Business IT networks in the state of North Carolina can now get quick and economical remote help from Progent's qualified security support specialists to help with urgent security problems. Rates are competitive, charges are per minute, sign-up is immediate, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the knowledge of senior security consultants with high-level industry certifications.
If your North Carolina small business is situated far from major metropolitan areas including Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, contact with local certified security support specialists may be limited during an emergency. This could mean a loss of productivity for your company, upset customers, unproductive employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a qualified security professional ready to offer assistance whenever you require it to get your network operating and salvage your information.
Progent can assist you at any level in your initiatives to guard your IT environment with support that ranges from network security assessments to creating a company-wide security plan. Progent provides affordable support to help small and midsize companies to set up and manage safe IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security companies to provide web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.
Progent's security professionals are accessible online or in person to offer a variety of emergency or project-based network security services which include:
If your company has an immediate requirement for computer security support, go to Progent's Emergency Online Network Help.
- Run automated network security audits
- Clean up promptly after serious security breaches
- Install hardware and software firewalls
- Implement safe methods for offsite and mobile access
- Deploy effective applications for protection against spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 monitoring
- Offer comprehensive Help Desk Call Center Support
- Create an effective network backup and restore strategy centered on Microsoft DPM backup technology
Progent's consultants can deliver advanced services in key fields of network security that include security evaluation, firewalls and VPN, and advanced security planning.
Progent's certified security consultants can assess the effectiveness of your current network security implementation by performing exhaustive remote automated testing via sophisticated utilities and tested procedures. Progent's skill in this testing saves you money and offers a detailed portrayal of system vulnerability. The knowledge your IT organization gains can make up the basis of a security plan that will permit your network to run safely and adapt quickly to future threats.
Automated Vulnerability Analysis
Progent offers consulting in the use of security evaluation packages including Microsoft's MBSA and GFI LANguard for economically running a variety of programmed system auditing scans to uncover potential security vulnerabilities. Progent has extensive experience with additional security analysis products such as NMAP Port Scanner, AMAP, eEye, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.
Progent can show you how to build security into your business operations, install scanning software, plan and deploy a protected system architecture, and suggest procedures to optimize the security of your IT system. Progent's security professionals are ready to assist you to set up a firewall, design secure remote connectivity to email and data, and install virtual private network. Find out more on Progent's automated security analysis.
Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory service bundles intended to enable small businesses to receive a professional network security assessment from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive examination of your IT infrastructure from beyond your company firewall to determine potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from an authorized computer inside your company firewall to evaluate vulnerabilities to internal assaults. The two security inventory services are set up and run from a secured remote location. The process is overseen by an engineer with top security accreditations and who produces a report that details and analyzes the information captured by the security scan and proposes cost-effective remediation where appropriate.
Network Penetration Analysis Support Services
Stealth penetration checking is a key part of any serious network security plan. Progentís security professionals can run thorough intrusion tests without the awareness of your company's in-house network support resources. Unannounced penetration testing shows whether current security defense tools such as intrusion detection alerts and event history analysis are correctly set up and actively checked. Learn additional information concerning Progent's stealth penetration testing support services.
Firewall and Virtual Private Network Support
Progent's expertise in network security technology includes in-depth familiarity with leading firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower integration and debugging support.
Cisco Network Security and VPN Support Services
Cisco's security and offsite connection technology provide a full range of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Learn additional details concerning Progent's Engineering Services for Cisco Security and VPN Products.
Engineering Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select appropriate products from a variety of vendors to achieve your security goals while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior-based analysis technology to guard endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to automate the complete threat lifecycle including blocking, identification, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows VSS and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering via cutting-edge technologies packaged within a single agent managed from a unified control. Progent's security and virtualization consultants can assist your business to plan and configure a ProSight ESP environment that meets your organization's specific needs and that helps you prove compliance with legal and industry data security standards. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require urgent action. Progent can also help you to install and test a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of vital files, apps and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can provide world-class expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security companies to provide centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of analysis for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can save up to 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Planning
Every business ought to develop a thoroughly thought out security program that incorporates both preventive processes and reaction planning. The pre-attack strategy is a set of procedures intended to reduce security weaknesses. The reactive plan assists your security engineers to assess the impact caused by a security penetration, fix the network, document the event, and get the IT network operational as soon as feasible.
Progent's expert IT security consultants can to assist your company to perform a comprehensive risk evaluation and create a company-wide security plan to implement security policies and mechanisms to reduce future assaults and threats.
CISM Qualified Network Security Engineering Assistance
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of skill that information security professionals are required to master. It provides executive management the assurance that those who have earned their CISM certification have the experience and knowledge to deliver effective security management and consulting services. Progent can provide the support of CISM certified security consultants to help companies with:
Learn more details concerning Progent's CISM Accredited Security Support Professionals.
- IS Security Processes
- Vulnerability Management
- Information Security Program Management
- Information Security Management
- Recovery Planning
CISSP Accredited Security Consulting Support
CISSP denotes mastery of a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security areas including:
Read additional details about Progent's CISSP Qualified Security Support Expertise.
- Security Administration Procedures
- Security Architecture and Models
- Access Control Solutions and Processes
- Software Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP qualified system architecture professionals are experts who have been awarded ISSAP status as a result of thorough testing and extensive experience with network security design. The ISSAP certification indicates proven skill in the most complex requirements of IS security architecture bounded by the broader field of information system security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all aspects of architecture security such as.
Read additional information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Expertise.
- Access Management Systems and Methodologies
- Phone System and Network Protection
- Encryption/Decryption Solutions
- Needs Analysis and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Information System Security Auditing Engineering Support
The CISA credential is a prestigious qualification that represents mastery in IS security auditing. Certified by ANSI, the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA IS security audit specialists can assist your business in the areas of:
Get additional details about Progent's CISA Certified Security Auditing Consulting Services.
- Information Systems Audit Process
- Information Technology Governance
- Systems and Architecture Planned Useful Life
- IT Support
- Safeguarding Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's ability to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers can provide a range of risk evaluation services including:
Get more details about Progent's CRISC Risk Management Experts.
- Collect data and review documentation to help identify major vulnerabilities
- Inventory statutory, industry, and business requirements and company standards related to your network to assess their potential influence on your business goals
- Point out possible threats for your operational processes to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct seminars to make sure your organization appreciate IS risk so they can assist with your risk control process
- Match key risk scenarios to your associated operational processes to help assign risk ownership
- Validate risk tolerance with your senior management and key stakeholders to make sure they match
GIAC Qualified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security engineers. GIAC's goal is to assure that an accredited professional has the skills necessary to deliver services in vital areas of system, information, and software security. GIAC certifications are recognized by businesses and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit consultants are available to help your company in the areas of:
Read additional information about Progent's GIAC Information Assurance Support.
- Assessing IT Infrastructure
- Incident Response
- Intrusion Detection
- Web Services Security
- SIEM solutions
Get in Touch with a Certified Security Specialist
To see how you can contact a security engineer for remote or on-premises support in North Carolina, call 1-800-993-9400 or visit Remote Network Support.
© 2002-2019 Progent Corporation. All rights reserved.