Business information networks in the state of Maryland can have fast and economical remote technical support from Progent's qualified network security engineers to resolve complex security issues. Rates are affordable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also provides help for long-term engagements that demand the services of senior security engineers with high-level industry credentials.
If your Maryland office is situated outside of larger urban neighborhoods including Baltimore, Columbia, Silver Spring, or Dundalk, the availability of local certified security support specialists is often limited during a crisis. This could mean lost income for your company, upset clients, idle employees, and distracted executives. By calling Progent's online services, you can get in touch with a qualified security engineer who can offer help whenever you have to have it to keep your system running and salvage your information.
Progent can assist you in your efforts to protect your information system with support services ranging from security audits to developing a company-wide security strategy. Progent provides affordable service to help businesses of all sizes to configure and manage secure IT environments powered by Windows and Cisco technology and that can include computers running UNIX or Linux operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security companies to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also enable Exchange Server to track and protect internal email that stays within your security perimeter.
Progent's security experts are accessible online or in person to offer a range of emergency or longer-term computer security services including:
If your network has an immediate need for computer security help, refer to Progent's Emergency Online Technical Help.
- Run thorough security evaluations
- Recover rapidly after attacks
- Configure hardware and software firewalls
- Implement safe solutions for remote and mobile access
- Install advanced utilities for defense against viruses, spam and directory harvest attacks
- Develop a company-wide security strategy with proactive security monitoring
- Offer comprehensive Help Desk Support
- Develop a practical network backup and disaster recovery strategy centered on Data Protection Manager (DPM) backup capability
Progent's support professionals offer advanced services in vital facets of network protection that include analysis, firewall and VPN expertise, and advanced security consulting.
System Security Evaluation
Progent's certified security engineers can evaluate the vulnerability of your existing network security systems through comprehensive remote automated analysis via advanced software tools and tested procedures. Progent's experience in this service saves you money and assures an accurate portrayal of gaps. The knowledge your company is provided can form the foundation of a network protection strategy that can allow your information system to run safely and respond rapidly to new threats.
Automated Network Security Evaluation
Progent offers consulting in the use of security auditing products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically running a set of programmed system auditing scans to identify potential security weaknesses. Progent has broad experience with other security analysis utilities including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like SolarWinds, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.
Progent can help you design security into your business processes, configure scanning applications, define and implement a protected network architecture, and suggest policies to optimize the security of your network. Progent's security consultants are available to show you how to set up a firewall, design secure remote connectivity to email and data, and install virtual private network. Learn additional information on Progent's network security assessment.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to enable small businesses to get an objective security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, a security engineer runs an extensive examination of your network from outside your company firewall to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from a secure machine inside your company firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are set up and run from a protected external location. The project is managed by a consultant who has earned top security accreditations and who generates a report that details and interprets the information captured by the security scan and proposes cost-effective improvements where called for.
Stealth Security Penetration Analysis Support Services
Stealth penetration testing is a key part of any comprehensive IT system security strategy. Progentís security professionals can perform thorough penetration checks without the knowledge of your company's in-house IT staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident alerts and event history analysis are correctly set up and consistently monitored. Learn additional information concerning Progent's stealth penetration testing consulting.
Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security technology includes in-depth familiarity with major firewalls and VPN technology from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants with important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite connection products offer a full line of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Learn more details concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.
Engineering Services for Other Firewall and VPN Solutions
Progent offers small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and choose the right products from multiple suppliers to achieve your security objectives while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to defend endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to manage the complete malware attack lifecycle including filtering, identification, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge technologies packaged within one agent managed from a unified control. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your organization's unique needs and that allows you demonstrate compliance with government and industry information protection standards. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require urgent action. Progent's consultants can also assist you to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup activities and enables rapid restoration of vital files, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top information security companies to provide web-based control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further layer of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT documentation, you can save up to 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Design
Every business ought to develop a thoroughly considered security strategy that incorporates both pre-attack procedures and response planning. The pre-attack strategy is a set of steps intended to minimize vulnerabilities. The reactive plan assists your security engineers to assess the impact resulting from a security penetration, repair the damage, record the event, and get business functions running as quickly as possible.
Progent's certified IS security engineers are available to assist your business to run a complete vulnerability evaluation and create a network security strategy to establish security processes and mechanisms to reduce ongoing assaults and dangers.
CISM Certified Network Security Consulting Services
The CISM committee describes the basic competencies and international standards of skill that information security managers are required to learn. CISM provides business management the confidence that consultants who have earned their CISM credential have the experience and knowledge to deliver efficient security management and support consulting. Progent offers the services of CISM qualified security professionals to help companies with:
Read more details concerning Progent's CISM Information Security Support Expertise.
- Network Security Processes
- Vulnerability Management
- IS Security Implementation Management
- Information Security Administration
- Response Planning
CISSP Accredited Security Consulting Assistance
CISSP denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a variety security areas such as:
Learn additional information concerning Progent's CISSP Accredited Cybersecurity Support Services.
- Security Administration Practices
- Security Architecture and Models
- Access Control Systems and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecom, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure System Architecture Engineering Services
Progent's CISSP-ISSAP qualified system architecture engineers are experts who have been awarded ISSAP status through thorough testing and significant experience with network security design. The ISSAP credential represents demonstrated skill in the most complex requirements of information system security architecture within the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.
Find out additional information concerning Progent's ISSAP Certified Secure IT Architecture Support Expertise.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Cryptography Solutions
- Needs Evaluation and Security Standards
- Business Continuity Planning and DRP
- Site Security
CISA Certified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that represents expertise in IS security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates pass an extensive examination administered by the ISACA international professional group. Progent's CISA-qualified IS security audit experts are available to help your IT organization in the areas of:
Read the details concerning Progent's CISA Accredited IS Security Auditing Engineering Services.
- Information Systems Audit Services
- Information Technology Administration
- Systems and Architecture Lifecycle Planning
- IT Service Delivery
- Protecting Data Assets
- Disaster Recovery Preparedness
The CRISC program was initiated by ISACA to validate an IT professional's skills to plan, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to develop and execute a business continuity plan based on industry best practices identified by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's CRISC IT risk mitigation experts can provide a variety of risk identification services such as:
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to identify major vulnerabilities
- Identify legal, industry, and contractual mandates and organizational standards related to your information system to determine their potential influence on your business goals
- Point out possible vulnerabilities for your business workflows to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct training to ensure your stakeholders understand information system risk so they can contribute to your risk control process
- Match key risk scenarios to your associated business procedures to help assign risk ownership
- Validate risk appetite with your senior management and major stakeholders to ensure they are in agreement
GIAC Qualified IS Security Engineering Services
GIAC was established in 1999 to certify the skill of network security experts. GIAC's goal is to verify that a certified security consultant possesses the knowledge needed to deliver support in vital areas of system, information, and application security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. NSA. Progent's GIAC-qualified network security audit specialists are available to assist your business with:
Read additional details about Progent's GIAC Information Assurance Support.
- Auditing IT Infrastructure
- Incident Handling
- Intrusion Detection
- Web Services Security
- SIEM solutions
Talk to a Certified Security Expert
To see how to access a certified security engineer for online or on-premises assistance in Maryland, phone 1-800-993-9400 or visit Remote Computer Help.
© 2002-2019 Progent Corporation. All rights reserved.