Company computer networks in the state of West Virginia now have quick and economical online access to Progent's certified security support specialists to assist with complex security problems. Rates are affordable, billing is by the minute, engagement is immediate, and support is unbeatable. Progent also provides help for complex projects that requires the expertise of senior security engineers with high-level industry certifications.
If your West Virginia business is situated some distance from major urban areas such as Charleston, Huntington, Morgantown, or Parkersburg, contact with local certified security engineers could be problematic when you have an emergency. This could mean lost income for your business, angry customers, unproductive workers, and distracted management. By calling Progent, you have access to a Premier security engineer ready to provide assistance whenever you have to have it to get your network operating and recover your data.
Progent can assist you at any level in your efforts to protect your IT environment with services that can range from network security checks to creating a company-wide security plan. Progent provides affordable support to help businesses of all sizes to set up and maintain safe networks powered by Windows and Cisco products and that may include computers running UNIX or Linux operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to deliver centralized control and comprehensive security for all your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local gateway can also enable Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall.
Progent's certified experts are available online or in person to provide a variety of urgent or longer-term network security services such as:
If your business has an emergency requirement for computer security help, refer to Progent's Urgent Remote Technical Help.
- Run automated network security audits
- Clean up quickly after virus and worm attacks
- Set up effective firewalls
- Configure secure techniques for remote and mobile access
- Deploy advanced utilities for automatic defense against viruses, spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 network monitoring
- Offer outsourced Call Center Services
- Help Develop an effective network backup and business continuity solution centered on Data Protection Manager backup capability
Progent's engineers offer world-class services in vital facets of network security including analysis, firewall and VPN expertise, and advanced security consulting.
Progent's expert security consultants can evaluate the strength of your existing computer protection environment by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in this service saves you money and assures an accurate portrayal of weaknesses. The information your company gains can make up the foundation of a security plan that can permit your network to run safely and react quickly to new risks.
Automated Network Security Analysis
Progent provides consulting in the use of security evaluation utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically running a set of programmed network auditing scans to uncover possible security holes. Progent has extensive knowledge of other security analysis utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.
Progent can show you how to design protection into your business operations, install scanning tools, plan and implement a protected system architecture, and suggest procedures to optimize the safety of your network. Progent's security professionals are able to assist you to configure a firewall, design safe remote access to email and business applications, and install VPN. Find out more concerning Progent's network security evaluation.
Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory service packages designed to enable small companies to get an impartial security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your network from beyond your company firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from a secure computer inside your firewall to uncover vulnerabilities to internal attacks. The two security inventory services are set up and executed from a secured remote location. The process is directed by an engineer with top security accreditations and who produces a report that details and analyzes the data captured by the scan and proposes cost-effective improvements where called for.
Stealth Penetration Testing Consulting
Stealth intrusion testing is a key component of any successful network security plan. Progentís security professionals can perform thorough intrusion tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking shows whether existing security defense tools such as intrusion detection alerts and event log analysis are correctly configured and consistently checked. Learn additional information on Progent's stealth penetration analysis consulting.
Progent's background in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned key networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, optimize, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and remote access products offer a comprehensive range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and CCNP certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Find out more information about Progent's Support Services for Cisco Security Solutions and VPN Products.
Support Services for Additional Firewall and VPN Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as Check Point Software, Juniper, and SonicWall. Progent can help you design a detailed security strategy and select the right technologies from a variety of suppliers to support your security goals while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior analysis tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the entire threat progression including blocking, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows VSS and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer economical in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, device management, and web filtering via cutting-edge technologies incorporated within one agent managed from a single control. Progent's data protection and virtualization consultants can help you to design and implement a ProSight ESP environment that meets your company's specific needs and that helps you demonstrate compliance with legal and industry information protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for urgent attention. Progent's consultants can also help your company to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates your backup processes and allows rapid recovery of vital data, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your business-critical information. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security vendors to deliver centralized management and world-class security for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the apps. Because the system is virtualized, it can be ported easily to a different hosting solution without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and safeguard data about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as half of time thrown away looking for vital information about your network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Every company should have a carefully considered security strategy that incorporates both proactive procedures and reaction plans. The pre-attack plan is a collection of steps designed to minimize vulnerabilities. The post-attack plan helps your security engineers to assess the impact resulting from a security penetration, repair the system, document the event, and get business functions running as quickly as possible.
Progent's certified IT security engineers are available to assist your company to run a full risk evaluation and define a network security plan to establish security policies and controls to minimize ongoing assaults and threats.
CISM Accredited System Security Consulting Assistance
The CISM organization describes the basic capabilities and international standards of skill that IT security professionals are expected to learn. It gives business management the confidence that those who have qualified for their CISM credential have the background and capability to deliver effective security management and consulting consulting. Progent offers the services of CISM Certified security professionals to assist companies with:
Learn additional information concerning Progent's CISM Qualified Information Security Support Expertise.
- Information Security Strategies
- Vulnerability Analysis
- IS Security Program Management
- IS Security Management
- Response Management
CISSP Certified Security Consulting Support
CISSP recognizes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information protection defined by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your company in a variety security areas such as:
Find out more information about Progent's CISSP Qualified Cybersecurity Support Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Control Systems and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Technology
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier information system architecture professionals are experts who have been awarded ISSAP status through rigorous examination and significant experience with information security architecture. The ISSAP certification represents proven mastery in the most challenging requirements of information system security architecture bounded by the broader scope of information security expertise required for CISSP certification. Progent's ISSAP-premier security experts can help your business with all aspects of secure network architecture including.
Find out additional details concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Professionals.
- Access Control Mechanisms and Methodologies
- Phone System and System Infrastructure Security
- Cryptography Options
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that represents expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive test administered by the ISACA international professional group. Progent's CISA-qualified security audit consultants are available to help your business in the areas of:
Read additional details concerning Progent's CISA Accredited Security Auditing Consulting Services.
- Information Systems Audit Services
- Information Technology Administration
- Systems and Architecture Lifecycle Planning
- IT Support
- Safeguarding Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to verify a consultant's ability to plan, implement, and maintain information system controls to reduce network risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk management specialists offer a range of risk assessment services including:
Get additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and study documentation to identify major vulnerabilities
- Identify statutory, regulatory, and business mandates and organizational policies related to your information system to assess their possible influence on your business objectives
- Point out potential threats for your operational processes to assist in evaluating your corporate risk
- Create a risk awareness initiative and conduct training to make sure your stakeholders appreciate IS risk so they can assist with your risk management program
- Match identified risk scenarios to your associated operational processes to help determine risk ownership
- Determine risk tolerance with executive leadership and key stakeholders to ensure they match
GIAC Certified Security Engineering Assistance
Learn additional information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security professionals. GIAC's goal is to make sure that an accredited professional has the skills appropriate to provide support in important categories of network, data, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC security audit experts are available to help your IT organization in the areas of:
Contact a Certified Progent Security Expert
To find out how to contact a security consultant for remote or onsite expertise in West Virginia, phone 1-800-993-9400 or go to Online Computer Help.