, and Outsourced Filtering of Email-Borne Spam and Viruses.
Designing and Implementing Protected Environments
Every business should have a thoroughly thought out security strategy that includes both proactive and responsive elements. The proactive strategy is a collection of precautions that works to minimize vulnerabilities. The reactive strategy specifies activities to help IT staff to evaluate the damage resulting from a breach, repair the damage, record the event, and restore network activity as quickly as possible. Progent can show you how to design security into your company operations. Progent can set up scanning software, create and implement a secure IT architecture, and recommend processes and policies that will maximize the safety of your computing environment. Progent's security professionals are available to help you to set up a firewall, design protected offsite connectivity to email and data, and configure an efficient VPN.
If you are interested in an affordable way for outsourcing your security management, Progent's 24x7 Network Support Options include continual online server monitoring and fast response to problems.
Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, administer and repair enterprise hybrid cloud solutions that combine physical and cloud-based infrastructure and that are compliant with government data security requirements. (Find out about Progent's Office 365 integration solutions with on-premises Exchange deployments, Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud integration consulting.)
Data Restoration and Failure Analysis
Progent offers expertise in restoring systems and devices that have been hacked, are quarantined, or have failed as a result of a security penetration. Progent can show you how to determine the losses resulting from the attack, restore normal functions, and recover information lost owing to the attack. Progent's certified engineers can also oversee a thorough failure evaluation by going over event logs and utilizing a variety of proven forensics techniques. Progent's experience with security consulting reduces your business disruption and permits Progent to recommend efficient measures to avoid or mitigate new attacks.
Ransomware Removal and Recovery Expertise
Progent offers the help of experienced ransomware recovery consultants with the skills to rebuild an IT network that has suffered an attack by a ransomware virus such as Ryuk, WannaCry, Hermes, or Locky. For more information, visit ransomware cleanup and recovery consulting.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior analysis tools to guard endpoint devices as well as servers and VMs against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-matching AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to address the entire malware attack progression including protection, infiltration detection, containment, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alerts, device control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry information security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent action. Progent's consultants can also help your company to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates your backup processes and allows rapid recovery of critical files, applications and VMs that have become unavailable or corrupted as a result of component failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to recover your critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security companies to deliver centralized management and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be ported easily to a different hosting environment without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect information about your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time wasted searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre making enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Special Security Services Available from Progent
Progent's veteran consultants offer world-class expertise in key facets of computer protection including:
Information Risk Evaluation and Security Compliance Testing
Progent provides expertise with security auditing software such as Microsoft Baseline Security Analyzer and LANguard from GFI for performing a set of automatic network scans to reveal potential security holes. Progent has broad skills with these utilities and can help you to analyze assessment results and react efficiently. Progent's certified security consultants also can perform web software testing and can conduct expert evaluation of enterprise-wide security to assess your company's compliance with key worldwide security standards including FISMA, NIST, and ISO. In addition, Progent can assess the strength of your wireless security covering fixed wireless appliances as well as portable handsets. Find out more information concerning Progent's Security Vulnerability Evaluation and Compliance Assessment.
Cisco Network Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Consulting
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can deliver in-depth technical support for Cisco's complete family of protection and VPN technologies such as PIX Series Firewalls and ASA 5500 Series Firewalls, the Catalyst FWSM, protected broadband and integrated services (IS) routers, Aironet wireless access points, Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Get the details concerning Cisco Security, Virtual Private Network (VPN) and Aironet Wireless Help.
Other Firewall and Virtual Private Network Consulting Services
Unannounced Intrusion Checking Consulting
In addition to supporting a wide range of security technologies from Microsoft and Cisco, Progent can provide small and mid-size businesses expert consulting for solutions from other popular firewall and VPN suppliers such as:
Stealth penetration checking is a key method for allowing businesses to determine how exposed their IT systems are to real-world attacks by showing how thoroughly network security processes and mechanisms hold up against planned but unpublicized penetration efforts instigated by seasoned security specialists using the latest intrusion techniques. Find out more details concerning Progent's Penetration Testing Services.
Certified Information Security Manager (CISM) Security Consulting Expertise
Certified Information Security Manager (CISM) defines the fundamental competencies and worldwide benchmarks of service that information technology security managers are expected to achieve. CISM provides business management the assurance that those who have been awarded their accreditation have the experience and skill to provide effective security management and consulting support. Progent can offer a CISM-certified support professional to assist your organization in key security areas including data protection governance, vulnerability assessment, data security program control, and incident response management.
Get more information concerning Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.
CISSP Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have been awarded CISSP certification through demonstrated professional work, rigorous study, and exhaustive examination. CISSP Certification indicates expertise in a worldwide standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security administration procedures, security design and models, access control methodology, software development security, business processes security, physical security, cryptography, telecommunications, network security, and business continuity planning.
Find out more details about Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.
CISSP-ISSAP Premier Experts for Secure Network Architecture
Progent's ISSAP Premier security experts have earned ISSAP status after rigorous testing and significant experience. field experience with information security design. ISSAP security experts possess comprehensive understanding of access management mechanisms and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-premier security specialists can assist your company with all aspects of secure network architecture.
Find out additional details about Progent's ISSAP Certified Secure System Architecture Engineering Services.
CISSP-ISSEP Premier Cybersecurity Engineering Experts
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide enterprises with the services expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the support of a certified CISSP-ISSEP cybersecurity expert to help your enterprise to utilize current system security engineering theory and processes in system development, evaluate system security designs based on security engineering best practices, create viable system designs that include compliant cybersecurity features for all key system functions, define effective design strategies to provide operational security, perform in-depth risk analysis, and propose practical cybersecurity solutions that balance your operational goals with your organization's risk tolerance.
Find out more about Progent's CISSP-ISSEP cybersecurity engineering consulting.
Certified Information Systems Auditor (CISA) Support Expertise
The CISA credential is a prestigious qualification that indicates expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive examination overseen by the ISACA professional association. Progent can provide the expertise of a CISA-Certified security audit professional able to assist businesses in the areas of IS audit services, IT governance, network assets and architecture lifecycle, information technology service delivery, protecting data assets, and disaster recovery planning.
Find out more details concerning Progent's Certified Information Systems Auditor (CISA) Consulting Expertise.
CRISC-certified Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and support information system control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's risk mitigation services are complementary to the support available from Progent's CISA-Certified security engineers for objectively evaluating your IS management mechanisms and also with the expertise of Progent's CISM consultants for designing company-wide security policies.
Learn more details concerning Progent's CRISC-certified Risk Management Expertise.
GIAC Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to verify that an accredited professional has the knowledge appropriate to provide support in key categories of system, data, and application software security. GIAC certifications are acknowledged by businesses and institutions all over the world including the United States National Security Agency (NSA). Progent offers the assistance of GIAC certified security engineers for all of the security services covered under GIAC certification topics including assessing IT infrastructure, security incident handling, traffic analysis, web application security, and SIEM solutions.
Learn additional details concerning Progent's GIAC Information Assurance Support.
Get in Touch with Progent for Computer Security Expertise
If your organization is located in Washington DC and you want computer security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.