Progent's Network Security Auditing Services
Progent's security engineers are experienced in assessing the vulnerability of your information system to all classes of external and internal security breach. Progent can deploy remote, automated security analysis software for quickly and economically uncovering a wide variety of technical security gaps that can be detected via the Internet. Progent's advanced security audit consulting services, which can be provided by security professionals with CISA, CISM, CISSP, ISSAP, or GIAC certifications, can help your business evaluate your procedures, operations, and governance policies and assess your IT infrastructure to enable you to design the highest level of security into your information system. Progent's security engineers can also test your web applications for security vulnerability and can conduct corporate-wide security audits to validate your company's compliance with major security standards including HIPAA, FISMA, NIST, PCI, and ISO.

Automated Security Auditing Software
Progent's consultants are familiar with the use of auditing software such as Microsoft's Baseline Security Analyzer tool, GFI LANguard, NMAP Port Scanner, AMAP Application Scanner, EEYE Vulnerability Scanner, plus tools from Solar Winds tools, Metasploit, Netcat, Hydra, and Nikto, to perform a variety of automatic system scans to identify potential problems:

  • Check service pack levels
  • Check for missing security patches
  • Check for security alerts/vulnerabilities
  • Detect unnecessary shares
  • Detect unnecessary open ports
  • Detect new security holes using scan comparisons
  • Check for unused user accounts
  • Check password policy and strength
  • Make an inventory of your network
  • Detect potential Trojans on servers and workstations
  • Find out if the OS is disclosing too much information
Key software tools Progent's engineers can use to audit and monitor the security of your network include:
  • Microsoft Baseline Security Analyzer
    Microsoft Baseline Security Analyzer (MBSA) is the free, best practices vulnerability assessment tool for Microsoft environments. It is a tool designed for the IT Professional that helps with the assessment phase of an overall security management strategy. MBSA now includes a graphical and command line interface that can perform local or remote scans of Windows systems.
  • GFI LANguard Network Security Scanner
    GFI LANguard Network Security Scanner (NSS) checks your network for possible security vulnerabilities by scanning your entire network for missing security patches, services packs, open shares, open ports, unused user accounts and more. This information allows you to lock down your network against hackers. GFI LANguard NSS can also remotely deploy missing patches and service packs in applications and OS.
  • Microsoft System Center Operations Manager
    Microsoft System Center Operations Manager is a next-generation network management software platform that monitors the availability, performance and security of your information system by proactively identifying problems and trends occurring on servers across your entire network. Progent's Microsoft Operations Manager consulting services include help with configuring Operations Manager or outsourcing a comprehensive remote monitoring solution.
Security Compliance Testing
Progent's certified security engineers can conduct extensive security audits of enterprise-wide security to determine your company's compliance with key industry security standards including HIPAA, FISMA, NIST, PCI, and ISO 17799. Progent's consultants can also recommend and help you implement improvements to your security policies, processes and infrastructure in order to bring your organization in line with these exacting standards. By adhering to internationally recognized benchmarks of security, your business can assure management, partners, vendors, customers, and regulatory entities that your information system provides a trusted environment for industry and commerce.

High-level Network Security Audit Consulting
Progent can provide the services of a CISA, CISM, CISSP, ISSAP or GIAC-qualified security engineer able to provide your company a comprehensive IS security audit. Progent's security audit engineers offer a wide range of expert consulting services for businesses of all sizes and can deliver these services remotely anywhere in the U.S. or in person in key cities nationwide. Areas covered by Progent's security audit consultants include:

