Small business information networks in Illinois can now get quick and affordable remote help from Progent's accredited security experts to help with critical security problems. Rates are competitive, billing is per minute, engagement is immediate, and service is unbeatable. Progent also provides assistance for complex engagements that requires the services of seasoned security consultants with top industry credentials.
If your Illinois small business is situated some distance from larger metropolitan areas such as Chicago, Aurora, Rockford, or Naperville, support from nearby qualified network security consultants may be problematic when there's an urgent situation. This can cause a loss of income for your business, upset clients, idle employees, and distracted management. By calling Progent's online services, you can get in touch with a qualified security engineer ready to offer help when you require it to keep your system on line and salvage your information.
Progent can assist you at any level in your efforts to protect your IT environment with support services ranging from security assessments to creating a company-wide security plan. Progent offers economical support to help businesses of all sizes to configure and maintain secure IT environments based on Windows and Cisco products and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a further level of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Exchange Server to track and protect internal email traffic that stays within your security perimeter.
Progent's certified consultants are accessible remotely or on premises to provide a variety of emergency or project-based computer security services such as:
If your network has an urgent need for IT security help, refer to Progent's Emergency Online Technical Help.
Progent's security experts can deliver advanced support in vital areas of computer security including security evaluation, firewalls and VPN, and advanced security consulting.
Progent's expert security engineers can assess the effectiveness of your existing network protection environment through comprehensive remote automated testing based on sophisticated utilities and tested techniques. Progent's experience in this service saves your company consulting fees and offers a detailed portrayal of security holes. The knowledge your company is provided can form the basis of a network protection strategy that can permit your information system to operate safely and react rapidly to future threats.
Automated Vulnerability Assessment
Progent provides consulting in the use of security analysis software such as MBSA and LANguard from GFI for affordably running a set of automatic network testing scans to uncover potential security problems. Progent has extensive knowledge of additional network auditing tools including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.
Progent can help you build security into your company operations, install scanning applications, plan and deploy a protected system environment, and suggest procedures to maximize the safety of your IT system. Progent's security engineers are available to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn more concerning Progent's automated security analysis.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to enable small companies to get an impartial security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your network from outside your company firewall to determine possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine within your company firewall to uncover your exposure to inside threats. Both security inventory packages are set up and executed from a protected external location. The process is directed by an engineer who has earned high-level security accreditations and who produces a report that details and interprets the information collected by the security scan and proposes practical remediation if called for.
Network Intrusion Testing Consulting
Stealth penetration checking is an important part of any successful network security plan. Progent’s security professionals can run extensive penetration tests without the awareness of your company's in-house IT resources. Unannounced penetration testing uncovers whether existing security monitoring systems such as intrusion detection alerts and event history analysis are correctly configured and actively checked. Find out more about Progent's stealth security penetration analysis support services.
Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes extensive familiarity with leading firewalls and Virtual Private Network technology offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
Progent's Flat-rate Managed Services for Information Assurance
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and VPN Support Services
Cisco's security and offsite access technology represent a full line of manageable security products to help protect your local and remote information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Learn more details concerning Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate technologies from a variety of suppliers to support your security goals while sticking within your budget restraints.
Progent's low-cost ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Certified Security Consulting
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-based anti-virus tools. ProSight ASM protects local and cloud resources and provides a unified platform to automate the entire malware attack lifecycle including protection, detection, containment, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer economical in-depth protection for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge technologies packaged within one agent accessible from a single control. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP environment that meets your company's specific needs and that helps you demonstrate compliance with government and industry information security standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent can also assist your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and allows rapid restoration of critical files, applications and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading information security companies to deliver centralized control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can save up to half of time wasted searching for vital information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you’re making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Any company should develop a thoroughly considered security program that includes both preventive procedures and response planning. The proactive strategy is a collection of mechanisms designed to reduce security weaknesses. The post-attack plan assists your company's network security engineers to evaluate the damage resulting from an attack, repair the system, document the experience, and get business functions restored as soon as possible.
Progent's expert IS security engineers can to assist your business to run a full risk assessment and create a network security strategy to implement security policies and mechanisms to mitigate ongoing assaults and threats.
CISM Qualified Security Support Assistance
The CISM committee defines the basic competencies and worldwide standards of performance that IT security professionals are expected to master. It gives executive management the assurance that consultants who have qualified for their CISM certification have the experience and capability to provide efficient security administration and support consulting. Progent can provide the expertise of CISM qualified security consultants to assist companies with:
Learn additional information about Progent's CISM Qualified Security Consulting Services.
- Information Security Processes
- Risk Analysis
- Information Security Program Management
- IS Security Administration
- Recovery Management
CISSP Accredited Security Engineering Expertise
CISSP certification recognizes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information security under ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a variety security fields such as:
Read more information concerning Progent's CISSP Accredited Cybersecurity Consulting Expertise.
- Security Management Procedures
- Security Architecture and Models
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Network Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified information system architecture professionals are consultants who have earned ISSAP status as a result of thorough testing and significant work with network security architecture. The ISSAP credential indicates proven competence in the most in-depth requirements of information security architecture within the broader scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your company with all aspects of secure network architecture such as.
Read additional information about Progent's ISSAP Certified Secure System Architecture Support Expertise.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Cryptography Options
- Requirements Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Network Security Auditing Consulting Services
The CISA accreditation is a globally recognized qualification that signifies mastery in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants pass an extensive test administered by the ISACA international professional association. Progent's CISA-qualified network security audit engineers are available to assist your business in the areas of:
Learn more details concerning Progent's CISA Certified Security Auditing Consulting Expertise.
- IS Audit Process
- IT Enforcement
- Network Assets and Infrastructure Lifecycle
- IT Service Delivery
- Safeguarding Data Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and maintain information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and execute a workplace continuity plan based on industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation experts can provide a variety of risk evaluation services including:
Learn additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to evaluate major risk scenarios
- Identify statutory, regulatory, and business mandates and organizational policies associated with your information system to determine their potential influence on your business objectives
- Point out potential threats for your business workflows to assist in evaluating your enterprise risk
- Create a risk awareness program and provide training to make sure your stakeholders appreciate IT risk so they can contribute to your risk control program
- Connect identified risk scenarios to your associated operational processes to help assign risk ownership
- Determine risk tolerance with executive management and major stakeholders to ensure they match
GIAC Qualified Security Consulting Support
Learn more information concerning Progent's GIAC Information Assurance Expertise.
GIAC was founded in 1999 to validate the knowledge of network security experts. GIAC's mission is to ensure that an accredited security consultant has the skills necessary to provide services in critical areas of system, data, and application security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC security audit specialists can assist your IT organization in the areas of:
Talk to a Security Engineer
To see how to access a security engineer for remote or on-premises assistance in Illinois, call 1-800-993-9400 or visit Online Computer Support.