Small business information networks in Minnesota can depend on fast and affordable remote access to Progent's qualified network security support specialists to fix urgent security problems. Rates are affordable, billing is by the minute, sign-up is immediate, and service is world class. Progent also provides help for complex engagements that requires the expertise of senior security consultants with top industry certifications.
In case your Minnesota network is located far from major urban neighborhoods like Minneapolis, St. Paul, Rochester, Duluth, or Bloomington, help from local accredited security experts is often limited when there's a security disaster. This can result in a drop in income for your company, angry clients, unproductive employees, and defocused management. By calling Progent, you can get in touch with a qualified security consultant who can offer help when you need it to keep your computer network running and salvage your data.
Progent can help you in all your initiatives to defend your IT environment with services ranging from security audits to developing a comprehensive security strategy. Progent provides economical service to help small and midsize companies to set up and manage protected networks based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security companies to deliver centralized management and comprehensive protection for your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper layer of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's certified consultants are accessible remotely or on premises to offer a variety of emergency or project-based computer security services including:
If your network has an immediate need for computer security help, refer to Progent's Emergency Online Network Help.
- Perform extensive network security evaluations
- Clean up quickly after serious security breaches
- Configure hardware and software firewalls
- Configure safe methods for offsite and mobile access
- Deploy effective utilities for automatic protection against viruses, spam and DHAs
- Develop a comprehensive security plan with round-the-clock monitoring
- Provide outsourced Help Desk Support
- Help Create a practical data backup and restore solution centered on Data Protection Manager automated backup technology
Progent's security experts offer world-class services in vital facets of network protection that include security assessment, firewalls and VPN, and advanced security consulting.
Progent's expert security consultants can assess the effectiveness of your current network security systems through comprehensive remote automated analysis via advanced utilities and proven techniques. Progent's skill in administering this service saves your company consulting fees and assures an accurate portrayal of gaps. The information your business is provided can form the basis of a network protection strategy that will permit your network to operate dependably and respond rapidly to new threats.
Automated Vulnerability Analysis
Progent offers expertise in the use of security auditing products such as MBSA and GFI LANguard NSS for economically running a set of programmed system auditing checks to identify potential security vulnerabilities. Progent has extensive knowledge of other network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.
Progent can help you design security into your company operations, configure scanning tools, define and deploy a secure network architecture, and recommend policies to maximize the security of your IT system. Progent's security consultants are ready to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Learn additional information about Progent's automated security assessment.
Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory packages intended to allow small businesses to get a professional security evaluation from a certified security expert. With Progent's External Security Inventory Checkup, a security engineer administers an extensive test of your network from outside your firewalled perimeter to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from a secure machine within your company firewall to evaluate your exposure to inside threats. The two security inventory services are set up and executed from a protected external location. The process is directed by a consultant with top security accreditations and who generates a document that summarizes and interprets the data captured by the scan and suggests practical improvements if called for.
Network Intrusion Testing Support Services
Stealth intrusion checking is a key component of any serious IT system security plan. Progentís security experts can run extensive intrusion checks without the knowledge of your organization's in-house IT resources. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion incident alerts and event log analysis are properly set up and consistently monitored. Learn more on Progent's stealth penetration analysis consulting.
Firewall and Virtual Private Network Support
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) technology from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, configure, optimize, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and VPN Support Services
Cisco's network security and offsite access products provide a comprehensive range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business objectives. Learn additional details concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.
Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and select appropriate technologies from a variety of suppliers to support your security objectives while sticking within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis technology to defend endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to manage the entire threat progression including blocking, identification, containment, cleanup, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alarms, device management, and web filtering through leading-edge technologies packaged within one agent accessible from a single control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent's consultants can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast restoration of critical files, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical information. Find out more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top information security vendors to provide centralized control and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of inspection for inbound email. For outbound email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and protect information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSLs or domains. By updating and managing your IT infrastructure documentation, you can save up to 50% of time spent looking for vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Certified Security Design
Any company should have a carefully considered security program that incorporates both proactive processes and reaction plans. The pre-attack plan is a collection of mechanisms intended to minimize vulnerabilities. The post-attack strategy assists your company's IT security personnel to evaluate the impact resulting from an attack, repair the system, record the experience, and get business functions running as rapidly as feasible.
Progent's expert IT security consultants can to help your company to perform a comprehensive risk assessment and create a company-wide security plan to establish security processes and mechanisms to minimize ongoing attacks and dangers.
CISM Qualified Information Security Consulting Expertise
The CISM organization describes the core competencies and international standards of skill that IT security managers are required to learn. CISM provides business management the confidence that consultants who have qualified for their CISM certification possess the background and knowledge to provide efficient security administration and support services. Progent can provide the expertise of CISM certified security professionals to assist businesses with:
Find out additional details about Progent's CISM Certified Information Security Engineering Services.
- Information Security Governance
- Risk Management
- Network Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Certified Security Engineering Support
CISSP recognizes mastery of a worldwide standard for network security. The American National Standards Institute has awarded the CISSP credential recognition in the field of data security defined by ISO 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security fields such as:
Learn more details about Progent's CISSP Qualified Information Security Support Expertise.
- Security Administration Practices
- Security Architecture and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Consulting Expertise
Progent's CISSP-ISSAP qualified information system architecture engineers are experts who have earned ISSAP status through thorough examination and significant experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more complex requirements of information system security architecture within the broader scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your business with all aspects of secure network architecture including.
Learn additional details concerning Progent's ISSAP Qualified Secure IT Architecture Consulting Services.
- Access Control Systems and Techniques
- Telecommunications and Network Infrastructure Protection
- Encryption/Decryption Solutions
- Requirements Analysis and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that represents expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA information security audit experts are available to help your company in the areas of:
Get the details about Progent's CISA Accredited IS Security Auditing Engineering Services.
- IS Audit Services
- Information Technology Enforcement
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Protecting Information Assets
- Business Continuity Planning
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants can provide a variety of risk evaluation services such as:
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and review documentation to identify major vulnerabilities
- Inventory legal, regulatory, and contractual requirements and company policies related to your information system to determine their potential influence on your business objectives
- Point out possible vulnerabilities for your operational workflows to help in analyzing your enterprise risk
- Develop a risk awareness initiative and provide training to make sure your stakeholders understand IT risk so they can contribute to your risk control process
- Match key risk scenarios to your associated operational procedures to help assign risk responsibility
- Determine risk tolerance with executive leadership and major stakeholders to make sure they match
GIAC Qualified Security Engineering Support
Global Information Assurance Certification was established in 1999 to certify the skill of network security engineers. GIAC's mission is to assure that an accredited professional has the knowledge necessary to provide support in vital areas of network, data, and application program security. GIAC certifications are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC network security audit experts are available to assist your company with:
Learn additional information concerning Progent's GIAC Information Assurance Expertise.
- Auditing Networks
- Incident Response
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Get in Touch with a Security Specialist
To learn how to contact a security engineer for online or onsite assistance in Minnesota, call 1-800-993-9400 or go to Online Computer Support.