  • IS Audit Process
    Progent can provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist your company in ensuring that your information technology and business systems are protected and controlled. Services available from Progent include:
  • IT Governance
    Progent can help ensure that your company has the structure, policies, accountability, mechanisms, and monitoring practices in place to achieve the requirements of business-wide governance of IT.
  • Systems and Infrastructure Lifecycle Planning
    Progent can help make sure that your management practices for the development/acquisition, testing, implementation, maintenance, and disposal of systems and infrastructure will meet your company’s objectives.
  • IT Service Delivery and Support
    Progent can help provide assurance that your IT service management practices will ensure the delivery of the level of services required to meet your company’s objectives.
  • Protection of Information Assets
    Progent can make sure that your security architecture (policies, standards, procedures, and controls) promotes the confidentiality, integrity, and availability of information assets.
  • Business Continuity and Disaster Recovery
    Progent can help ensure that in the event of a disruption your business continuity and disaster recovery processes will ensure the timely resumption of your IT services while minimizing the impact on your business.
Fixed-price Security Audit Packages from Progent
Progent offers a selection of set-price security audit service bundles that deliver high value by combining Progent's cutting-edge network monitoring tools with Progent's consulting expertise to deliver an unbiased and comprehensive assessment of your network security profile.
  • Security Assessment Service Packages for Small Organizations
    Progent offers two ultra-affordable security inventory packages intended to enable small organizations to get an objective security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a consultant manages a comprehensive examination of your network from outside your firewalled perimeter to determine possible gaps in the security profile you present to the outside. With Progent's Internal Security Inventory Scan, a security consultant executes a network scan using an authorized machine inside your firewalled perimeter to evaluate your vulnerability to inside threats. The two security inventory scans are set up and executed from a secured offsite location. The scan is managed by a consultant who has earned advanced security certifications and who creates a document that details and evaluates the data captured by the scan and recommend practical improvements where required.
  • Security Vulnerability Evaluation Packages for Large Businesses
    Progent offers three levels of fixed-price security assessment service packages designed for large organizations who want to meet compliance standards required by state or industry agencies. Progent's security assessment service packages offer larger businesses an opportunity to get a professional look at the viability of their security profile. For each security evaluation package, Progent engineers with advanced security credentials study and report on collected data and offer recommendations for cost-effective improvements. All the network security audit bundles include an added-cost option for onsite consultants at any location in the United States.
  • Stealth Penetration Testing
    Stealth penetration testing, commonly known as PEN testing, is an accepted technique for helping organizations to find out how open their IT environments are to modern attacks. Progent's stealth penetration testing check how well your corporate security procedures and platforms resist authorized but unannounced intrusion attempts launched by Progent's certified security experts using advanced hacking techniques. Find out about Progent's stealth penetration testing (PEN Test) services.

Contact Progent for Network Security Auditing
If you're looking for network security consulting, phone Progent at 800-993-9400 or refer to Contact Progent.
















© 2002- 2019 Progent Corporation. All rights reserved.



More topics of interest:


An index of content::

