Business information networks in the state of New Hampshire now have prompt and economical online technical support from Progent's qualified security engineers to resolve the toughest security problems. The cost is competitive, charges are per minute, engagement is immediate, and support is world class. Progent also offers help for complex projects that demand the services of senior security engineers with high-level security certifications.
If your New Hampshire small business is situated away from major urban neighborhoods such as Manchester, Nashua, or Concord, help from local accredited network security consultants could be limited when you have a crisis. This can cause a loss of productivity for your business, angry customers, unproductive workers, and defocused executives. By contacting Progent's online services, you can get in touch with a certified security professional who can deliver help when you require it to get your system on line and salvage your information.
Progent can help you in all your initiatives to defend your information system with support that can range from security assessments to creating a comprehensive security strategy. Progent provides affordable service to help small and midsize companies to design and manage secure IT environments based on Windows and Cisco products and that may include servers and desktops based on UNIX or Linux platforms as well as BYOD clients with Apple handhelds or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further level of analysis for incoming email. For outbound email, the onsite gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your security perimeter.
Progent's security consultants are available online or on site to offer a variety of urgent or longer-term network security services including:
If your network has an emergency requirement for computer security support, go to Progent's Emergency Remote Network Help.
- Perform extensive network security audits
- Clean up quickly after attacks
- Configure and troubleshoot firewalls
- Configure secure solutions for remote and mobile access
- Install effective applications for defense against viruses, spam and directory harvest attacks
- Develop a comprehensive security plan with proactive monitoring
- Provide outsourced Call Center Services
- Help Develop an effective network backup and business continuity plan centered on Microsoft DPM automated backup technology
Progent's support professionals provide advanced services in vital areas of computer protection that include analysis, firewall/VPN support, and high-level security planning.
Progent's certified security engineers can assess the vulnerability of your existing computer protection implementation by performing exhaustive remote automated testing based on advanced software tools and proven techniques. Progent's experience in this testing saves you money and offers an accurate portrayal of weaknesses. The information your IT organization gains can make up the basis of a network protection strategy that can allow your network to run safely and react quickly to future risks.
Automated Network Security Audits
Progent offers expertise in the application of security auditing utilities including MBSA and GFI LANguard for affordably performing a set of automatic network auditing checks to identify possible security weaknesses. Progent has broad experience with other security analysis products including NMAP, AMAP, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react effectively.
Progent can show you how to build security into your business operations, configure auditing tools, plan and deploy a secure system environment, and suggest procedures to optimize the safety of your network. Progent's security consultants are available to help you set up a firewall, implement safe remote access to email and data, and install virtual private network. Find out more concerning Progent's network security analysis.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two low-cost security inventory service bundles designed to allow small companies to receive an independent security assessment from a qualified security consultant. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your network from outside your firewall to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from a secure machine within your company firewall to determine your exposure to inside threats. The two security inventory services are configured and executed from a protected external location. The project is overseen by an engineer with high-level security accreditations and who produces a document that details and analyzes the information captured by the scan and proposes cost-effective remediation if called for.
Stealth Security Penetration Testing Support Services
Stealth intrusion checking is a key component of any successful IT system security strategy. Progentís security experts can run thorough penetration tests without the knowledge of your organization's internal IT resources. Unannounced penetration checking uncovers whether current security monitoring tools such as intrusion incident warnings and event log monitoring are properly configured and actively monitored. Find out more on Progent's stealth penetration analysis consulting.
Firewall and Virtual Private Network Support
Progent's background in security solutions includes extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers with important networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower configuration and debugging services.
Cisco Network Security and VPN Engineering Services
Cisco's security and offsite access products provide a full range of manageable security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and CCNP certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Find out additional information about Progent's Engineering Expertise for Cisco Security and VPN Products.
Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and select appropriate technologies from a variety of suppliers to support your security goals while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily get by legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a single platform to automate the entire threat lifecycle including protection, infiltration detection, mitigation, cleanup, and forensics. Key features include one-click rollback using Windows VSS and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's data protection and virtualization experts can help you to design and implement a ProSight ESP environment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent's consultants can also help you to install and test a backup and restore solution such as ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates your backup activities and enables fast recovery of critical files, apps and VMs that have become unavailable or corrupted as a result of component failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to recover your critical information. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top information security companies to deliver web-based management and world-class security for your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate up to 50% of time spent looking for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Any business should have a thoroughly thought out security strategy that incorporates both proactive procedures and reaction plans. The proactive plan is a collection of procedures intended to reduce security weaknesses. The post-attack plan helps your IT security engineers to evaluate the impact caused by a security penetration, repair the damage, document the event, and get business functions operational as quickly as feasible.
Progent's certified IS security engineers can to assist your business to perform a comprehensive vulnerability evaluation and define a company-wide security plan to establish security policies and controls to reduce future assaults and threats.
CISM Qualified Security Consulting Services
The Certified Information Security Manager (CISM) committee defines the basic competencies and worldwide standards of skill that IT security managers are required to master. CISM gives business management the confidence that consultants who have earned their CISM credential possess the experience and capability to deliver effective security administration and consulting services. Progent can provide the support of CISM certified security consultants to help businesses with:
Find out more details about Progent's CISM Qualified Information Security Engineering Expertise.
- IS Security Governance
- Risk Analysis
- IS Security Program Management
- Network Security Management
- Recovery Management
CISSP Accredited Security Engineering Services
CISSP certification denotes mastery of a global standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data protection defined by ISO 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security areas including:
Read more details about Progent's CISSP Accredited Network Security Support Services.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification as a result of rigorous testing and significant work with network security design. The ISSAP credential indicates proven competence in the most challenging demands of information system security architecture within the broader field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security including.
Learn additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Consulting Professionals.
- Access Management Systems and Techniques
- Phone System and Network Security
- Cryptography Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Hardware Security
CISA Qualified Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that signifies expertise in information system security audit and control. Accredited by ANSI, the CISA credential requires that candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA-certified security audit specialists can assist your business with:
Read more information about Progent's CISA Qualified Information System Security Auditing Consulting Support.
- Information Systems Audit Services
- IT Enforcement
- Systems and Architecture Lifecycle Planning
- Information Technology Support
- Protecting Information Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to validate an IT professional's skills to plan, implement, and support information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers offer a variety of risk assessment services such as:
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to evaluate major vulnerabilities
- Identify statutory, regulatory, and contractual mandates and company standards related to your network to determine their possible influence on your strategic objectives
- Point out possible threats for your business workflows to assist in evaluating your corporate risk
- Develop a risk awareness program and provide training to ensure your stakeholders appreciate IT risk so they can assist with your risk management program
- Connect identified risk vectors to your associated business procedures to help determine risk ownership
- Determine risk appetite with executive leadership and key stakeholders to ensure they match
GIAC Qualified Network Security Consulting Support
Find out more details concerning Progent's GIAC Information Assurance Services.
GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's mission is to assure that a certified professional possesses the knowledge needed to deliver support in important categories of network, information, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC information security audit consultants can assist your business with:
Get in Touch with a Security Engineer
To find out how to contact a certified security engineer for online or onsite expertise in New Hampshire, call 1-800-993-9400 or go to Online Computer Help.
© 2002-2019 Progent Corporation. All rights reserved.