Small business IT networks in Massachusetts can depend on prompt and affordable online technical support from Progent's accredited network security professionals to assist with critical security problems. The cost is affordable, charges are per minute, engagement is fast, and service is unbeatable. Progent also provides help for long-term projects that requires the expertise of senior security consultants with high-level industry certifications.
If your Massachusetts office is based away from more populated urban areas including Boston, Worcester, Springfield, Lowell, or Cambridge, help from nearby certified security experts could be problematic when there's a crisis. This could mean lost income for your company, angry clients, unproductive employees, and distracted management. By contacting Progent's online services, you have access to a qualified security consultant ready to deliver help when you need it to get your computer network on line and salvage your data.
Progent can help you in a variety of ways in your efforts to defend your IT environment with support services that ranges from security checks to developing a comprehensive security plan. Progent provides affordable service to assist businesses of all sizes to configure and manage safe networks based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Android or Windows Phone devices.
Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security companies to deliver web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a further level of analysis for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.
Progent's certified professionals are available online or on premises to provide a range of urgent or project-based computer security services such as:
If your network has an emergency requirement for IT security support, refer to Progent's Emergency Remote Network Support.
- Run thorough security audits
- Clean up quickly after virus and worm attacks
- Install and troubleshoot firewalls
- Configure secure methods for offsite and mobile connectivity
- Install effective solutions for automatic defense against viruses, spam and DHAs
- Help create a comprehensive security plan with 24x7 network monitoring
- Offer comprehensive Call Center Support
- Develop a practical network backup and business continuity plan centered on Data Protection Manager backup capability
Progent's engineers provide advanced support in vital fields of computer security that include security evaluation, firewall and VPN expertise, and advanced security consulting.
Progent's expert security consultants can assess the strength of your current computer protection systems by performing exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's skill in administering this testing saves you money and assures a detailed picture of gaps. The knowledge your company is provided can make up the basis of a network protection plan that can permit your information system to run safely and react quickly to future risks.
Automated Network Vulnerability Evaluation
Progent offers expertise in the use of security testing utilities such as MBSA and GFI LANguard Network Security Scanner for economically running a set of automatic network testing scans to uncover potential security holes. Progent has extensive knowledge of additional network auditing tools such as NMAP Port Scanner, AMAP, eEye, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.
Progent can show you how to build security into your business operations, configure scanning applications, define and implement a protected system architecture, and suggest procedures to optimize the security of your IT system. Progent's security consultants are ready to assist you to configure a firewall, implement secure remote connectivity to email and data, and install VPN. Learn additional information about Progent's network security evaluation.
Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory service packages intended to enable small companies to get a professional network security evaluation from a qualified security specialist. With Progent's External Security Inventory Scan, a security expert administers an extensive examination of your network from beyond your firewalled perimeter to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from a secure machine inside your company firewall to determine your exposure to inside threats. The two security inventory packages are set up and run from a secured external location. The project is managed by an engineer with top security credentials and who produces a report that summarizes and interprets the information collected by the security scan and suggests practical improvements where appropriate.
Stealth Intrusion Testing Consulting
Stealth intrusion testing is an important component of any serious IT system security plan. Progentís security experts can run extensive penetration checks without the awareness of your organization's internal IT resources. Stealth penetration checking shows whether current security defense systems such as intrusion incident alerts and event log analysis are properly configured and consistently monitored. Learn additional information about Progent's stealth security penetration analysis support services.
Progent's background in security solutions includes extensive familiarity with major firewalls and Virtual Private Network (VPN) technology from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned important industry accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower configuration and debugging support.
Cisco Security and VPN Support Expertise
Cisco's network security and remote connection products provide a comprehensive line of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company goals. Learn more details concerning Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.
Consulting Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security plan and select the right products from multiple suppliers to achieve your security objectives while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis technology to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the entire threat progression including filtering, infiltration detection, containment, remediation, and post-attack forensics. Key features include one-click rollback with Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver economical multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device control, and web filtering through leading-edge tools packaged within one agent managed from a single console. Progent's security and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that meets your organization's unique requirements and that allows you demonstrate compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require urgent action. Progent's consultants can also assist your company to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical data, apps and virtual machines that have become unavailable or damaged as a result of component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical data. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top information security vendors to provide web-based control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises gateway device adds a deeper layer of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Since the system is virtualized, it can be ported easily to a different hosting solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard data about your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save up to 50% of time spent looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Any company ought to develop a thoroughly considered security program that includes both proactive procedures and reaction planning. The pre-attack strategy is a collection of procedures intended to minimize security weaknesses. The post-attack plan helps your company's IT security personnel to evaluate the damage caused by an attack, repair the damage, document the event, and get business functions running as soon as feasible.
Progent's expert information security consultants can to help your company to perform a full vulnerability evaluation and define a network security plan to establish security processes and controls to minimize ongoing attacks and dangers.
CISM Qualified Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and global standards of performance that information security professionals are expected to master. It provides executive management the assurance that consultants who have qualified for their CISM certification possess the background and capability to deliver effective security management and support services. Progent offers the services of CISM qualified security consultants to help companies with:
Find out additional details concerning Progent's CISM Certified Network Security Consulting Services.
- IS Security Processes
- Vulnerability Analysis
- Information Security Implementation Management
- IS Security Management
- Recovery Planning
CISSP Accredited Security Consulting Services
The CISSP credential denotes expertise with a global standard for information security. ANSI has awarded certification recognition in the area of information protection defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security fields such as:
Find out more details about Progent's CISSP Network Security Support Professionals.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Technology
- Telecom, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP certified system architecture professionals are consultants who have earned ISSAP status as a result of thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the most in-depth demands of IS security architecture bounded by the wider field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture including.
Learn additional information about Progent's ISSAP Qualified Secure Information System Architecture Consulting Expertise.
- Access Control Mechanisms and Methodologies
- Telecom and Network Security
- Cryptography Options
- Needs Analysis and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is an important qualification that signifies expertise in network security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive examination administered by the ISACA international professional group. Progent's CISA-qualified security audit consultants can assist your company with:
Learn additional information concerning Progent's CISA Certified Network Security Auditing Engineering Services.
- Information Systems Audit Services
- Information Technology Administration
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Service Delivery
- Protecting Information Assets
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to plan, implement, and support information system control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to assist you to create and execute a workplace continuity strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts can provide a range of risk identification services including:
Find out the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and study documentation to evaluate major vulnerabilities
- Identify legal, industry, and contractual requirements and organizational standards associated with your information system to determine their potential influence on your business goals
- Identify possible threats for your business processes to help in evaluating your corporate risk
- Develop a risk awareness program and provide training to ensure your organization appreciate IT risk so they can assist with your risk management program
- Connect key risk scenarios to related business procedures to help assign risk ownership
- Validate risk appetite with your senior management and major stakeholders to make sure they are in agreement
GIAC Accredited IS Security Engineering Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of network security experts. GIAC's goal is to verify that a certified professional has the skills necessary to deliver support in vital areas of system, data, and application security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit experts can help your IT organization in the areas of:
Find out more details about Progent's GIAC Information Assurance Support.
- Auditing Networks
- Incident Handling
- Traffic Analysis
- Web Application Security
- SIEM solutions
Talk to a Certified Progent Security Engineer
To see how to contact a Progent security engineer for remote or on-premises expertise in Massachusetts, call 1-800-993-9400 or visit Online Computer Help.
© 2002-2019 Progent Corporation. All rights reserved.