Company information networks in the state of Wisconsin can have quick and affordable online help from Progent's certified security engineers to fix complex security problems. Rates are competitive, billing is by the minute, sign-up is immediate, and service is world class. Progent also provides assistance for complex engagements that demand the expertise of seasoned security engineers with top security certifications.

If your Wisconsin small business is based outside of larger urban areas including Milwaukee, Madison, Green Bay, or Kenosha, the availability of nearby accredited network security engineers is often limited when you have a security disaster. This can result in a loss of productivity for your company, angry customers, idle employees, and distracted management. By contacting Progent's remote support, you have access to a Premier security engineer ready to provide assistance when you need it to get your computer network operating and recover your data.

Progent can help you in a variety of ways in your efforts to guard your network with services that can range from network security audits to creating a company-wide security plan. Progent provides economical service to assist businesses of all sizes to configure and manage secure IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to provide web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and encryption. The onsite security gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security consultants are available remotely or on premises to offer a range of emergency or project-based network security services including:

  • Perform automated security audits
  • Recover promptly after virus and worm attacks
  • Configure hardware and software firewalls
  • Implement safe methods for remote and mobile connectivity
  • Install effective applications for automatic defense against spam and directory harvest attacks
  • Help create a comprehensive security strategy with proactive security monitoring
  • Provide outsourced Help Desk Services
  • Develop a practical data backup and restore strategy centered on Data Protection Manager automated backup capability
If your business has an immediate need for computer security help, go to Progent's Urgent Remote Network Help.

Progent's consultants provide advanced support in vital facets of computer security including security assessment, firewalls and VPN, and high-level security consulting.

System Audits
Progent's expert security consultants can assess the effectiveness of your existing computer protection implementation by performing exhaustive remote automated analysis via sophisticated utilities and proven techniques. Progent's experience in administering this service saves you consulting fees and offers a detailed portrayal of weaknesses. The knowledge your business is provided can make up the basis of a network protection strategy that will allow your network to run dependably and adapt rapidly to new threats.

Automated Network Vulnerability Analysis
Progent offers expertise in the use of security analysis software including MBSA and LANguard from GFI for economically running a variety of programmed system testing checks to identify possible security vulnerabilities. Progent has extensive knowledge of other network auditing tools including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to build protection into your business processes, install scanning software, define and deploy a secure system environment, and recommend policies to maximize the safety of your IT system. Progent's security engineers are able to help you set up a firewall, implement secure remote connectivity to email and business applications, and install VPN. Find out more about Progent's network security evaluation.

Security Inventory Scanning Bundles for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles designed to enable small companies to get an objective security assessment from an accredited security expert. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from a secure computer inside your company firewall to determine vulnerabilities to inside attacks. Both security inventory packages are set up and run from a secured remote site. The project is directed by a consultant with high-level security credentials and who produces a report that summarizes and interprets the information collected by the security scan and suggests practical remediation where appropriate.

Network Intrusion Testing Support Services
Stealth penetration checking is a key part of any comprehensive IT system security plan. Progentís security experts can run thorough penetration checks without the knowledge of your company's in-house IT staff. Stealth penetration testing uncovers whether existing security defense systems such as intrusion incident alerts and event log analysis are properly configured and consistently monitored. Learn additional information concerning Progent's stealth penetration testing consulting.

Firewall and Virtual Private Network Support
Progent's background in network security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with key networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Consulting Services
Cisco's security and remote access products represent a complete range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced engineers with Cisco's CCIE and CCNP certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company objectives. Find out additional details about Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Support Services for Additional Firewall and VPN Technology
Progent offers small and mid-size companies expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can help you create a comprehensive security strategy and choose the right products from a variety of vendors to achieve your security goals while staying within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to automate the entire malware attack progression including filtering, identification, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single control. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP environment that meets your organization's unique needs and that helps you demonstrate compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also help your company to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables fast recovery of critical files, apps and virtual machines that have become unavailable or damaged due to component failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to deliver web-based control and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper level of analysis for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can save as much as half of time wasted looking for vital information about your network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Security Planning
Every company should have a thoroughly considered security program that incorporates both proactive processes and reaction plans. The pre-attack strategy is a collection of procedures intended to reduce security weaknesses. The post-attack plan helps your IT security engineers to assess the impact caused by an attack, repair the damage, record the event, and get the IT network running as soon as feasible.

Progent's expert IS security consultants are available to help you to perform a comprehensive vulnerability evaluation and define a network security plan to establish security processes and mechanisms to mitigate ongoing assaults and threats.

CISM Accredited System Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of skill that information security managers are expected to learn. It provides business management the assurance that those who have qualified for their CISM credential possess the experience and capability to deliver effective security administration and consulting services. Progent offers the services of CISM Premier security consultants to help companies with:

  • IS Security Processes
  • Risk Management
  • Information Security Implementation Management
  • Network Security Administration
  • Recovery Management
Learn more details about Progent's CISM Accredited Information Security Consulting Professionals.

CISSP Accredited Security Consulting Expertise
CISSP denotes mastery of an international standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of data security defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
Learn additional details concerning Progent's CISSP-certified Cybersecurity Consulting Professionals.

CISSP-ISSAP Certified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have earned ISSAP Certification through rigorous testing and extensive experience with information security architecture. The ISSAP certification indicates proven mastery in the more challenging demands of information system security architecture within the wider scope of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Security
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Hardware Security
Learn more information concerning Progent's ISSAP Qualified Secure Network Architecture Support Professionals.

CISA Accredited Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that signifies expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA credential has consultants undergo an extensive examination administered by the ISACA international professional group. Progent's CISA security audit engineers are available to help your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Systems and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Read additional details concerning Progent's CISA Qualified Information System Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to verify an IT professional's skills to plan, deploy, and support IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and carry out a business continuity plan that follows industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management engineers offer a range of risk identification services such as:

  • Gather information and study documentation to help identify significant vulnerabilities
  • Identify legal, industry, and business requirements and organizational policies related to your network to determine their potential influence on your business goals
  • Identify possible threats for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide training to ensure your stakeholders appreciate IS risk so they can contribute to your risk control process
  • Match identified risk scenarios to related operational procedures to help assign risk responsibility
  • Determine risk appetite with your senior management and major stakeholders to ensure they align
Learn more information concerning Progent's CRISC Risk Management Experts.

GIAC Certified Network Security Engineering Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to assure that a certified security consultant has the knowledge necessary to provide support in important categories of network, data, and application program security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit experts are available to help your IT organization in the areas of:

Find out more information about Progent's GIAC Information Assurance Support.

Contact a Progent Security Expert
To learn how you can get in touch with a Progent security consultant for online or onsite assistance in Wisconsin, phone 1-800-993-9400 or go to Online Network Support.