64-bit Computing Specialists 64-bit Processing Technology Professional
Akron, OH Computer Consulting Company Small Office Network Consulting Services for Akron, Ohio
BlackBerry Computer Consultancy Fulton County Georgia BlackBerry Email Computer Network Consulting company
BlackBerry Email Support Firm BlackBerry Software Consultancy Firms
BlackBerry Exchange Network Designers Remote BlackBerry Synchronization Network Assessments
BlackBerry Professional Software Design Consultant BlackBerry Redirector Technology Consultant
BlackBerry Redirector Security Consulting Company Jackson County Missouri BlackBerry BPS Computer Support Consultant
CISSP Certified Expert Wireless Security Technology Professional Akron, Ohio Charlotte Network Consulting Firms
CISSP Cybersecurity Contractors Firewall Configure for Security
CISSP information Systems Audit Local Security Security Auditing in El Paso County Colorado
CentOS Linux, Sun Solaris, UNIX Computer Consulting Network Consultant in Phoenix, Maricopa County
Cisco Administration Network Repair Service for Cisco Boston Massachusetts
Cisco CCIE Voice Consulting Job Microsoft MCA Support Careers
Cisco CCIE Voice Engineer Openings Career for ISSAP Consulting Los Angeles, Southern California
Cisco CCIP Support Work From Home Job Top Ranked Cisco CCIE Security Support Contractor in Phoenix - Tempe - Mesa
Cisco Computer Support Company Cisco Upgrading Colorado
Cisco Consulting Group Cisco Network Security Consultants
Computer Consultant Gentoo Linux, Solaris, UNIX Network Consultants in Milwaukee County Wisconsin
Computer Consultation for Cisco Worldwide Consultancy Services Company for Cisco in Philadelphia
Computer Engineer Contract Microsoft MCTS Consultant Subcontractor Jobs
Computer Network Specialists for Cisco IT Consulting Polk County Iowa
Computer Services Worldwide Online Help for BlackBerry Enterprise Server in Phoenix, Maricopa County
Computer Support Consultant for Microsoft Exchange Stamford Connecticut Microsoft Computer Consolidate
Consult for Wireless Security Brisbane, CA Glendale, Los Angeles County Windows Server 2012 R2 Software Consultant
Consultant for Network Security in Philadelphia, Pennsylvania Memphis, TN Computer Network Consultants
Consultant for Wireless Cisco Aironet Support and Integration
Consultant in Baton Rouge, LA BlackBerry Smartphone Troubleshooters in Marion County Indiana
Consulting for Security Audit Microsoft Exchange Server 2013 Network Service in Henrico County Virginia
Cupertino Security Consulting Firms IT Consultants in California
Davis Technical Support Outsource California Computer Consultancy Firm for Yolo County
Debian Linux, Sun Solaris, UNIX Computer Consultants Fedora Linux, Solaris, UNIX Consultants Long Beach Southern California
Denver Computer Network Support Company Denver, Colorado Small Business Network Consulting Company
Design Microsoft Windows Installer in Huntsville Decatur Madison
Evaluation Cybersecurity Company for Firewall
Exchange 2010 Server Onsite Computer Services Network Repair Service Boston, Suffolk County
Exchange Server 2010 Small Business IT Support Plano, Collin County System Recovery
Failover Clustered Servers Technology Consulting Top Ranked Microsoft Certified Failover Clustering Windows 2008 Consultants
Firewall Cybersecurity Contractor Security Cybersecurity Tech Services Anaheim California
Help Desk Consultant Contractor Job Waterford, Newman, Hughson CA Computer Support Telecommute Job
Houston, San Antonio, Dallas-Fort-Worth, TX Information Technology Consulting Firms Small Business Outsourcing IT for Texas - Houston, TX, San Antonio, TX, Dallas-Fort-Worth, TX, Austin, TX
Hybrid cloud Consultant Services Hybrid cloud integration Services
IT Service Austin, Texas Small Office IT Consultants
IT Training On-site Support CISM Security Security Information Transfer Technical Support Services
Independent MCSE Contractor Openings Remote Support Job
Indianapolis, IN Network Assessments Indianapolis Indiana Technical Consultant
Information Technology Consulting for Security Network Intrusion Penetration Testing for Firewall in Kansas City, MO
Integration Support for Catalyst 3650 Switch Catalyst Switch IT Consultants
Jacksonville, Miami, Orlando Administration Migration
Linux Troubleshooting Integration Services for Linux in Birmingham, AL, Montgomery, AL, Mobile, AL, Huntsville, AL
Load Aggregation Testing Engineer network evaluation Lab Specialists
Long Beach, CA Technology Consulting Microsoft and Cisco Certified Long Beach Network Consulting Organization
Los Angeles Information Technology Consulting Companies Los Angeles, CA Networking Help
Mac Lion Networking Online Support Services Mac RAID Support Outsourcing
Microsoft Certified Expert Engineers for Security Sun Solaris Online Technical Support Portland, ME
Microsoft Certified On-site IT Support New Orleans, Louisiana Network Admin Companies
Microsoft Exchange Computer Consultancy Firm Network Solutions for Windows Security Clarksville Tennessee
Microsoft Exchange IT Consultant Small Business Network Support for Microsoft and Apple
Microsoft Exchange Small Business Network Support Design Firm for Exchange Server 2010
Microsoft SQL 2008 Network Help Small Business IT Support Firms in Ronald Reagan Washington Airport DCA
Microsoft SQL 2008 Network System Support Consultant Phoenix Arizona Computer Outsourcing Consultant for SQL 2014
