Business information networks in the state of New Hampshire can depend on fast and affordable remote technical support from Progent's certified network security professionals to fix urgent security problems. Rates are reasonable, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also provides help for complex projects that requires the knowledge of seasoned security engineers with top industry certifications.
If your New Hampshire company is based away from larger urban neighborhoods such as Manchester, Nashua, or Concord, help from local certified network security support specialists could be problematic during a security disaster. This could mean lost income for your company, angry customers, idle workers, and defocused management. By utilizing Progent's online services, you can get in touch with a qualified security consultant ready to deliver expertise when you need it to get your computer network operating and salvage your data.
Progent can assist you at any level in your efforts to guard your information system with support that ranges from security checks to developing a company-wide security strategy. Progent offers economical support to help businesses of all sizes to design and maintain secure networks powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems plus BYOD clients with Apple handhelds or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver centralized management and comprehensive security for all your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a further level of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified experts are available remotely or on site to offer a range of urgent or longer-term network security services which include:
If your business has an urgent requirement for computer security support, go to Progent's Emergency Online Network Help.
- Run extensive security audits
- Recuperate promptly after serious security breaches
- Set up effective firewalls
- Implement safe methods for offsite and mobile connectivity
- Install advanced applications for protection against spam and DHAs
- Develop a comprehensive security plan with 24x7 monitoring
- Provide outsourced Call Center Services
- Create a practical backup and disaster recovery plan centered on Microsoft DPM backup/restore technology
Progent's support professionals provide world-class services in key areas of system protection including analysis, firewalls and VPN, and high-level security consulting.
System Security Assessment
Progent's expert security engineers can assess the strength of your existing computer security systems through exhaustive remote automated analysis based on advanced software tools and tested procedures. Progent's experience in this testing saves your company money and offers a detailed picture of system vulnerability. The knowledge your business gains can be used as the basis of a network protection strategy that can permit your network to operate dependably and respond quickly to future threats.
Automated Security Analysis
Progent provides expertise in the use of security evaluation packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a variety of automatic network auditing checks to identify possible security vulnerabilities. Progent has extensive experience with other security auditing utilities such as NMAP, AMAP application mapper, eEye, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can show you how to build protection into your company operations, configure scanning software, define and implement a secure system architecture, and recommend procedures to optimize the security of your IT system. Progent's security professionals are ready to help you set up a firewall, implement secure remote access to email and data, and install VPN. Find out more concerning Progent's automated security assessment.
Security Inventory Scanning Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to get an impartial security evaluation from a certified security expert. With Progent's External Network Security Inventory Scan, a security expert runs an extensive examination of your network from beyond your firewalled perimeter to determine possible weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from an authorized machine inside your firewall to assess vulnerabilities to inside threats. The two security inventory packages are set up and executed from a protected remote site. The process is overseen by a consultant with top security credentials and who generates a document that summarizes and analyzes the data captured by the scan and proposes practical improvements where called for.
Network Intrusion Analysis Support Services
Stealth penetration checking is a key component of any successful network security plan. Progent’s security professionals can run thorough penetration checks without the knowledge of your company's internal IT staff. Stealth penetration testing shows whether existing security monitoring systems such as intrusion incident warnings and event log analysis are correctly set up and consistently monitored. Learn additional information concerning Progent's stealth penetration analysis consulting.
Firewall and Virtual Private Network Expertise
Progent's background in network security solutions encompasses extensive familiarity with major firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
Cisco Network Security and VPN Support Services
Cisco's network security and offsite access products offer a complete line of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Read additional information about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Appliances.
Consulting Services for Additional Firewall and VPN Solutions
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can help you create a detailed security strategy and choose appropriate technologies from multiple suppliers to support your security objectives while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior machine learning tools to guard endpoints as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily escape legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to automate the complete threat progression including blocking, identification, mitigation, remediation, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering through cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your organization's unique requirements and that helps you demonstrate compliance with government and industry data protection standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require urgent action. Progent can also help you to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of vital files, applications and virtual machines that have become lost or damaged as a result of component breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide advanced support to set up ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top information security vendors to deliver web-based control and world-class protection for your email traffic. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and keeps most threats from reaching your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual machine host set up and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Because the system is virtualized, it can be ported immediately to a different hardware solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and protect data about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether you’re planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Every company ought to have a carefully thought out security strategy that includes both pre-attack procedures and reaction plans. The pre-attack plan is a collection of steps designed to reduce vulnerabilities. The post-attack strategy helps your IT security personnel to evaluate the damage caused by a security penetration, fix the damage, record the event, and get the IT network operational as rapidly as feasible.
Progent's expert IT security engineers are available to assist your company to perform a complete risk assessment and create a network security strategy to implement security processes and controls to reduce ongoing attacks and dangers.
CISM Accredited Information Security Consulting Assistance
The CISM committee defines the basic capabilities and worldwide standards of performance that IT security professionals are expected to learn. It gives executive management the assurance that consultants who have earned their CISM credential have the background and capability to provide efficient security administration and support consulting. Progent offers the expertise of CISM qualified security professionals to assist companies with:
Learn additional details concerning Progent's CISM Certified Network Security Engineering Services.
- Information Security Processes
- Risk Analysis
- Network Security Program Management
- Network Security Management
- Recovery Management
CISSP Certified Security Consulting Support
The CISSP credential denotes expertise with an international standard for data security. ANSI has awarded the CISSP credential recognition in the area of information protection stipulated by ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas such as:
Find out additional details about Progent's CISSP-certified Cybersecurity Support Expertise.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure System Architecture Consulting Services
Progent's CISSP-ISSAP qualified IT architecture engineers are consultants who have earned ISSAP Certification as a result of thorough testing and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated competence in the more challenging demands of IS security architecture bounded by the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all aspects of secure network architecture such as.
Find out more information about Progent's ISSAP Accredited Secure Network Architecture Consulting Professionals.
- Access Control Mechanisms and Methodologies
- Telecommunications and System Infrastructure Protection
- Encryption/Decryption Options
- Requirements Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Hardware Security
CISA Accredited Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a globally recognized achievement that signifies mastery in network security audit and control. Certified by ANSI, the CISA credential has candidates undergo an extensive examination given by the ISACA professional group. Progent's CISA-qualified IS security audit experts are available to help your business in the areas of:
Read additional details about Progent's CISA Qualified Security Auditing Consulting Support.
- Information Systems Audit Services
- IT Enforcement
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Service Delivery
- Protecting Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's skills to plan, deploy, and support IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation consultants offer a variety of risk evaluation services including:
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to identify major risk scenarios
- Inventory statutory, regulatory, and contractual mandates and organizational standards associated with your information system to determine their possible influence on your business goals
- Identify potential vulnerabilities for your business processes to help in analyzing your enterprise risk
- Develop a risk awareness program and conduct training to make sure your stakeholders appreciate IS risk so they can contribute to your risk control process
- Connect identified risk vectors to your associated business processes to help determine risk ownership
- Determine risk appetite with your senior management and major stakeholders to make sure they align
GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to make sure that a certified security consultant possesses the skills necessary to provide services in critical categories of system, data, and application program security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC-qualified information security audit engineers are available to assist your business in the areas of:
Learn more information about Progent's GIAC Information Assurance Support.
- Auditing IT Infrastructure
- Security Incident Handling
- Traffic Analysis
- Web Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Engineer
To see how to get in touch with a certified security consultant for remote or on-premises assistance in New Hampshire, call 1-800-993-9400 or visit Remote Computer Support.