Company computer networks in West Virginia can depend on fast and affordable remote access to Progent's certified security support specialists to fix urgent security problems. Rates are competitive, charges are per minute, sign-up is fast, and support is unbeatable. Progent also provides help for long-term engagements that demand the expertise of senior security consultants with top industry certifications.
In case your West Virginia business is located far from larger metropolitan areas including Charleston, Huntington, Morgantown, or Parkersburg, contact with local certified network security consultants may be limited when you have an emergency. This can cause a drop in productivity for your business, angry clients, unproductive workers, and distracted executives. By utilizing Progent's online services, you can get in touch with a Certified security consultant who can offer help whenever you require it to keep your system on line and recover your information.
Progent can help you in your efforts to protect your IT environment with support ranging from security assessments to developing a company-wide security strategy. Progent provides economical service to help businesses of all sizes to set up and manage safe IT environments powered by Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks most threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further layer of analysis for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, DLP, and encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email traffic that stays within your security perimeter.
Progent's certified consultants are available online or on site to offer a range of emergency or longer-term computer security services which include:
If your business has an urgent requirement for IT security support, refer to Progent's Emergency Remote Technical Help.
- Perform extensive network security audits
- Recover rapidly after attacks
- Install and troubleshoot firewalls
- Implement secure techniques for remote and mobile connectivity
- Deploy effective software for defense against spam and DHAs
- Develop a comprehensive security strategy with round-the-clock monitoring
- Offer comprehensive Help Desk Support
- Help Create a practical data backup and restore strategy based on Data Protection Manager backup technology
Progent's support professionals can deliver advanced services in vital facets of network protection that include analysis, firewalls and VPN, and high-level security planning.
Progent's expert security consultants can evaluate the effectiveness of your existing network security environment by performing exhaustive remote automated analysis based on advanced utilities and proven procedures. Progent's skill in this service saves your company consulting fees and offers a detailed portrayal of gaps. The information your company gains can make up the basis of a network protection strategy that will permit your network to run dependably and respond rapidly to new risks.
Automated Vulnerability Audits
Progent provides consulting in the use of security testing packages including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a variety of programmed system auditing scans to uncover possible security gaps. Progent has extensive knowledge of additional network analysis products including NMAP Port Scanner, AMAP application mapper, eEye, plus tools like Metasploit, Netcat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.
Progent can show you how to design protection into your business operations, configure auditing tools, define and deploy a secure network environment, and suggest procedures to optimize the safety of your network. Progent's security professionals are able to assist you to configure a firewall, design secure remote access to email and data, and integrate virtual private network. Learn additional information about Progent's network security assessment.
Security Inventory Bundles for Small Companies
Progent offers two ultra-affordable security inventory packages intended to enable small companies to get an independent network security assessment from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive test of your IT infrastructure from beyond your firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from an authorized computer within your firewall to determine vulnerabilities to internal assaults. Both security inventory packages are set up and run from a secured external location. The process is overseen by a consultant who has earned high-level security credentials and who produces a report that details and interprets the data captured by the security scan and proposes practical remediation where called for.
Stealth Security Penetration Analysis Consulting
Stealth intrusion checking is a key part of any successful IT system security strategy. Progentís security professionals can run extensive penetration tests without the knowledge of your organization's internal IT resources. Unannounced penetration checking uncovers whether existing security defense tools such as intrusion detection warnings and event history analysis are correctly configured and consistently monitored. Learn more about Progent's stealth security penetration analysis consulting.
Firewall and Virtual Private Network Solutions
Progent's background in network security solutions includes in-depth field work with leading firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned important industry accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Support Services
Cisco's security and remote connection technology provide a full range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Learn more details concerning Progent's Support Services for Cisco Security and VPN Products.
Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and choose appropriate products from multiple vendors to achieve your security goals while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis tools to guard endpoint devices as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-matching AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to address the complete threat progression including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides firewall protection, intrusion alerts, device control, and web filtering via cutting-edge technologies packaged within a single agent managed from a unified control. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP environment that addresses your organization's unique requirements and that helps you demonstrate compliance with legal and industry data protection regulations. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent action. Progent's consultants can also help your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates your backup activities and allows fast recovery of critical files, applications and virtual machines that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises gateway device provides a further level of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard information related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your IT documentation, you can save up to 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Design
Every business should develop a carefully considered security strategy that incorporates both pre-attack processes and reaction plans. The pre-attack plan is a collection of procedures that help to minimize security weaknesses. The reactive plan assists your IT security engineers to evaluate the impact resulting from a security penetration, fix the system, document the experience, and get the IT network operational as quickly as feasible.
Progent's certified IT security engineers are available to help your business to run a full risk evaluation and define a network security strategy to establish security processes and mechanisms to minimize future assaults and threats.
CISM Accredited Security Consulting Services
The CISM committee describes the basic competencies and international standards of performance that IT security professionals are required to learn. CISM provides executive management the assurance that those who have earned their CISM certification have the experience and knowledge to deliver effective security management and consulting consulting. Progent offers the services of CISM Premier security consultants to assist companies with:
Read additional details concerning Progent's CISM Certified Information Security Support Services.
- Information Security Processes
- Vulnerability Analysis
- Information Security Implementation Management
- Information Security Management
- Recovery Management
CISSP Qualified Security Consulting Support
CISSP certification recognizes mastery of a global standard for data security. ANSI (American National Standards Institute) has granted certification recognition in the field of data protection stipulated by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields including:
Learn additional information about Progent's CISSP Accredited Information Security Consulting Professionals.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have earned ISSAP Certification through thorough examination and significant experience with network security design. The ISSAP credential indicates proven mastery in the more in-depth requirements of information system security architecture within the wider scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security including.
Learn more information concerning Progent's ISSAP Qualified Secure IT Architecture Consulting Professionals.
- Access Management Systems and Methodologies
- Telecommunications and System Infrastructure Protection
- Cryptography Solutions
- Needs Analysis and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Physical Security
CISA Qualified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in IS security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive test administered by the ISACA professional association. Progent's CISA-certified IS security audit consultants can help your IT organization in the areas of:
Get additional details about Progent's CISA Certified Security Auditing Consulting Support.
- Information Systems Audit Services
- Information Technology Enforcement
- Systems and Infrastructure Lifecycle Planning
- IT Support
- Safeguarding Data Resources
- Business Continuity Preparedness
The CRISC program was established by ISACA in 2010 to validate a consultant's skills to design, implement, and support information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help you to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation engineers offer a range of risk evaluation services including:
Read additional information about Progent's CRISC Risk Management Experts.
- Collect data and review documentation to evaluate significant vulnerabilities
- Inventory legal, regulatory, and business requirements and organizational standards related to your network to determine their potential impact on your business goals
- Identify possible threats for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness program and provide seminars to make sure your stakeholders understand IS risk so they can contribute to your risk control program
- Connect identified risk vectors to your associated business procedures to help determine risk responsibility
- Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
GIAC Certified IS Security Engineering Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to assure that a certified professional possesses the knowledge appropriate to provide support in important areas of system, information, and application software security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC IS security audit engineers are available to help your IT organization with:
Find out more information about Progent's GIAC Information Assurance Services.
- Assessing Perimeters
- Security Incident Handling
- Intrusion Detection
- Web Services Security
- SIEM solutions
Talk to a Progent Security Expert
To find out how to access a certified Progent security engineer for online or on-premises assistance in West Virginia, phone 1-800-993-9400 or visit Remote Network Support.