Microsoft SQL 2008 Service Provider Computer Consultancy Firm for SQL Server 2012
Microsoft SQL Server On-site IT Support Ontario Canada Microsoft SQL Server 2012 Information Technology Consulting Firms
Microsoft SharePoint Server Consulting Services SharePoint Server 2010 Specialists in Dallas County
Microsoft and Cisco Certified Expert Consulting Computer Outsourcing for Anchorage, AK
Microsoft and Cisco Certified Professional for Wireless Security in El Dorado Hills, CA Stanislaus County Consultant
Microsoft and Cisco Server Consultant Microsoft and Apple Computer Network Firms
Milwaukee Network Security Consultant Milwaukee, Wisconsin Migration Support
Monterey County Technical Support Organization Monterey Outsourced IT Services Northern California
Network Design Information Technology Manager for Microsoft SQL 2008 in Denver Aurora
Network Designers for BlackBerry Enterprise Server BlackBerry BES Server Network Security Consultants Sedgwick County Kansas
Network Designers for Millbrae Support Company in California
Network Installation Top Rated Los Angeles California Small Business Outsourcing
Network Security Consultants BlackBerry Software Expert Irving, TX
Network Security Services East Bay Networking Specialist
New Orleans, Baton Rouge, Shreveport, LA Integration Company Largest Louisiana Network Setup
North Bay Consulting Firms Northern California Sonoma County Computer Consultancy Services
On-site Technical Support Emergency MCSE Expert Certified Information Technology Outsourcing Companies
On-site Technical Support for Georgia Atlanta, Augusta, Columbus, GA System Support
Orinda Computer Network Service Company Small Office Network Consultants in California
Pleasant Hill Technical Firms Concord Consolidation Northern California
Professional Indianapolis SQL 2014 System Consulting Services Dallas, TX
Professionals Consulting Company Southern California San Diego
Professionals in Oakland System Consultants
Redhat Outsourcing Redhat Technology Consulting
Remote Support Jobs for Cisco Certified Network Support Network Security Consulting Telecommuter Jobs in Chesapeake
Repairing Northern California MCSE Expert Certified Security Consulting Group
SQL 2014 Integration Firm SQL Server 2012 Outsourcing Technology in Greensboro North Carolina
Salinas Systems Support Support Companies for Monterey County California
San Mateo Network Consultation Burlingame Technology Consultant California
Security Audit Consultant Services Small Business IT Consulting Group for SQL 2012
Security Consulting Services Cisco Certified Experts Cincinnati, OH Computer Outsourcing Consultants
Security Forensics Services Security Audit Services in Indianapolis, IN
Security IT Services Compliance Audit for Firewall in Mobile Bay, Alabama
Security Network Intrusion Penetration Testing Security Auditing
Security Scan Consultant Services Security Scan Consultants
Security Security Consultancy CISSP Security Consultancies Jacksonville, Duval County
Security Security Contractors Local Security Cybersecurity Group in Long Beach
Security Services Texas - Houston, TX, San Antonio, TX, Dallas-Fort-Worth, TX, Austin, TX Small Business Network Consultant
Service Reports Configuration CCIE Expert Certified Service Database Online Support Services
Setup Computer Consultancy for Los Angeles California
SharePoint Server 2010 Consultant Microsoft SharePoint Server 2007 Computer Consulting
Small Business Computer Consultants for Microsoft Exchange Mobile, AL National Implementation Services
Small Business Computer Consulting Companies for San Joaquin County Network Support Group for Tracy in California
Small Business Small Business IT Consultant Small Business Integration Firms
Software Security Consultant Network Architect in Las Vegas, Clark County, Nevada
Specialist for Skype for Business Front End Server MCSE Expert Certified Technology Professional for Skype for Business video conferencing
Specialist for Wireless Security MCSA MCDBA MCIPT Engineer Contract in Concord
Specialists in Glendale, AZ San Francisco Bay Area Consulting Organization
Sun Solaris IT Services UNIX Support and Integration in California
Sun Solaris Network Consultants DC Solaris Support and Setup
Support Companies Idaho Networking Specialist
Support Company for Salt Lake City, Utah Utah Outsourcing Technical Support
Support Organization Dallas, TX Small Business Computer Consulting Firms
Support Organizations Montgomery IT Consultants
Tech Consultant for San Bruno Cisco Certified Pacifica Information Technology Outsourcing Firms in Northern California
Technology Consulting Services for Offsite Managed Data Backup/Recovery Services Consultant Services
Ubiquiti UniFi XG Security Gateway Consulting Ubiquiti UniFi AP Consult
Upgrade Installation
Windows 2008 Server Small Business Outsourcing IT Top Rated Consulting for Windows 2016 Server in Atlanta, Fulton County
Windows 2016 Management Network Consulting Companies
Windows Server 2012 Technology Consultant Windows 2008 Server Network Administration
Windows Server 2016 Upgrade Technology Providers in Hialeah, Miami-Dade County
Wireless Security Consulting Santa Cruz County SharePoint Server 2010 Integration Services in Twin Cities, Minnesota
Wireless Security Services in Grand Ledge, MI Cisco IT Consulting Company Chesapeake, VA
installation and Administration Windows Security Network Assessments in Sunnyvale California
installation and Administration for BlackBerry Oklahoma County IT Consulting