Company information networks in North Carolina can depend on fast and economical online technical support from Progent's certified network security professionals to help with the toughest security issues. Rates are competitive, billing is per minute, sign-up is fast, and service is world class. Progent also provides help for long-term projects that requires the expertise of seasoned security engineers with high-level industry credentials.
If your North Carolina small business is located away from major urban areas like Charlotte, Raleigh, Greensboro, Durham, or Winston-Salem, help from local accredited security support specialists may be limited during an emergency. This can result in lost income for your company, upset clients, idle employees, and distracted executives. By utilizing Progent's remote support, you can get in touch with a certified security consultant ready to deliver assistance when you have to have it to keep your network running and recover your data.
Progent can assist you in your initiatives to guard your network with support ranging from network security assessments to creating a comprehensive security strategy. Progent provides affordable support to assist companies of any size to design and maintain safe networks based on Microsoft Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple handhelds or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security platform that uses the technology of leading information security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email that stays inside your corporate firewall.
Progent's certified consultants are available remotely or on site to offer a range of emergency or longer-term computer security services such as:
If your company has an emergency need for IT security help, refer to Progent's Emergency Remote Network Support.
Progent's engineers offer advanced support in vital fields of computer security that include security assessment, firewall and VPN expertise, and advanced security consulting.
Progent's certified security consultants can evaluate the effectiveness of your existing network security systems by performing comprehensive remote automated testing via advanced software tools and proven procedures. Progent's skill in this testing saves your company money and assures an accurate portrayal of system vulnerability. The information your company gains can be used as the foundation of a network protection plan that can permit your network to operate dependably and respond rapidly to future risks.
Automated Network Vulnerability Audits
Progent provides consulting in the use of security testing products such as Microsoft's MBSA and GFI LANguard for affordably performing a variety of automatic system auditing checks to identify potential security gaps. Progent has extensive experience with additional security analysis utilities including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.
Progent can help you build protection into your company operations, install auditing tools, define and implement a protected system environment, and suggest policies to maximize the safety of your IT system. Progent's security engineers are available to assist you to set up a firewall, implement safe remote access to email and business applications, and integrate VPN. Find out additional information on Progent's automated security analysis.
Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages designed to enable small businesses to receive an objective security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from a secure machine inside your firewall to assess vulnerabilities to internal threats. Both security inventory packages are configured and run from a secured remote location. The process is overseen by a consultant with top security credentials and who produces a report that summarizes and interprets the information captured by the security scan and suggests practical improvements if called for.
Network Intrusion Testing Support Services
Stealth intrusion testing is an important part of any successful network security plan. Progent’s security experts can perform extensive penetration tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking uncovers whether current security defense systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently monitored. Find out more about Progent's network penetration analysis support services.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security solutions includes in-depth familiarity with leading firewalls and VPN technology offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of engineers with important industry certifications including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, integrate, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote access products offer a complete line of manageable security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Read more information about Progent's Engineering Services for Cisco Security and VPN Appliances.
Engineering Expertise for Other Firewall and VPN Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate products from multiple vendors to support your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior machine learning tools to guard endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily get by traditional signature-matching anti-virus tools. ProSight ASM safeguards local and cloud resources and offers a single platform to manage the entire malware attack progression including filtering, identification, containment, cleanup, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device control, and web filtering via leading-edge tools incorporated within one agent managed from a unified control. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP deployment that addresses your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry data security regulations. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate action. Progent's consultants can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup activities and allows fast recovery of vital files, applications and virtual machines that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical information. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security companies to provide web-based control and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more information, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to a different hardware solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your network documentation, you can eliminate up to 50% of time spent searching for vital information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether you’re making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Any business ought to develop a thoroughly thought out security strategy that includes both proactive processes and response planning. The proactive plan is a set of procedures intended to reduce vulnerabilities. The post-attack plan assists your company's network security engineers to assess the impact caused by a security penetration, repair the network, record the event, and get the IT network running as soon as possible.
Progent's certified IT security consultants can to assist you to run a comprehensive risk evaluation and define a company-wide security strategy to implement security policies and mechanisms to minimize future attacks and dangers.
CISM Qualified System Security Consulting Assistance
The Certified Information Security Manager (CISM) organization describes the core capabilities and global standards of performance that information security managers are expected to learn. It gives executive management the confidence that those who have qualified for their CISM credential have the background and capability to deliver effective security management and support consulting. Progent can provide the support of CISM qualified security professionals to assist companies with:
Find out more details about Progent's CISM Qualified IS Security Support Expertise.
- Information Security Processes
- Vulnerability Management
- IS Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Accredited Security Engineering Support
The CISSP credential recognizes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data security under ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:
Read more details concerning Progent's CISSP Accredited Cybersecurity Support Expertise.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP status as a result of thorough examination and extensive experience with information security design. The ISSAP credential indicates demonstrated competence in the more in-depth demands of information security architecture bounded by the broader field of information security expertise required for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all phases of secure network architecture such as.
Learn more details about Progent's ISSAP Certified Secure IT Architecture Engineering Services.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Protection
- Data Encryption Solutions
- Requirements Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Certified Information System Security Auditing Consulting Services
The CISA accreditation is a recognized qualification that signifies expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive test given by the ISACA professional association. Progent's CISA-qualified network security audit specialists can assist your business with:
Find out the details concerning Progent's CISA Accredited Information System Security Auditing Engineering Expertise.
- Information Systems Audit Process
- IT Administration
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Safeguarding Data Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and maintain information system controls to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a business continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers can provide a variety of risk identification services such as:
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to evaluate major vulnerabilities
- Identify legal, industry, and contractual requirements and organizational policies related to your information system to determine their possible impact on your business objectives
- Point out possible vulnerabilities for your business processes to assist in analyzing your corporate risk
- Develop a risk awareness initiative and conduct seminars to ensure your organization understand IT risk so they can assist with your risk control process
- Connect identified risk scenarios to related business procedures to help assign risk responsibility
- Validate risk appetite with your senior leadership and key stakeholders to ensure they are in agreement
GIAC Certified IS Security Consulting Support
Find out additional information concerning Progent's GIAC Information Assurance Expertise.
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security engineers. GIAC's goal is to assure that an accredited security consultant possesses the knowledge necessary to provide support in key areas of network, data, and software security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC-certified security audit consultants can assist your IT organization with:
Contact a Progent Security Expert
To see how to access a certified security engineer for online or onsite help in North Carolina, phone 1-800-993-9400 or go to Remote Network Help.