Small business information networks in the state of Maine now have prompt and affordable remote help from Progent's qualified security consultants to help with complex security issues. Rates are affordable, billing is per minute, sign-up is quick, and service is world class. Progent also provides help for complex engagements that demand the knowledge of seasoned security engineers with top industry certifications.
If your Maine network is based outside of more populated metropolitan areas such as Portland, Lewiston, or Bangor, contact with nearby qualified network security experts is often limited during an emergency. This could mean a loss of productivity for your company, angry clients, unproductive workers, and distracted management. By utilizing Progent's online services, you have access to a certified security engineer ready to offer assistance when you need it to get your system running and restore your information.
Progent can help you in a variety of ways in your initiatives to protect your network with support services that can range from security audits to creating a company-wide security strategy. Progent provides economical service to help companies of any size to configure and manage secure networks based on Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top information security companies to provide centralized control and comprehensive security for all your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.
Progent's certified experts are available remotely or in person to offer a variety of urgent or longer-term IT security services which include:
If your company has an urgent requirement for IT security help, go to Progent's Emergency Remote Technical Help.
- Perform thorough security audits
- Recuperate promptly after virus and worm attacks
- Set up hardware and software firewalls
- Implement secure methods for offsite and mobile connectivity
- Install advanced solutions for automatic protection against spam and directory harvest attacks
- Develop a company-wide security plan with proactive monitoring
- Provide comprehensive Call Center Services
- Create an effective network backup and disaster recovery plan based on Microsoft DPM backup technology
Progent's security experts provide advanced support in key facets of network protection that include security evaluation, firewall and VPN solutions, and high-level security planning.
System Security Evaluation
Progent's expert security engineers can evaluate the strength of your current network protection implementation by performing exhaustive remote automated testing based on advanced software tools and tested techniques. Progent's skill in administering this testing saves you time and money and offers an accurate picture of security holes. The information your business gains can be used as the basis of a network protection plan that can permit your information system to operate dependably and react rapidly to new threats.
Automated Vulnerability Analysis
Progent provides consulting in the use of security evaluation products including Microsoft Baseline Security Analyzer and LANguard from GFI for economically running a variety of programmed system testing checks to uncover potential security problems. Progent has extensive experience with other network analysis products including NMAP, AMAP application mapper, eEye, plus tools like SolarWinds, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.
Progent can show you how to build protection into your business operations, install scanning software, define and implement a secure system environment, and suggest procedures to maximize the security of your IT system. Progent's security consultants are ready to assist you to set up a firewall, implement safe remote access to email and business applications, and integrate virtual private network. Learn more on Progent's network security analysis.
Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages designed to enable small businesses to receive a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, an engineer administers a comprehensive test of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from a secure machine within your firewall to evaluate the risk to inside threats. Both security inventory services are set up and executed from a protected external site. The project is directed by an engineer with top security credentials and who generates a report that summarizes and analyzes the data captured by the scan and proposes practical remediation if called for.
Network Intrusion Testing Consulting
Stealth penetration checking is an important part of any successful network security plan. Progent’s security experts can perform thorough penetration checks without the knowledge of your company's in-house IT staff. Unannounced penetration testing shows whether current security monitoring systems such as intrusion incident warnings and event log monitoring are correctly set up and actively checked. Learn additional information about Progent's stealth security penetration testing consulting.
Progent's expertise in network security solutions encompasses extensive familiarity with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, optimize, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower Services integration and debugging services.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and remote connection technology provide a full range of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Read additional information about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security companies including Check Point Software, Juniper, and Symantec. Progent can help you design a detailed security strategy and select the right products from a variety of vendors to achieve your security goals while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior machine learning tools to guard endpoint devices and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely escape traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the complete threat progression including blocking, infiltration detection, mitigation, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies incorporated within a single agent managed from a single control. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you prove compliance with legal and industry information security regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent can also assist you to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates and monitors your backup activities and enables rapid recovery of vital data, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can assist you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading information security companies to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hardware environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect information related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can save up to half of time spent searching for vital information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether you’re making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Design
Every company ought to develop a carefully considered security strategy that incorporates both proactive procedures and reaction plans. The pre-attack strategy is a collection of mechanisms designed to reduce vulnerabilities. The reactive strategy assists your company's network security engineers to assess the impact caused by a security penetration, repair the system, document the event, and get business functions restored as rapidly as feasible.
Progent's expert IT security engineers can to help you to run a complete vulnerability evaluation and define a network security plan to implement security policies and mechanisms to reduce ongoing assaults and threats.
CISM Accredited Network Security Engineering Assistance
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of skill that information security professionals are expected to master. It gives business management the assurance that consultants who have earned their CISM certification have the background and knowledge to deliver effective security management and consulting consulting. Progent offers the services of CISM qualified security consultants to help companies with:
Learn more information concerning Progent's CISM IS Security Engineering Services.
- IS Security Strategies
- Vulnerability Management
- IS Security Program Management
- IS Security Management
- Response Planning
CISSP Certified Security Consulting Assistance
The CISSP credential recognizes expertise with an international standard for information security. ANSI has awarded certification accreditation in the field of data protection defined by ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security areas such as:
Read more details about Progent's CISSP Accredited Network Security Support Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Systems and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's CISSP-ISSAP qualified IT architecture engineers are consultants who have earned ISSAP Certification as a result of rigorous examination and extensive experience with information security architecture. The ISSAP credential represents demonstrated mastery in the most challenging requirements of information system security architecture within the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security including.
Learn additional details concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Expertise.
- Access Management Systems and Techniques
- Phone System and Network Protection
- Data Encryption Solutions
- Needs Analysis and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Hardware Security
CISA Certified IS Security Auditing Engineering Expertise
The CISA credential is an important qualification that indicates mastery in network security auditing. Certified by ANSI, the CISA credential requires that consultants pass a comprehensive examination given by the ISACA professional group. Progent's CISA-certified IS security audit experts can help your IT organization in the areas of:
Find out more details concerning Progent's CISA Certified Network Security Auditing Engineering Expertise.
- IS Audit Services
- IT Enforcement
- Network Assets and Architecture Lifecycle Planning
- IT Support
- Protecting Information Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's ability to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to develop and carry out a business continuity strategy that follows leading practices identified by CRISC and crafted to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management engineers offer a range of risk assessment services such as:
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and review documentation to identify major vulnerabilities
- Inventory statutory, regulatory, and contractual mandates and company policies related to your information system to determine their potential influence on your business objectives
- Identify possible threats for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness program and provide seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk management program
- Match key risk vectors to your associated business processes to help determine risk responsibility
- Validate risk appetite with executive leadership and key stakeholders to make sure they are in agreement
GIAC Qualified Information System Security Engineering Services
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to make sure that an accredited security consultant possesses the skills appropriate to deliver services in critical categories of system, data, and application program security. GIAC certifications are recognized by companies and government organizations all over the world including and the United States NSA. Progent's GIAC IS security audit consultants are available to assist your IT organization in the areas of:
Read additional details about Progent's GIAC Information Assurance Services.
- Auditing Perimeters
- Incident Handling
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Get in Touch with a Certified Progent Security Expert
To learn how you can contact a certified security consultant for remote or on-premises expertise in Maine, call 1-800-993-9400 or visit Online Computer Help.