Company computer networks in West Virginia now have fast and economical remote help from Progent's qualified security engineers to fix urgent security problems. The cost is competitive, charges are per minute, sign-up is fast, and service is world class. Progent also provides assistance for complex engagements that requires the knowledge of seasoned security engineers with high-level security credentials.
In case your West Virginia network is based outside of larger urban neighborhoods including Charleston, Huntington, Morgantown, or Parkersburg, access to local qualified network security consultants is often problematic during an emergency. This can cause lost income for your business, upset customers, idle workers, and distracted executives. By utilizing Progent, you have access to a Premier security consultant ready to offer assistance whenever you need it to get your network on line and recover your information.
Progent can assist you in all your initiatives to guard your network with support that can range from security checks to developing a company-wide security plan. Progent provides affordable service to assist small and midsize companies to set up and manage secure IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX or Linux platforms plus mobile users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to deliver web-based control and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.
Progent's security consultants are accessible online or on site to provide a range of urgent or project-based IT security services such as:
If your network has an immediate need for IT security help, refer to Progent's Emergency Remote Technical Help.
- Perform extensive network security evaluations
- Recuperate promptly after virus and worm attacks
- Set up effective firewalls
- Configure secure methods for remote and mobile access
- Deploy effective software for automatic defense against viruses, spam and DHAs
- Help create a company-wide security plan with round-the-clock monitoring
- Offer outsourced Call Center Support
- Develop a practical backup and business continuity solution built around Microsoft DPM backup capability
Progent's engineers provide advanced support in vital facets of system security including analysis, firewall and VPN solutions, and high-level security planning.
Progent's certified security consultants can assess the effectiveness of your current network security environment by performing exhaustive remote automated analysis via sophisticated software tools and tested procedures. Progent's skill in this testing saves your company consulting fees and assures an objective picture of gaps. The knowledge your company gains can be used as the foundation of a network protection plan that can allow your information system to run safely and adapt quickly to new risks.
Automated Security Assessment
Progent provides expertise in the application of security testing software including Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a set of programmed system auditing scans to uncover potential security gaps. Progent has extensive experience with additional security analysis products including NMAP, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can show you how to design protection into your business operations, install scanning software, plan and deploy a protected system architecture, and recommend policies to optimize the safety of your network. Progent's security engineers are able to show you how to set up a firewall, design secure remote access to email and data, and install virtual private network. Learn more on Progent's network security analysis.
Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages intended to enable small companies to get an independent network security assessment from a certified security consultant. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from an authorized computer inside your company firewall to determine your exposure to inside attacks. Both security inventory services are set up and executed from a secured remote location. The process is overseen by a consultant with high-level security accreditations and who generates a report that details and analyzes the information collected by the security scan and proposes cost-effective improvements if called for.
Network Penetration Testing Consulting
Stealth intrusion checking is a key part of any serious network security strategy. Progentís security professionals can run thorough intrusion checks without the awareness of your company's in-house IT resources. Stealth penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event history monitoring are properly configured and consistently monitored. Find out additional information on Progent's network penetration analysis consulting.
Firewall and Virtual Private Network Expertise
Progent's background in security technology includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and VPN Support Services
Cisco's network security and remote access products provide a comprehensive line of manageable security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company goals. Learn additional information concerning Progent's Support Services for Cisco Security and VPN Products.
Engineering Services for Other Firewall and VPN Solutions
Progent offers small and medium size companies expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate products from multiple suppliers to support your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based machine learning technology to defend endpoints as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely get by legacy signature-based AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to address the entire threat lifecycle including protection, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies incorporated within a single agent managed from a unified control. Progent's data protection and virtualization experts can help you to design and configure a ProSight ESP deployment that addresses your company's unique requirements and that helps you achieve and demonstrate compliance with government and industry data security standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent attention. Progent can also assist you to install and verify a backup and restore solution like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup processes and enables fast restoration of vital files, apps and VMs that have become lost or damaged due to hardware failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to configure ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading data security vendors to provide web-based management and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper level of inspection for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting solution without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect data related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT documentation, you can save up to 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Every business ought to have a thoroughly considered security program that incorporates both pre-attack procedures and response plans. The proactive plan is a collection of steps intended to minimize vulnerabilities. The reactive strategy assists your company's network security engineers to evaluate the impact resulting from an attack, fix the network, record the experience, and get the IT network restored as quickly as possible.
Progent's certified IS security consultants can to assist your business to perform a complete vulnerability assessment and create a company-wide security plan to implement security processes and controls to minimize future attacks and dangers.
CISM Qualified Network Security Consulting Services
The CISM committee describes the core capabilities and international standards of performance that information security managers are required to master. It provides executive management the assurance that consultants who have earned their CISM credential have the experience and capability to deliver efficient security management and support services. Progent offers the expertise of CISM Premier security professionals to assist companies with:
Read more details about Progent's CISM Qualified Network Security Support Professionals.
- Network Security Strategies
- Risk Analysis
- IS Security Implementation Management
- Network Security Management
- Recovery Planning
CISSP Accredited Security Consulting Support
The CISSP credential denotes expertise with a worldwide standard for network security. ANSI has granted certification accreditation in the field of data security stipulated by ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields such as:
Read more details about Progent's CISSP-certified Security Consulting Expertise.
- Security Management Practices
- Security Infrastructure and Models
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have been awarded ISSAP status through rigorous examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most complex demands of IS security architecture bounded by the broader scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-premier security specialists can help your business with all aspects of architecture security such as.
Learn additional details concerning Progent's ISSAP Accredited Secure Network Architecture Support Expertise.
- Access Management Mechanisms and Methodologies
- Phone System and Network Infrastructure Protection
- Cryptography Solutions
- Requirements Evaluation and Security Standards
- Business Continuity Planning (BCP) and DRP
- Site Security
CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that represents mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates pass a comprehensive examination given by the ISACA international professional association. Progent's CISA-certified information security audit engineers can help your company in the areas of:
Get additional details concerning Progent's CISA Qualified Information System Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Enforcement
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Safeguarding Information Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's ability to design, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and execute a business continuity plan that follows industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation specialists can provide a variety of risk assessment services such as:
Learn additional details about Progent's CRISC Risk Management Consultants.
- Collect data and study documentation to identify major risk scenarios
- Identify legal, industry, and contractual mandates and organizational standards related to your network to assess their potential influence on your business objectives
- Point out potential vulnerabilities for your operational processes to assist in evaluating your corporate risk
- Develop a risk awareness program and conduct training to make sure your stakeholders appreciate IT risk so they can contribute to your risk control program
- Match key risk vectors to related business procedures to help determine risk responsibility
- Validate risk appetite with your senior management and key stakeholders to make sure they are in agreement
GIAC Qualified Information System Security Consulting Support
Learn additional details concerning Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security experts. GIAC's mission is to assure that an accredited professional has the skills appropriate to deliver support in vital categories of system, information, and software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC IS security audit experts can assist your business with:
Talk to a Security Engineer
To see how you can contact a certified security engineer for online or on-premises assistance in West Virginia, phone 1-800-993-9400 or go to Remote Computer Help.