Business networks in Illinois can now get fast and economical online access to Progent's accredited security engineers to assist with urgent security issues. The cost is competitive, billing is by the minute, sign-up is immediate, and support is world class. Progent also offers assistance for complex engagements that requires the expertise of senior security consultants with top industry credentials.
If your Illinois small business is based outside of more populated urban areas like Chicago, Aurora, Rockford, or Naperville, help from nearby accredited security consultants is often problematic when you have an emergency. This can cause lost productivity for your business, angry clients, idle employees, and distracted management. By calling Progent's online services, you can get in touch with a certified security professional ready to deliver assistance when you need it to keep your information system running and salvage your data.
Progent can assist you in all your initiatives to defend your network with support ranging from network security audits to creating a comprehensive security strategy. Progent provides affordable service to help companies of any size to design and maintain safe IT environments powered by Windows and Cisco products and that can include computers running UNIX or Linux operating systems plus mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security vendors to provide centralized management and comprehensive protection for all your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a deeper level of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter.
Progent's security experts are available online or in person to offer a variety of urgent or longer-term computer security services such as:
If your business has an immediate need for computer security help, refer to Progent's Emergency Online Technical Support.
- Run extensive security evaluations
- Recuperate quickly after serious security breaches
- Install firewalls from multiple vendors
- Implement safe methods for offsite and mobile access
- Deploy effective applications for defense against spam and directory harvest attacks
- Develop a comprehensive security plan with 24x7 security monitoring
- Provide outsourced Help Desk Call Center Services
- Develop an effective backup and recovery strategy based on Microsoft DPM backup/restore capability
Progent's engineers can deliver world-class support in vital fields of network security including security evaluation, firewall/VPN support, and advanced security consulting.
System Security Audits
Progent's certified security consultants can assess the vulnerability of your current network security environment through comprehensive remote automated analysis via sophisticated utilities and proven procedures. Progent's skill in administering this service saves your company money and offers a detailed portrayal of system vulnerability. The knowledge your company gains can form the basis of a security strategy that can allow your network to run dependably and adapt quickly to new threats.
Automated Security Evaluation
Progent offers expertise in the application of security auditing packages including Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a set of programmed network auditing checks to uncover potential security holes. Progent has extensive experience with additional security analysis utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.
Progent can show you how to design protection into your business operations, configure scanning tools, plan and deploy a protected system environment, and recommend procedures to maximize the safety of your network. Progent's security professionals are able to help you set up a firewall, design safe remote connectivity to email and business applications, and integrate VPN. Find out more concerning Progent's automated security analysis.
Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to enable small businesses to receive a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive test of your network from beyond your firewall to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a network scan from a secure machine inside your company firewall to uncover vulnerabilities to internal assaults. The two security inventory services are configured and run from a protected external location. The project is directed by a consultant with top security credentials and who generates a report that summarizes and interprets the data collected by the scan and suggests cost-effective remediation where called for.
Stealth Intrusion Analysis Support Services
Stealth intrusion checking is an important component of any serious network security plan. Progent’s security experts can perform thorough penetration tests without the awareness of your company's internal IT resources. Unannounced penetration checking shows whether current security defense systems such as intrusion incident warnings and event history monitoring are correctly set up and actively monitored. Find out more about Progent's network penetration testing support services.
Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants with key networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower Services integration and troubleshooting support.
Cisco Network Security and VPN Engineering Expertise
Cisco's security and remote access products offer a complete line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and CCNP qualifications who are able to help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Learn additional information about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security strategy and choose appropriate products from multiple vendors to achieve your security objectives while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based machine learning tools to defend endpoint devices and physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily evade traditional signature-based AV products. ProSight ASM protects on-premises and cloud resources and provides a single platform to manage the entire threat lifecycle including blocking, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable in-depth protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools incorporated within one agent managed from a unified control. Progent's data protection and virtualization experts can help you to design and implement a ProSight ESP deployment that meets your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data security standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for immediate attention. Progent can also assist you to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates your backup processes and allows rapid recovery of critical files, applications and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security companies to provide web-based management and world-class security for your email traffic. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further layer of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hosting environment without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard data related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and managing your network documentation, you can eliminate as much as 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether you’re making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Certified Network Security Design
Every business should have a carefully thought out security strategy that incorporates both pre-attack procedures and response planning. The proactive strategy is a collection of steps designed to reduce security weaknesses. The reactive strategy assists your company's security engineers to assess the impact caused by a security penetration, fix the network, record the experience, and get business functions restored as quickly as feasible.
Progent's expert IT security engineers are available to assist you to run a complete vulnerability assessment and create a company-wide security strategy to implement security processes and mechanisms to mitigate ongoing assaults and threats.
CISM Certified Network Security Support Services
The CISM organization defines the core capabilities and worldwide standards of performance that information security professionals are required to master. CISM gives executive management the confidence that those who have qualified for their CISM certification have the experience and capability to deliver efficient security administration and support services. Progent offers the support of CISM certified security professionals to assist businesses with:
Learn additional information concerning Progent's CISM Accredited Network Security Engineering Professionals.
- IS Security Governance
- Risk Analysis
- IS Security Implementation Management
- IS Security Management
- Recovery Planning
CISSP Certified Security Engineering Assistance
CISSP certification recognizes mastery of a worldwide standard for network security. ANSI has awarded certification accreditation in the area of data protection defined by ISO 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas including:
Learn more details concerning Progent's CISSP Accredited Security Support Expertise.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecom, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Services
Progent's CISSP-ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP status through rigorous testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the more in-depth demands of information system security architecture within the broader scope of IS security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security including.
Find out additional details concerning Progent's ISSAP Certified Secure System Architecture Engineering Services.
- Access Control Systems and Methodologies
- Phone System and System Infrastructure Protection
- Cryptography Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Physical Security
CISA Accredited Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is an important qualification that represents mastery in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants pass a comprehensive examination given by the ISACA professional association. Progent's CISA security audit consultants are available to assist your company in the areas of:
Learn the details about Progent's CISA Accredited Security Auditing Consulting Support.
- Information Systems Audit Services
- Information Technology Administration
- Systems and Architecture Lifecycle Planning
- IT Support
- Protecting Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's skills to design, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a business continuity strategy based on industry best practices identified by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation specialists can provide a range of risk assessment services including:
Get the details concerning Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to identify major risk scenarios
- Identify statutory, industry, and contractual mandates and company standards related to your information system to determine their potential influence on your strategic goals
- Identify potential vulnerabilities for your operational workflows to help in evaluating your enterprise risk
- Develop a risk awareness program and conduct training to make sure your stakeholders appreciate IT risk so they can assist with your risk management process
- Match key risk vectors to your associated business processes to help assign risk ownership
- Determine risk tolerance with executive leadership and major stakeholders to ensure they are in agreement
GIAC Certified Information System Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of computer security professionals. GIAC's goal is to verify that an accredited security consultant possesses the knowledge necessary to provide services in important areas of system, data, and software security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified information security audit engineers can assist your company with:
Learn more details about Progent's GIAC Information Assurance Expertise.
- Assessing Security Systems
- Incident Handling
- Traffic Analysis
- Web Application Security
- SIEM solutions
Talk to a Certified Security Engineer
To find out how you can contact a Progent security engineer for remote or on-premises support in Illinois, phone 1-800-993-9400 or visit Remote Computer Support.