Small business computer networks in the state of Iowa can now get fast and affordable online access to Progent's qualified security consultants to help with the toughest security problems. Rates are affordable, charges are per minute, engagement is immediate, and service is world class. Progent also offers assistance for complex projects that demand the expertise of senior security consultants with high-level security credentials.
In case your Iowa organization is located some distance from major urban areas such as Des Moines, Cedar Rapids, Davenport, or Sioux City, access to local certified security experts may be limited during an urgent situation. This could mean lost income for your business, upset clients, unproductive employees, and distracted management. By contacting Progent's remote support, you have access to a qualified security consultant who can provide assistance when you have to have it to keep your information system on line and restore your information.
Progent can assist you at any level in your efforts to protect your information system with support that ranges from network security audits to creating a company-wide security strategy. Progent offers affordable service to help small and midsize companies to design and manage safe IT environments based on Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple handhelds or Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of top information security companies to provide web-based management and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a further level of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall.
Progent's certified consultants are available online or in person to provide a variety of emergency or project-based computer security services including:
If your company has an immediate need for computer security help, go to Progent's Urgent Remote Technical Support.
Progent's support professionals can deliver advanced support in key areas of computer protection that include security assessment, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can evaluate the strength of your current computer security environment by performing exhaustive remote automated analysis via advanced software tools and tested procedures. Progent's skill in administering this service saves your company time and money and assures an objective portrayal of security holes. The information your IT organization is provided can make up the basis of a network protection strategy that will permit your network to run safely and adapt rapidly to future threats.
Automated Network Vulnerability Audits
Progent offers consulting in the use of security analysis software such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a set of programmed network testing scans to identify possible security problems. Progent has broad experience with additional security auditing products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can help you design protection into your company processes, configure auditing software, define and implement a protected network architecture, and recommend policies to maximize the safety of your network. Progent's security professionals are able to help you set up a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Find out more concerning Progent's network security analysis.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to allow small companies to get a professional network security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your network from beyond your firewalled perimeter to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from a secure computer within your company firewall to determine vulnerabilities to internal threats. Both security inventory packages are set up and run from a secured remote location. The process is directed by an engineer with top security accreditations and who generates a document that details and interprets the data collected by the scan and proposes cost-effective remediation where called for.
Network Penetration Analysis Support Services
Stealth penetration checking is an important component of any comprehensive IT system security plan. Progent’s security professionals can run thorough penetration tests without the knowledge of your company's in-house network support resources. Stealth penetration testing shows whether current security monitoring tools such as intrusion detection warnings and event log monitoring are correctly set up and consistently monitored. Learn additional information concerning Progent's network penetration testing support services.
Progent's background in security technology includes in-depth field work with leading firewalls and Virtual Private Network products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with key networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your existing PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Security and VPN Engineering Expertise
Cisco's network security and offsite access products provide a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and CCNP qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Learn more details about Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Products.
Support Services for Additional Firewall and VPN Solutions
Progent offers small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and select the right products from multiple vendors to achieve your security goals while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to defend endpoints as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily escape legacy signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to address the entire threat progression including blocking, identification, containment, remediation, and forensics. Key features include one-click rollback with Windows VSS and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge technologies incorporated within one agent managed from a single control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that meets your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent's consultants can also help you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. Available at a low monthly price, ProSight DPS automates and monitors your backup activities and allows rapid restoration of critical files, apps and VMs that have become unavailable or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced support to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading information security vendors to deliver centralized management and comprehensive security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By updating and managing your IT documentation, you can eliminate up to half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether you’re planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more details about ProSight IT Asset Management service.
Expert Security Design
Any business ought to develop a thoroughly thought out security program that incorporates both proactive processes and response planning. The proactive plan is a set of steps intended to minimize vulnerabilities. The post-attack strategy helps your company's IT security engineers to evaluate the damage caused by a security penetration, fix the system, document the experience, and get the IT network restored as quickly as feasible.
Progent's certified IT security engineers are available to help your business to run a complete vulnerability assessment and create a computer security plan to implement security processes and controls to minimize future assaults and dangers.
CISM Accredited Security Support Services
The CISM committee describes the basic competencies and international standards of performance that IT security managers are expected to master. It provides executive management the confidence that those who have qualified for their CISM certification possess the background and knowledge to provide efficient security management and consulting services. Progent can provide the services of CISM qualified security professionals to help businesses with:
Learn more details about Progent's CISM Accredited Security Engineering Professionals.
- Information Security Processes
- Vulnerability Analysis
- Information Security Implementation Management
- Network Security Administration
- Recovery Management
CISSP Certified Security Consulting Support
CISSP denotes mastery of an international standard for data security. ANSI has awarded certification accreditation in the area of data protection under ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas such as:
Learn additional information about Progent's CISSP-certified Information Security Consulting Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Management Systems and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP qualified network architecture engineers are experts who have earned ISSAP status as a result of rigorous examination and significant work with information security design. The ISSAP certification indicates proven competence in the more complex demands of information system security architecture bounded by the wider scope of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all phases of architecture security including.
Find out more information about Progent's ISSAP Accredited Secure Information System Architecture Consulting Professionals.
- Access Control Mechanisms and Methodologies
- Phone System and System Infrastructure Security
- Cryptography Solutions
- Requirements Analysis and Security Standards
- BCP and Disaster Recovery Planning
- Physical Security
CISA Accredited Information System Security Auditing Consulting Support
The CISA credential is a prestigious qualification that signifies expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test given by the ISACA professional association. Progent's CISA IS security audit experts can help your IT organization with:
Read the details about Progent's CISA Qualified Information System Security Auditing Consulting Services.
- Information Systems Audit Process
- Information Technology Enforcement
- Network Assets and Infrastructure Lifecycle
- IT Support
- Protecting Data Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's ability to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and execute a workplace continuity strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation consultants offer a range of risk identification services such as:
Read the details about Progent's CRISC Risk Management Experts.
- Collect data and review documentation to identify major risk scenarios
- Identify statutory, regulatory, and contractual requirements and organizational standards associated with your information system to assess their potential influence on your strategic goals
- Identify possible threats for your business processes to assist in evaluating your enterprise risk
- Create a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk control process
- Connect key risk scenarios to related operational processes to help assign risk responsibility
- Determine risk tolerance with executive leadership and key stakeholders to make sure they are in agreement
GIAC Accredited Network Security Consulting Expertise
Find out more details concerning Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was established in 1999 to certify the knowledge of computer security experts. GIAC's goal is to ensure that an accredited professional possesses the skills necessary to provide support in critical areas of system, information, and program security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC-certified network security audit specialists are available to assist your business with:
Contact a Progent Security Specialist
To see how to get in touch with a certified security engineer for remote or onsite assistance in Iowa, phone 1-800-993-9400 or visit Online Computer Help.