Small business information networks inWest Virginiacan now get quick and economical online help from Progent's certified security support specialists to help with urgent security problems. Rates are reasonable, billing is per minute, sign-up is quick, and service is unbeatable. Progent also provides assistance for complex engagements that requires the services of seasoned security consultants with top industry certifications.
In case yourWest Virginianetwork is away from larger metropolitan areas likeCharleston, Huntington, Morgantown, or Parkersburg, contact with nearby accredited security professionals is often problematic when there's a crisis. This could mean a drop in productivity for your company, upset clients, idle employees, and distracted management. By utilizing Progent, you have access to a Premier security consultant who can deliver expertise whenever you need it to keep your computer network on line and recover your data.
Progent can assist you in your initiatives to protect your IT environment with services that can range from security assessments to developing a company-wide security strategy. Progent provides affordable service to assist companies of any size to configure and maintain protected IT environments powered by Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to provide centralized management and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter acts as a first line of defense and keeps most threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.
Progent's security professionals are accessible remotely or in person to offer a variety of emergency or longer-term IT security services which include:
If your business has an emergency need for IT security help, go to Progent's Urgent Online Technical Support.
Progent's engineers provide world-class support in key areas of network security that include security evaluation, firewalls and VPN, and advanced security consulting.
System Security Evaluation
Progent's expert security consultants can assess the vulnerability of your current network protection environment by performing exhaustive remote automated analysis via advanced utilities and tested techniques. Progent's experience in administering this testing saves you money and assures a detailed picture of security holes. The information your business gains can make up the foundation of a network protection plan that will allow your information system to run dependably and respond quickly to future threats.
Automated Network Vulnerability Analysis
Progent offers consulting in the use of security evaluation products such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a variety of programmed system testing checks to uncover possible security holes. Progent has extensive experience with other network auditing tools such as NMAP Port Scanner, AMAP, eEye, plus tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.
Progent can help you build security into your business operations, configure scanning tools, plan and deploy a secure network architecture, and recommend procedures to optimize the security of your network. Progent's security professionals are available to help you configure a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's network security evaluation.
Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to allow small companies to receive an impartial security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from outside your firewall to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer runs a system scan from an authorized machine within your firewall to evaluate your exposure to inside attacks. Both security inventory packages are set up and executed from a protected external location. The project is directed by an engineer who has earned high-level security credentials and who produces a document that details and analyzes the data captured by the security scan and suggests cost-effective remediation if appropriate.
Stealth Intrusion Testing Consulting
Stealth intrusion checking is an important part of any comprehensive IT system security strategy. Progentís security experts can perform extensive intrusion checks without the knowledge of your organization's internal network support staff. Stealth penetration checking shows whether existing security defense tools such as intrusion detection warnings and event history monitoring are correctly configured and actively checked. Find out additional information concerning Progent's network penetration testing consulting.
Firewalls and VPN Solutions
Progent's expertise in network security solutions includes extensive field work with major firewalls and VPN products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Support Services
Cisco's security and remote access products represent a full range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Read more information concerning Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.
Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies such as WatchGuard, Juniper, and SonicWall. Progent can show you how to design a detailed security plan and choose the right products from a variety of suppliers to support your security objectives while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior machine learning technology to defend endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely evade legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the complete threat lifecycle including filtering, detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools incorporated within a single agent managed from a single console. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with legal and industry information protection standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent's consultants can also assist you to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates your backup activities and enables fast restoration of vital files, apps and virtual machines that have become lost or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can provide advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical information. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top data security vendors to provide web-based management and comprehensive protection for all your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hosting solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and protect data about your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned about upcoming expirations of SSLs or warranties. By cleaning up and managing your IT documentation, you can save as much as half of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Design
Every company should have a carefully thought out security strategy that includes both pre-attack processes and response plans. The proactive strategy is a collection of procedures that help to minimize vulnerabilities. The reactive strategy helps your company's IT security personnel to assess the impact caused by an attack, repair the network, document the experience, and get the IT network running as rapidly as possible.
Progent's certified IT security consultants are available to assist your company to perform a comprehensive risk evaluation and define a computer security strategy to implement security policies and controls to reduce future assaults and threats.
CISM Qualified System Security Engineering Services
The Certified Information Security Manager (CISM) organization defines the core capabilities and worldwide standards of skill that IT security managers are expected to master. It gives executive management the confidence that those who have earned their CISM credential have the background and knowledge to deliver effective security management and support consulting. Progent can provide the services of CISM Premier security professionals to assist businesses with:
Find out additional information concerning Progent's CISM Accredited Network Security Consulting Expertise.
- Information Security Governance
- Vulnerability Management
- IS Security Implementation Management
- IS Security Administration
- Recovery Management
CISSP Qualified Security Consulting Assistance
CISSP certification denotes expertise with a worldwide standard for data security. ANSI has granted certification accreditation in the field of information security stipulated by ISO 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:
Read more information concerning Progent's CISSP Qualified Security Consulting Services.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecom, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure Network Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified network architecture professionals are experts who have earned ISSAP status through rigorous testing and significant work with network security design. The ISSAP certification indicates proven competence in the more complex requirements of information security architecture within the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your business with all aspects of architecture security such as.
Learn additional details concerning Progent's ISSAP Certified Secure Network Architecture Consulting Professionals.
- Access Management Mechanisms and Techniques
- Telecommunications and System Infrastructure Protection
- Encryption/Decryption Options
- Requirements Analysis and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Network Security Auditing Consulting Assistance
The CISA credential is a prestigious qualification that signifies mastery in IS security auditing. Certified by the American National Standards Institute, the CISA credential has candidates pass a comprehensive examination given by the ISACA professional group. Progent's CISA information security audit consultants can help your IT organization with:
Read the details about Progent's CISA Certified IS Security Auditing Engineering Assistance.
- Information Systems Audit Services
- Information Technology Governance
- Systems and Infrastructure Lifecycle Planning
- Information Technology Support
- Safeguarding Information Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to validate a consultant's skills to plan, deploy, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and execute a workplace continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management engineers can provide a range of risk evaluation services such as:
Get additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and review documentation to help identify major risk scenarios
- Identify statutory, regulatory, and business requirements and organizational standards associated with your network to assess their possible influence on your strategic objectives
- Identify possible threats for your business processes to assist in analyzing your enterprise risk
- Develop a risk awareness program and provide training to ensure your organization appreciate IT risk so they can contribute to your risk management program
- Match identified risk scenarios to related business procedures to help determine risk ownership
- Determine risk tolerance with your senior leadership and key stakeholders to make sure they are in agreement
GIAC Certified Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security engineers. GIAC's mission is to ensure that an accredited security consultant has the skills needed to deliver support in key categories of system, data, and application software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the U.S. NSA. Progent's GIAC-certified network security audit experts are available to help your IT organization in the areas of:
Read more details about Progent's GIAC Information Assurance Support.
- Assessing IT Infrastructure
- Incident Response
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Get in Touch with a Progent Security Specialist
To learn how you can contact a certified security engineer for remote or onsite expertise in West Virginia, phone 1-800-993-9400 or go to Online Network Support.