Small business networks in the state of Indiana now have quick and affordable remote help from Progent's qualified security professionals to fix urgent security issues. The cost is competitive, charges are per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex engagements that requires the knowledge of seasoned security consultants with top security certifications.
In case your Indiana network is based some distance from larger urban areas including Fort Wayne, Gary, Evansville, or South Bend, help from local certified security professionals may be limited during an emergency. This can cause lost revenue for your business, upset clients, idle employees, and defocused management. By utilizing Progent, you can get in touch with a qualified security professional ready to provide assistance whenever you require it to keep your computer network running and restore your information.
Progent can assist you in your initiatives to defend your information system with support services ranging from security audits to developing a comprehensive security strategy. Progent offers affordable support to help companies of any size to set up and manage secure networks powered by Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security companies to deliver web-based management and world-class protection for your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. ProSight Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further level of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also enable Microsoft Exchange Server to track and protect internal email that stays within your security perimeter.
Progent's security experts are accessible remotely or in person to offer a range of emergency or project-based network security services such as:
If your company has an immediate need for computer security help, refer to Progent's Urgent Online Network Help.
Progent's engineers can deliver advanced support in vital facets of system protection including auditing, firewall and VPN solutions, and high-level security consulting.
System Security Evaluation
Progent's certified security consultants can assess the effectiveness of your existing network security environment by performing exhaustive remote automated analysis via advanced utilities and tested techniques. Progent's skill in this testing saves your company time and money and offers an accurate picture of gaps. The knowledge your IT organization is provided can make up the basis of a security strategy that will allow your information system to operate safely and respond rapidly to new risks.
Automated Vulnerability Audits
Progent provides consulting in the application of security testing utilities such as Microsoft's MBSA and LANguard from GFI for affordably running a set of programmed network testing checks to identify potential security weaknesses. Progent has broad experience with additional security analysis products such as NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can show you how to build protection into your company processes, configure scanning tools, define and deploy a secure system architecture, and recommend policies to optimize the security of your network. Progent's security engineers are able to assist you to set up a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Find out additional information about Progent's network security assessment.
Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory and evaluation bundles intended to enable small businesses to receive an independent security evaluation from an accredited security engineer. With Progent's External Network Security Inventory Checkup, an engineer runs an extensive examination of your IT infrastructure from outside your company firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from a secure computer inside your company firewall to assess vulnerabilities to internal threats. Both security inventory services are set up and run from a protected external site. The process is managed by an engineer who has earned high-level security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and suggests cost-effective improvements where appropriate.
Network Penetration Testing Support Services
Stealth penetration testing is a key part of any successful network security plan. Progent’s security professionals can perform extensive penetration checks without the knowledge of your company's internal network support resources. Unannounced penetration checking shows whether current security defense systems such as intrusion incident warnings and event log monitoring are properly configured and actively monitored. Learn more on Progent's network security penetration testing consulting.
Progent's expertise in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers with important networking certifications including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower integration and debugging services.
Cisco Security and Virtual Private Network Consulting Services
Cisco's security and offsite connection products represent a full line of manageable security solutions to help protect your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's CCIE and CCNP qualifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Learn additional details concerning Progent's Engineering Services for Cisco Security and VPN Appliances.
Consulting Services for Other Firewall and VPN Solutions
Progent provides small and medium size businesses professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and select the right products from a variety of suppliers to achieve your security objectives while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete threat lifecycle including protection, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP deployment that meets your company's unique requirements and that helps you demonstrate compliance with government and industry information protection standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent's consultants can also assist your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup processes and allows rapid restoration of critical files, apps and virtual machines that have become lost or damaged due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images/, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of top information security companies to provide centralized control and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a further layer of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your network documentation, you can eliminate as much as half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether you’re making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need the instant you need it. Learn more details about ProSight IT Asset Management service.
Certified Network Security Design
Any company ought to develop a carefully considered security strategy that incorporates both preventive procedures and reaction planning. The pre-attack plan is a set of steps that help to minimize security weaknesses. The reactive strategy helps your company's IT security personnel to evaluate the damage resulting from a security penetration, fix the network, document the experience, and get business functions restored as rapidly as feasible.
Progent's certified information security engineers can to help your business to perform a full risk evaluation and define a computer security plan to implement security policies and controls to reduce future attacks and threats.
CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the core competencies and international standards of performance that information security managers are required to learn. It gives executive management the assurance that consultants who have qualified for their CISM credential have the background and knowledge to deliver effective security administration and consulting consulting. Progent can provide the services of CISM qualified security consultants to assist companies with:
Learn more information concerning Progent's CISM Certified Information Security Engineering Services.
- Information Security Governance
- Risk Management
- IS Security Program Management
- Information Security Management
- Recovery Planning
CISSP Certified Security Consulting Support
CISSP denotes expertise with a global standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data protection stipulated by ISO 17024. Progent can provide access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a broad range of security areas such as:
Learn additional information concerning Progent's CISSP Network Security Consulting Expertise.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's CISSP-ISSAP certified network architecture professionals are consultants who have been awarded ISSAP Certification through rigorous examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more complex requirements of information system security architecture bounded by the broader scope of IS security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture such as.
Find out additional details about Progent's ISSAP Accredited Secure Network Architecture Engineering Professionals.
- Access Control Mechanisms and Techniques
- Telecommunications and System Infrastructure Security
- Cryptography Solutions
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning and DRP
- Site Security
CISA Qualified Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a prestigious qualification that signifies expertise in network security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive test administered by the ISACA international professional group. Progent's CISA-certified IS security audit specialists can assist your IT organization in the areas of:
Find out more information about Progent's CISA Accredited Security Auditing Consulting Assistance.
- IS Audit Services
- IT Administration
- Network Assets and Infrastructure Planned Useful Life
- IT Support
- Safeguarding Data Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify an IT professional's ability to plan, implement, and support information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk management specialists offer a variety of risk identification services such as:
Learn more information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and review documentation to identify significant risk scenarios
- Identify legal, regulatory, and business requirements and organizational policies associated with your network to assess their possible impact on your business objectives
- Point out possible vulnerabilities for your business workflows to help in analyzing your corporate risk
- Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate IT risk so they can contribute to your risk management process
- Match identified risk vectors to your associated operational processes to help assign risk responsibility
- Validate risk appetite with your senior management and key stakeholders to make sure they are in agreement
GIAC Qualified Security Engineering Support
Learn more information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of information technology security professionals. GIAC's mission is to make sure that a certified professional possesses the knowledge necessary to deliver support in critical categories of system, data, and application software security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit engineers can assist your company in the areas of:
Contact a Certified Security Expert
To see how you can contact a security consultant for remote or on-premises assistance in Indiana, call 1-800-993-9400 or go to Online Network Support.