Company information networks in the state of North Dakota now have fast and affordable remote help from Progent's qualified security consultants to fix the toughest security problems. Rates are reasonable, billing is per minute, engagement is immediate, and service is world class. Progent also offers assistance for complex engagements that demand the services of senior security engineers with top industry credentials.
In case your North Dakota business is located outside of larger urban areas including Fargo, Bismark, or Grand Forks, contact with local certified security experts may be limited during a crisis. This could mean lost revenue for your business, upset clients, unproductive employees, and distracted executives. By calling Progent's online services, you can get in touch with a qualified security consultant ready to provide expertise whenever you require it to get your network running and salvage your data.
Progent can help you at any level in your efforts to defend your network with support ranging from network security assessments to developing a company-wide security plan. Progent provides affordable service to help companies of any size to design and manage protected IT environments powered by Windows and Cisco products and that can include computers based on UNIX or Linux operating systems as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to provide centralized control and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further layer of inspection for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.
Progent's security engineers are accessible online or on premises to offer a variety of urgent or longer-term network security services which include:
If your company has an urgent need for IT security help, refer to Progent's Emergency Remote Network Support.
- Run extensive network security evaluations
- Clean up promptly after serious security breaches
- Set up firewalls from multiple vendors
- Configure secure solutions for remote and mobile access
- Install advanced solutions for defense against viruses, spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 network monitoring
- Provide comprehensive Call Center Services
- Help Create an effective network backup and disaster recovery plan built around Microsoft DPM automated backup technology
Progent's support professionals provide advanced services in key facets of system security including security evaluation, firewall and VPN expertise, and high-level security planning.
System Security Evaluation
Progent's expert security engineers can assess the effectiveness of your existing network protection implementation through exhaustive remote automated testing via advanced utilities and tested procedures. Progent's experience in administering this service saves your company time and money and assures an objective picture of gaps. The knowledge your IT organization gains can make up the foundation of a network protection strategy that can allow your information system to operate dependably and adapt rapidly to new threats.
Automated Network Vulnerability Audits
Progent provides consulting in the use of security evaluation utilities including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably running a set of programmed network testing scans to uncover possible security weaknesses. Progent has broad knowledge of other security auditing products such as NMAP, AMAP, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can show you how to build security into your business operations, configure auditing applications, plan and implement a secure network architecture, and suggest procedures to maximize the security of your IT system. Progent's security engineers are available to assist you to set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn additional information concerning Progent's network security analysis.
Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small businesses to receive an impartial security assessment from a qualified security expert. With Progent's External Security Inventory Checkup, an engineer administers an extensive examination of your network from beyond your firewall to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a system scan from a secure machine within your firewall to evaluate your exposure to inside threats. The two security inventory services are configured and executed from a protected remote site. The process is managed by an engineer with top security accreditations and who generates a report that summarizes and interprets the data captured by the scan and proposes cost-effective remediation where called for.
Stealth Penetration Testing Support Services
Stealth penetration checking is an important part of any successful IT system security strategy. Progent’s security professionals can run thorough intrusion checks without the knowledge of your organization's in-house network support resources. Stealth penetration testing uncovers whether existing security defense tools such as intrusion detection warnings and event history monitoring are correctly configured and consistently monitored. Learn additional information concerning Progent's stealth penetration analysis consulting.
Firewall and Virtual Private Network Solutions
Progent's background in network security solutions includes in-depth field work with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite access technology provide a comprehensive range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and CCNP certifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business objectives. Read more information about Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Appliances.
Support Services for Additional Firewall and VPN Solutions
Progent offers small and medium size businesses expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to design a detailed security plan and choose appropriate technologies from a variety of vendors to achieve your security goals while sticking within your budget restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning technology to guard endpoint devices and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to automate the complete malware attack lifecycle including blocking, infiltration detection, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering through cutting-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization experts can help you to plan and implement a ProSight ESP deployment that meets your company's specific requirements and that helps you demonstrate compliance with government and industry data security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that call for immediate action. Progent's consultants can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates your backup processes and enables rapid recovery of critical data, applications and VMs that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to restore your critical information. Learn more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security companies to provide centralized management and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hardware environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can save as much as 50% of time thrown away searching for vital information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you’re making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Design
Every business should develop a thoroughly thought out security strategy that incorporates both pre-attack procedures and reaction plans. The proactive strategy is a collection of procedures that help to minimize security weaknesses. The post-attack strategy assists your IT security engineers to assess the impact resulting from an attack, repair the damage, document the experience, and get the IT network restored as quickly as possible.
Progent's certified IS security consultants are available to assist you to perform a complete risk evaluation and create a network security plan to implement security processes and controls to minimize ongoing attacks and threats.
CISM Certified Information Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of skill that IT security managers are expected to master. It provides executive management the confidence that consultants who have qualified for their CISM certification have the experience and knowledge to provide effective security administration and support consulting. Progent can provide the support of CISM certified security consultants to help companies with:
Learn more information about Progent's CISM Certified Information Security Consulting Professionals.
- Information Security Strategies
- Risk Management
- Network Security Program Management
- Network Security Administration
- Response Planning
CISSP Certified Security Engineering Support
CISSP certification denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of information security stipulated by ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas including:
Read additional information about Progent's CISSP Accredited Network Security Consulting Expertise.
- Security Administration Practices
- Security Infrastructure and Models
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure Network Architecture Consulting Services
Progent's CISSP-ISSAP qualified network architecture professionals are experts who have earned ISSAP status as a result of rigorous testing and extensive experience with network security architecture. The ISSAP certification represents proven mastery in the most challenging demands of information security architecture bounded by the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security such as.
Read additional details about Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.
- Access Control Systems and Techniques
- Telecommunications and Network Protection
- Data Encryption Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Qualified Network Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that represents mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive test given by the ISACA professional group. Progent's CISA-certified security audit experts can assist your business with:
Get additional details about Progent's CISA Accredited Network Security Auditing Engineering Services.
- Information Systems Audit Process
- Information Technology Governance
- Systems and Architecture Lifecycle Planning
- Information Technology Service Delivery
- Protecting Data Assets
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and maintain IS controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and carry out a business continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation engineers offer a variety of risk evaluation services such as:
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to help identify significant vulnerabilities
- Inventory legal, industry, and business mandates and company standards related to your network to assess their possible influence on your business goals
- Point out potential vulnerabilities for your operational processes to help in analyzing your corporate risk
- Create a risk awareness initiative and provide training to ensure your stakeholders appreciate IS risk so they can assist with your risk management process
- Connect identified risk scenarios to related business procedures to help assign risk responsibility
- Determine risk tolerance with your senior leadership and major stakeholders to make sure they align
GIAC Accredited Network Security Engineering Services
Read additional details about Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to verify that an accredited security consultant has the skills appropriate to deliver services in key areas of system, data, and program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit experts can assist your business with:
Get in Touch with a Certified Security Engineer
To learn how you can contact a certified Progent security engineer for online or onsite assistance in North Dakota, phone 1-800-993-9400 or go to Online Network Support.