Small business information networks in West Virginia now have prompt and economical online help from Progent's qualified network security experts to help with urgent security issues. Rates are affordable, billing is by the minute, engagement is immediate, and service is world class. Progent also provides assistance for long-term projects that requires the expertise of senior security consultants with high-level industry credentials.
In case your West Virginia office is situated away from larger urban areas like Charleston, Huntington, Morgantown, or Parkersburg, the availability of local qualified network security support specialists may be problematic during an urgent situation. This can result in a drop in income for your business, angry customers, idle employees, and defocused management. By contacting Progent, you have access to a Certified security consultant who can provide help when you require it to get your system on line and restore your information.
Progent can help you in your efforts to protect your network with services that ranges from network security assessments to developing a comprehensive security plan. Progent provides affordable support to assist businesses of all sizes to set up and maintain protected IT environments based on Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top data security companies to deliver web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a deeper level of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to track and safeguard internal email that originates and ends within your security perimeter.
Progent's certified consultants are available remotely or on premises to offer a range of emergency or longer-term computer security services such as:
If your business has an immediate need for IT security help, refer to Progent's Emergency Remote Network Help.
- Run extensive security evaluations
- Recover quickly after virus and worm attacks
- Configure hardware and software firewalls
- Configure secure methods for offsite and mobile access
- Install effective applications for defense against spam and directory harvest attacks
- Help create a comprehensive security plan with 24x7 monitoring
- Offer comprehensive Call Center Support
- Create an effective network backup and restore solution centered on System Center Data Protection Manager automated backup technology
Progent's engineers provide advanced services in vital areas of system protection that include auditing, firewalls and VPN, and high-level security consulting.
Progent's expert security consultants can assess the strength of your existing computer security environment by performing exhaustive remote automated analysis based on sophisticated utilities and proven techniques. Progent's skill in this service saves your company consulting fees and offers an accurate picture of weaknesses. The knowledge your company is provided can make up the foundation of a security plan that can permit your information system to run safely and react rapidly to future threats.
Automated Network Vulnerability Analysis
Progent provides expertise in the use of security analysis packages including MBSA and GFI LANguard Network Security Scanner for affordably performing a set of automatic system auditing checks to identify possible security weaknesses. Progent has broad experience with additional security analysis tools such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can show you how to build security into your company operations, install scanning tools, define and implement a secure system environment, and recommend policies to maximize the safety of your network. Progent's security professionals are available to help you set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out additional information on Progent's network security analysis.
Security Inventory Scanning Packages for Small Companies
Progent has put together two low-cost security inventory packages intended to enable small businesses to receive an independent network security assessment from an accredited security consultant. With Progent's External Network Security Inventory Scan, an engineer administers an extensive test of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from an authorized machine within your firewall to assess your exposure to internal threats. The two security inventory services are configured and run from a protected remote location. The process is directed by a consultant who has earned high-level security credentials and who produces a document that summarizes and analyzes the information collected by the scan and suggests cost-effective improvements if called for.
Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any serious IT system security plan. Progentís security experts can run thorough intrusion tests without the awareness of your company's in-house IT resources. Stealth penetration checking shows whether current security defense systems such as intrusion incident warnings and event history monitoring are properly configured and consistently monitored. Learn additional information concerning Progent's stealth penetration analysis support services.
Firewall and Virtual Private Network Support
Progent's background in network security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important networking certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and remote access products offer a complete range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business objectives. Read more information about Progent's Consulting Expertise for Cisco Security and VPN Appliances.
Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose the right products from multiple vendors to achieve your security objectives while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based analysis technology to guard endpoints as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-based AV products. ProSight ASM safeguards local and cloud-based resources and provides a unified platform to automate the complete threat lifecycle including filtering, detection, mitigation, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services deliver affordable in-depth protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering through cutting-edge tools incorporated within a single agent accessible from a single console. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that addresses your organization's unique needs and that helps you demonstrate compliance with legal and industry data security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require urgent action. Progent can also assist you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of vital data, apps and VMs that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading data security vendors to deliver centralized control and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email that stays within your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be moved easily to a different hardware environment without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSLs or domains. By cleaning up and managing your IT infrastructure documentation, you can save up to half of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre making enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Expert Network Security Planning
Any business should have a carefully considered security strategy that includes both preventive procedures and reaction planning. The pre-attack strategy is a collection of mechanisms that help to minimize security weaknesses. The post-attack plan assists your network security engineers to assess the impact resulting from a security penetration, repair the damage, document the event, and get business functions running as quickly as feasible.
Progent's certified IS security engineers are available to help your company to perform a full risk assessment and define a computer security strategy to establish security processes and controls to reduce future attacks and dangers.
CISM Accredited Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of skill that information security professionals are expected to learn. CISM gives business management the confidence that consultants who have earned their CISM certification possess the background and knowledge to deliver effective security management and support services. Progent can provide the services of CISM Premier security professionals to assist businesses with:
Learn more details concerning Progent's CISM Qualified Information Security Support Services.
- Network Security Strategies
- Vulnerability Analysis
- IS Security Program Management
- Network Security Administration
- Recovery Management
CISSP Certified Security Consulting Support
CISSP certification denotes expertise with a worldwide standard for data security. The American National Standards Institute has granted the CISSP credential recognition in the area of information protection stipulated by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security areas including:
Find out additional information concerning Progent's CISSP-certified Security Support Professionals.
- Security Administration Practices
- Security Infrastructure and Models
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure Network Architecture Engineering Expertise
Progent's CISSP-ISSAP Certified system architecture engineers are experts who have been awarded ISSAP status through thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the most complex requirements of IS security architecture within the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-premier security experts can assist your company with all aspects of secure network architecture such as.
Learn additional information about Progent's ISSAP Qualified Secure IT Architecture Support Professionals.
- Access Management Mechanisms and Methodologies
- Telecommunications and Network Security
- Cryptography Options
- Needs Analysis and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified IS Security Auditing Engineering Support
The CISA accreditation is a globally recognized qualification that signifies expertise in information system security auditing. Certified by ANSI, the CISA credential requires that candidates pass an extensive examination given by the ISACA professional group. Progent's CISA-certified network security audit engineers can help your business in the areas of:
Learn additional information concerning Progent's CISA Accredited Information System Security Auditing Consulting Assistance.
- Information Systems Audit Services
- Information Technology Administration
- Network Assets and Architecture Lifecycle
- Information Technology Service Delivery
- Protecting Data Assets
- Business Continuity Preparedness
The CRISC certification program was established by ISACA to verify a consultant's skills to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity strategy based on leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists can provide a variety of risk assessment services including:
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to identify significant risk scenarios
- Inventory statutory, regulatory, and business mandates and organizational standards related to your information system to determine their potential influence on your strategic objectives
- Point out potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
- Develop a risk awareness program and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk management program
- Match identified risk scenarios to related business procedures to help determine risk responsibility
- Validate risk appetite with executive management and major stakeholders to make sure they are in agreement
GIAC Certified Information System Security Consulting Services
Find out more details about Progent's GIAC Information Assurance Expertise.
GIAC was founded in 1999 to validate the knowledge of computer security professionals. GIAC's mission is to verify that an accredited professional has the skills appropriate to deliver services in key areas of system, information, and application security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified IS security audit consultants are available to assist your IT organization with:
Get in Touch with a Certified Security Specialist
To learn how to access a certified security engineer for remote or on-premises expertise in West Virginia, call 1-800-993-9400 or go to Remote Network Help.